Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file4232024.exe

Overview

General Information

Sample name:file4232024.exe
Analysis ID:1431780
MD5:982f1903db530be43b0d0fc4ce976e8e
SHA1:e2a9534e65f2ae33df71b136cfef600eab4f3627
SHA256:0c0d782dac4f8afdf63e33666febfe1aea6605c1a64ae532a8b84d2d315b176b
Tags:exe
Infos:

Detection

DarkCloud
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected DarkCloud
Yara detected Generic Dropper
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file4232024.exe (PID: 1680 cmdline: "C:\Users\user\Desktop\file4232024.exe" MD5: 982F1903DB530BE43B0D0FC4CE976E8E)
    • svchost.exe (PID: 3060 cmdline: "C:\Users\user\Desktop\file4232024.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • WmiPrvSE.exe (PID: 5272 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 64ACA4F48771A5BA50CD50F2410632AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkCloud StealerStealer is written in Visual Basic.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darkcloud
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
    00000000.00000002.2026120718.0000000001FE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
      Process Memory Space: file4232024.exe PID: 1680JoeSecurity_DarkCloudYara detected DarkCloudJoe Security
        Process Memory Space: file4232024.exe PID: 1680JoeSecurity_GenericDropperYara detected Generic DropperJoe Security
          Process Memory Space: svchost.exe PID: 3060JoeSecurity_DarkCloudYara detected DarkCloudJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.file4232024.exe.1fe0000.2.raw.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
              0.2.file4232024.exe.1fe0000.2.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
                2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
                  2.2.svchost.exe.400000.0.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\file4232024.exe", CommandLine: "C:\Users\user\Desktop\file4232024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\file4232024.exe", ParentImage: C:\Users\user\Desktop\file4232024.exe, ParentProcessId: 1680, ParentProcessName: file4232024.exe, ProcessCommandLine: "C:\Users\user\Desktop\file4232024.exe", ProcessId: 3060, ProcessName: svchost.exe
                    Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\file4232024.exe", CommandLine: "C:\Users\user\Desktop\file4232024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\file4232024.exe", ParentImage: C:\Users\user\Desktop\file4232024.exe, ParentProcessId: 1680, ParentProcessName: file4232024.exe, ProcessCommandLine: "C:\Users\user\Desktop\file4232024.exe", ProcessId: 3060, ProcessName: svchost.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file4232024.exeReversingLabs: Detection: 63%
                    Source: file4232024.exeVirustotal: Detection: 47%Perma Link
                    Source: file4232024.exeJoe Sandbox ML: detected
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Cookies
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \Default\Login Data
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \Login Data
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: //setting[@name='Password']/value
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Password :
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Software\Martin Prikryl\WinSCP 2\Sessions
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: SMTP Email Address
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: NNTP Email Address
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Email
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: HTTPMail User Name
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: HTTPMail Server
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(?!:\/\/)([a-zA-Z0-9-_]+\.)[a-zA-Z0-9][a-zA-Z0-9-_]+\.[a-zA-Z]{2,11}?$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Password
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^389[0-9]{11}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^3[47][0-9]{13}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(6541|6556)[0-9]{12}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^3(?:0[0-5]|[68][0-9])[0-9]{11}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^63[7-9][0-9]{13}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^9[0-9]{15}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(?:2131|1800|35\\d{3})\\d{11}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(6304|6706|6709|6771)[0-9]{12,15}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(5018|5020|5038|6304|6759|6761|6763)[0-9]{8,15}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Mastercard
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(6334|6767)[0-9]{12}|(6334|6767)[0-9]{14}|(6334|6767)[0-9]{15}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(62[0-9]{14,17})$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(4903|4905|4911|4936|6333|6759)[0-9]{12}|(4903|4905|4911|4936|6333|6759)[0-9]{14}|(4903|4905|4911|4936|6333|6759)[0-9]{15}|564182[0-9]{10}|564182[0-9]{12}|564182[0-9]{13}|633110[0-9]{10}|633110[0-9]{12}|633110[0-9]{13}$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Visa Card
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: ^(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14})$
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Visa Master Card
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \logins.json
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \signons.sqlite
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Foxmail.exe
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: mail\
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \Accounts\Account.rec0
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: \AccCfg\Accounts.tdat
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: EnableSignature
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: Application : FoxMail
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: encryptedUsername
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: logins
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: encryptedPassword
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: office.tony39@mail.ru
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/sendusing
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/smtpauthenticate
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: mail.vinoterra.ru
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/smtpserver
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/smtpserverport
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/smtpusessl
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/sendusername
                    Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpString decryptor: http://schemas.microsoft.com/cdo/configuration/sendpassword
                    Source: file4232024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: file4232024.exe, 00000000.00000003.2023518889.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, file4232024.exe, 00000000.00000003.2024099743.0000000003C50000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: W.pdb4 source: svchost.exe, 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: file4232024.exe, 00000000.00000003.2023518889.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, file4232024.exe, 00000000.00000003.2024099743.0000000003C50000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00644696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00644696
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064C93C FindFirstFileW,FindClose,0_2_0064C93C
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0064C9C7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F200
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F35D
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064F65E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00643A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643A2B
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00643D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643D4E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064BF27
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006525E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006525E2
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0065425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0065425A
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00654458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00654458
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0065425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0065425A
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00640219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00640219
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0066CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0066CDAC

                    System Summary

                    barindex
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: This is a third-party compiled AutoIt script.0_2_005E3B4C
                    Source: file4232024.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: file4232024.exe, 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1f6a5f1a-f
                    Source: file4232024.exe, 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fc1f5706-e
                    Source: file4232024.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1fcc7855-b
                    Source: file4232024.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_57878b67-3
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                    Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00644021: CreateFileW,DeviceIoControl,CloseHandle,0_2_00644021
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00638858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00638858
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0064545F
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005EE8000_2_005EE800
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060DBB50_2_0060DBB5
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0066804A0_2_0066804A
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005EE0600_2_005EE060
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F41400_2_005F4140
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006024050_2_00602405
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006165220_2_00616522
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006606650_2_00660665
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0061267E0_2_0061267E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F68430_2_005F6843
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060283A0_2_0060283A
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006189DF0_2_006189DF
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F8A0E0_2_005F8A0E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00660AE20_2_00660AE2
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00616A940_2_00616A94
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0063EB070_2_0063EB07
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00648B130_2_00648B13
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060CD610_2_0060CD61
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006170060_2_00617006
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F710E0_2_005F710E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F31900_2_005F3190
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E12870_2_005E1287
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006033C70_2_006033C7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060F4190_2_0060F419
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006016C40_2_006016C4
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F56800_2_005F5680
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005F58C00_2_005F58C0
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006078D30_2_006078D3
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00601BB80_2_00601BB8
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00619D050_2_00619D05
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005EFE400_2_005EFE40
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060BFE60_2_0060BFE6
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00601FD00_2_00601FD0
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_01FD36300_2_01FD3630
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00426B602_2_00426B60
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: String function: 00600D27 appears 70 times
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: String function: 00608B40 appears 42 times
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: String function: 005E7F41 appears 35 times
                    Source: file4232024.exe, 00000000.00000003.2025112873.0000000003DD3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file4232024.exe
                    Source: file4232024.exe, 00000000.00000003.2024555364.0000000003F7D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file4232024.exe
                    Source: file4232024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: svchost.exeBinary or memory string: C*\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                    Source: svchost.exeBinary or memory string: *\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                    Source: svchost.exe, 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: x;@*\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                    Source: file4232024.exe, 00000000.00000002.2026120718.0000000001FE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: ,@`C*\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                    Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@4/6@0/0
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064A2D5 GetLastError,FormatMessageW,0_2_0064A2D5
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00638713 AdjustTokenPrivileges,CloseHandle,0_2_00638713
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00638CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00638CC3
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0064B59E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0065F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0065F121
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064C602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0064C602
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005E4FE9
                    Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\file4232024.exeFile created: C:\Users\user\AppData\Local\Temp\aut25DE.tmpJump to behavior
                    Source: file4232024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\file4232024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: svchost.exeBinary or memory string: SELECT item1 FROM metadata WHERE id = 'password';
                    Source: svchost.exe, 00000002.00000003.2341453055.0000000003250000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2341919743.0000000003250000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2341065025.000000000324C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2341610473.000000000324B000.00000004.00000020.00020000.00000000.sdmp, LogfireblendeuGDOCADegvvshJYgdfgGWltXxnlOnThLThggfsEYSRpalmitic.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: file4232024.exeReversingLabs: Detection: 63%
                    Source: file4232024.exeVirustotal: Detection: 47%
                    Source: unknownProcess created: C:\Users\user\Desktop\file4232024.exe "C:\Users\user\Desktop\file4232024.exe"
                    Source: C:\Users\user\Desktop\file4232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\file4232024.exe"
                    Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\Desktop\file4232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\file4232024.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msvbvm60.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vb6zz.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winsqlite3.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE09B103-97E0-11CF-978F-00A02463E06F}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: file4232024.exeStatic file information: File size 1204736 > 1048576
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: file4232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: file4232024.exe, 00000000.00000003.2023518889.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, file4232024.exe, 00000000.00000003.2024099743.0000000003C50000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: W.pdb4 source: svchost.exe, 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: file4232024.exe, 00000000.00000003.2023518889.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, file4232024.exe, 00000000.00000003.2024099743.0000000003C50000.00000004.00001000.00020000.00000000.sdmp
                    Source: file4232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: file4232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: file4232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: file4232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: file4232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0065C304 LoadLibraryA,GetProcAddress,0_2_0065C304
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00608B85 push ecx; ret 0_2_00608B98
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005E4A35
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006655FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_006655FD
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006033C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006033C7
                    Source: C:\Users\user\Desktop\file4232024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-97711
                    Source: C:\Users\user\Desktop\file4232024.exeAPI coverage: 4.6 %
                    Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 9.1 %
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00644696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00644696
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064C93C FindFirstFileW,FindClose,0_2_0064C93C
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0064C9C7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F200
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0064F35D
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064F65E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00643A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643A2B
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00643D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00643D4E
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0064BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0064BF27
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005E4AFE
                    Source: WebData.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: WebData.2.drBinary or memory string: discord.comVMware20,11696428655f
                    Source: WebData.2.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: global block list test formVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: WebData.2.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: WebData.2.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: WebData.2.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: WebData.2.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: WebData.2.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: WebData.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: WebData.2.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: WebData.2.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: WebData.2.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: WebData.2.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: WebData.2.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: WebData.2.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: WebData.2.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: WebData.2.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: WebData.2.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: C:\Users\user\Desktop\file4232024.exeAPI call chain: ExitProcess graph end nodegraph_0-97845
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006541FD BlockInput,0_2_006541FD
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3B4C
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00615CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00615CCC
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0065C304 LoadLibraryA,GetProcAddress,0_2_0065C304
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_01FD3520 mov eax, dword ptr fs:[00000030h]0_2_01FD3520
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_01FD34C0 mov eax, dword ptr fs:[00000030h]0_2_01FD34C0
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_01FD1ED0 mov eax, dword ptr fs:[00000030h]0_2_01FD1ED0
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006381F7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060A364 SetUnhandledExceptionFilter,0_2_0060A364
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0060A395

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file4232024.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2FEE008Jump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00638C93 LogonUserW,0_2_00638C93
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3B4C
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005E4A35
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00644EF5 mouse_event,0_2_00644EF5
                    Source: C:\Users\user\Desktop\file4232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\file4232024.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006381F7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00644C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00644C03
                    Source: file4232024.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: file4232024.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0060886B cpuid 0_2_0060886B
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_006150D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006150D7
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00622230 GetUserNameW,0_2_00622230
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_0061418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0061418A
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_005E4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005E4AFE

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.file4232024.exe.1fe0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file4232024.exe.1fe0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2026120718.0000000001FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file4232024.exe PID: 1680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: file4232024.exe PID: 1680, type: MEMORYSTR
                    Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: file4232024.exeBinary or memory string: WIN_81
                    Source: file4232024.exeBinary or memory string: WIN_XP
                    Source: file4232024.exeBinary or memory string: WIN_XPe
                    Source: file4232024.exeBinary or memory string: WIN_VISTA
                    Source: file4232024.exeBinary or memory string: WIN_7
                    Source: file4232024.exeBinary or memory string: WIN_8
                    Source: file4232024.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.file4232024.exe.1fe0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file4232024.exe.1fe0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2026120718.0000000001FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file4232024.exe PID: 1680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3060, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00656596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00656596
                    Source: C:\Users\user\Desktop\file4232024.exeCode function: 0_2_00656A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00656A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    Security Account Manager1
                    File and Directory Discovery
                    SMB/Windows Admin Shares21
                    Input Capture
                    SteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS15
                    System Information Discovery
                    Distributed Component Object Model3
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets31
                    Security Software Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Access Token Manipulation
                    Cached Domain Credentials2
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
                    Process Injection
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                    System Owner/User Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file4232024.exe63%ReversingLabsWin32.Trojan.Strab
                    file4232024.exe48%VirustotalBrowse
                    file4232024.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/chrome_newtabsvchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/ac/?q=svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icosvchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.ecosia.org/newtab/svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=svchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsvchost.exe, 00000002.00000003.2341179217.000000000326E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      No contacted IP infos
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1431780
                                      Start date and time:2024-04-25 19:11:09 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 50s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:6
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:file4232024.exe
                                      Detection:MAL
                                      Classification:mal92.troj.spyw.evad.winEXE@4/6@0/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 60
                                      • Number of non-executed functions: 271
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\file4232024.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):315950
                                      Entropy (8bit):7.989846970648854
                                      Encrypted:false
                                      SSDEEP:6144:Gh9lKtLmOTEQrdjCu9fu1mwfktngNnaejFXyT74OnaCN5Kqo4UzYuWBADp:Gh9lKIOTPrVuHCSFX6bao5Zd4YuWCDp
                                      MD5:A363651C2D2A42241705EFDE74EED3CD
                                      SHA1:7A41400D2B6901CB334210D66D541D0B593B82D2
                                      SHA-256:CE7C51B95D80488FEA00E7B3B1D77A11A71C23EE990BFD99E2A0D1E93D4E49DC
                                      SHA-512:8E025C6DA5819C48E2C2781B566E4CA5B61C7106538764B22BA848520182B5BE2FD9ED201E50EE275C9229571565DD99C6CDFB5639BECFF3750BFA8484ABBC64
                                      Malicious:false
                                      Reputation:low
                                      Preview:EA06.......Uj]..N.L..NW6.H....`..kr.R(`.y....x...{W.N.^*.:.....[.j.;.....KX.Me2...E..Hb.....&.]..x.V.9.I.4:.......R...........+...6....+=......k......y.[.$.A'..d........P.t............j.:.&.V...\.P.Z.....0.Y.....Y.Z..,Q.t...iJ...B ..R*.:..k.S.t..:J.Y...........ux].k...g.Y..7........6aV.X....B%U.,.o.yl...g.....e...+.....k2.Y......X.....x.ff....V..-Tz..V.,[...$...w.i.....E..8~6.......x..!QX.....B/ ....._........................'._.o(.....F.q{...*.K..jti,..[...Z.nuS...3.t..>.^eu.G6.F.G%u.v.3@.TgUJ.".G..'.j.*.;.y1..O.k#.a.S...gA.J.4i...[.@.....I..~.Y,.IX..fS...YL..3.u..>.O<4)D..F.j?U.w.K@.n.4..p.`.eku]..qT..jr..jG..|g..n:.(.h+.*.J....h..N..S..h.[.~.U..guJ...).}.....{0...R..N.".O.....0.Nj.9.J.%.u..]7BuT....Z}..V......(.../........*..Q.I.b.5..*...>S..e.@.C-...8.j4..o.....;.......?T.U....R.R..|.y..s..L1......H.4z4.sN.L!X.MN5...w4z.V...35.l....,/..?.C.T.4Y.....v.3..z.S....^WR.U.p.UH..).H$r..y0.V.2.M.".X.r.?..0.}..8..%..+.^..uT....0..%:.L81............@.
                                      Process:C:\Users\user\Desktop\file4232024.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):9848
                                      Entropy (8bit):7.603204529326611
                                      Encrypted:false
                                      SSDEEP:192:C+cKrLMQ/6Yyu2f82l7dpnoyyF7d8iLZjlNeuPPbed5ADasy65ozT/SGHy/:h7rwLzTyF7CImuPPbed5kn5C7LC
                                      MD5:2BC55BBBDCC4CEB417340480C51E1AE0
                                      SHA1:A2A5A2CC189C578832FF4282F21FE041E0580C50
                                      SHA-256:C779BF213540304E19FC12E48B92C3CF924BA2BD5B326A01734770B5E2606DF3
                                      SHA-512:A278048BB26008AB56FC791B245A227954B774A3DB66F6E2502B67EE503AB4CD20F8561CE887C3B6087EC31167A16E89C7440B375BFF1216FEF83A6D9BEF53BE
                                      Malicious:false
                                      Reputation:low
                                      Preview:EA06..p0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                      Process:C:\Users\user\Desktop\file4232024.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):393216
                                      Entropy (8bit):7.621252250039071
                                      Encrypted:false
                                      SSDEEP:6144:K3oOSiCzGxbQAjINs9GMLuk4ml1lSy1WuOslmb9usWmIoMGdqUV6lo1I9ljsH0Ce:9OCzGPcKGMLukR9SduOumktmIoMyswle
                                      MD5:3E2FE4A3A6323EE2928D6AE0AE6D7B72
                                      SHA1:2C58DE43F8AD62B33915C1CEC269121243BED301
                                      SHA-256:C4FA38A20324E8DC25D0AFDC9230D27B2E88A836DED56F6448241456EAEB4F43
                                      SHA-512:AD18D1C975982FF9A42B0BB28C06046AF577C1701D5B5B06EB651337B3709ECD9EDCB4BD7FFA53E60075309AD6E1F0590F05C0C9A2DD3708E56D11D8A4D9C790
                                      Malicious:false
                                      Reputation:low
                                      Preview:.o.VKCONR3HD..VH.ONV3HD5rVHCONV3HD52VHCONV3HD52VHCONV3HD52VH.ONV=W.;2.A.n.W..eaZ?;c?<9T:%X.5)-!!".*!.@#&c& vw..._9,&aC[9lD52VHCO..J..%...X.._.?.O...Y...Z..._./.L..."..! '..$.D52VHCONV3HD52VHCONV3HD5b.HC.OU3Z.-TVHCONV3H.5=WCBINVcKD5.THCONV.xD52FHCO.U3HDu2VXCONF3H@52VJCKNR3HD52VHCOHV3XD5..NCMNV3HD%2VXCONV#HD%2VHCONF3HD52VHCONVW.G5.VHCO>U3p.72VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD.0VHcONV3XD5.UHCONV3HD52VHCONV3HD52VHCONxG-<A2VH..MV3XD52.KCO^V3HD52VHCONV3Hd526f'.:73HD9<VHC/MV3XD526KCONV3HD52VHCO.V3.jGA$+CONn.JD5BUHC.LV38G52VHCONV3HD52.HC..I..T52VHCONV3HDxa....xf...y2VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3HD52VHCONV3
                                      Process:C:\Users\user\Desktop\file4232024.exe
                                      File Type:ASCII text, with very long lines (28720), with no line terminators
                                      Category:dropped
                                      Size (bytes):28720
                                      Entropy (8bit):3.5906320014569393
                                      Encrypted:false
                                      SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbIE+Ie6gJ4vfF3if6gys:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RA
                                      MD5:F429058632AB816A74534E3A8C8174EE
                                      SHA1:75BBEC83815F8E8270927FCEA51CCE20D11B8FC6
                                      SHA-256:D8085A2181E73A7B64EBBDEA275A125646DC9B9C9C360DCF452A54B925F4605E
                                      SHA-512:2AD3AB2E91CBDCD7596527F2BC7A66CEA25D7307802C6A95C3A8581FC4B406A21BC5023CE2E790D6A78825B31E1332DE32CC4069256147285849D7ADD9999BEB
                                      Malicious:false
                                      Reputation:low
                                      Preview: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
                                      Process:C:\Windows\SysWOW64\svchost.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                      Category:dropped
                                      Size (bytes):51200
                                      Entropy (8bit):0.8746135976761988
                                      Encrypted:false
                                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\svchost.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                      Category:dropped
                                      Size (bytes):196608
                                      Entropy (8bit):1.121297215059106
                                      Encrypted:false
                                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                      MD5:D87270D0039ED3A5A72E7082EA71E305
                                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.158042199399989
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:file4232024.exe
                                      File size:1'204'736 bytes
                                      MD5:982f1903db530be43b0d0fc4ce976e8e
                                      SHA1:e2a9534e65f2ae33df71b136cfef600eab4f3627
                                      SHA256:0c0d782dac4f8afdf63e33666febfe1aea6605c1a64ae532a8b84d2d315b176b
                                      SHA512:80d5a9a05b5079dc99f48ac2497dfa5ef08fb37204d5b6811f5ad3806950d43ddfecea13713e9624ef00473f75c94a661b48b27363461a532bcb237a6afbbd2b
                                      SSDEEP:24576:DAHnh+eWsN3skA4RV1Hom2KXMmHaoPOpKOWz6zBvxwiruLgP5:Oh+ZkldoPK8YaompKFz6lJw4uA
                                      TLSH:CF45BD0273D1C036FFABA2739B6AF6415ABC79254123852F13981DB9BC701B2267D763
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                      Icon Hash:aaf3e3e3938382a0
                                      Entrypoint:0x42800a
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66275E9C [Tue Apr 23 07:09:16 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                                      Instruction
                                      call 00007FC1E8F610ADh
                                      jmp 00007FC1E8F53E64h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push edi
                                      push esi
                                      mov esi, dword ptr [esp+10h]
                                      mov ecx, dword ptr [esp+14h]
                                      mov edi, dword ptr [esp+0Ch]
                                      mov eax, ecx
                                      mov edx, ecx
                                      add eax, esi
                                      cmp edi, esi
                                      jbe 00007FC1E8F53FEAh
                                      cmp edi, eax
                                      jc 00007FC1E8F5434Eh
                                      bt dword ptr [004C41FCh], 01h
                                      jnc 00007FC1E8F53FE9h
                                      rep movsb
                                      jmp 00007FC1E8F542FCh
                                      cmp ecx, 00000080h
                                      jc 00007FC1E8F541B4h
                                      mov eax, edi
                                      xor eax, esi
                                      test eax, 0000000Fh
                                      jne 00007FC1E8F53FF0h
                                      bt dword ptr [004BF324h], 01h
                                      jc 00007FC1E8F544C0h
                                      bt dword ptr [004C41FCh], 00000000h
                                      jnc 00007FC1E8F5418Dh
                                      test edi, 00000003h
                                      jne 00007FC1E8F5419Eh
                                      test esi, 00000003h
                                      jne 00007FC1E8F5417Dh
                                      bt edi, 02h
                                      jnc 00007FC1E8F53FEFh
                                      mov eax, dword ptr [esi]
                                      sub ecx, 04h
                                      lea esi, dword ptr [esi+04h]
                                      mov dword ptr [edi], eax
                                      lea edi, dword ptr [edi+04h]
                                      bt edi, 03h
                                      jnc 00007FC1E8F53FF3h
                                      movq xmm1, qword ptr [esi]
                                      sub ecx, 08h
                                      lea esi, dword ptr [esi+08h]
                                      movq qword ptr [edi], xmm1
                                      lea edi, dword ptr [edi+08h]
                                      test esi, 00000007h
                                      je 00007FC1E8F54045h
                                      bt esi, 03h
                                      Programming Language:
                                      • [ASM] VS2013 build 21005
                                      • [ C ] VS2013 build 21005
                                      • [C++] VS2013 build 21005
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      • [ASM] VS2013 UPD5 build 40629
                                      • [RES] VS2013 build 21005
                                      • [LNK] VS2013 UPD5 build 40629
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5bae0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x7134.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xc80000x5bae00x5bc00248cf3dd5677005b08dc6439c2020055False0.9279818417915532data7.894804149890428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x1240000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                      RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                      RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                      RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                      RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                      RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                      RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                      RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                      RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                      RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                      RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                      RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                      RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                      RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                      RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                      RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                      RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                      RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                      RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                      RT_RCDATA0xd07b80x52d78data1.000327124837911
                                      RT_GROUP_ICON0x1235300x76dataEnglishGreat Britain0.6610169491525424
                                      RT_GROUP_ICON0x1235a80x14dataEnglishGreat Britain1.25
                                      RT_GROUP_ICON0x1235bc0x14dataEnglishGreat Britain1.15
                                      RT_GROUP_ICON0x1235d00x14dataEnglishGreat Britain1.25
                                      RT_VERSION0x1235e40x10cdataEnglishGreat Britain0.5970149253731343
                                      RT_MANIFEST0x1236f00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                      DLLImport
                                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                      PSAPI.DLLGetProcessMemoryInfo
                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                      UxTheme.dllIsThemeActive
                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishGreat Britain
                                      No network behavior found

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:19:11:56
                                      Start date:25/04/2024
                                      Path:C:\Users\user\Desktop\file4232024.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\file4232024.exe"
                                      Imagebase:0x5e0000
                                      File size:1'204'736 bytes
                                      MD5 hash:982F1903DB530BE43B0D0FC4CE976E8E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000000.00000002.2026120718.0000000001FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:19:11:57
                                      Start date:25/04/2024
                                      Path:C:\Windows\SysWOW64\svchost.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\file4232024.exe"
                                      Imagebase:0x620000
                                      File size:46'504 bytes
                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000002.00000002.3267907136.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate
                                      Has exited:false

                                      Target ID:4
                                      Start time:19:12:30
                                      Start date:25/04/2024
                                      Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                                      Imagebase:0xf80000
                                      File size:418'304 bytes
                                      MD5 hash:64ACA4F48771A5BA50CD50F2410632AD
                                      Has elevated privileges:true
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4%
                                        Dynamic/Decrypted Code Coverage:0.4%
                                        Signature Coverage:4.5%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:40
                                        execution_graph 97691 5e107d 97696 5e71eb 97691->97696 97693 5e108c 97727 602f80 97693->97727 97697 5e71fb __ftell_nolock 97696->97697 97730 5e77c7 97697->97730 97701 5e72ba 97742 60074f 97701->97742 97708 5e77c7 59 API calls 97709 5e72eb 97708->97709 97761 5e7eec 97709->97761 97711 5e72f4 RegOpenKeyExW 97712 61ecda RegQueryValueExW 97711->97712 97716 5e7316 Mailbox 97711->97716 97713 61ecf7 97712->97713 97714 61ed6c RegCloseKey 97712->97714 97765 600ff6 97713->97765 97714->97716 97726 61ed7e _wcscat Mailbox __wsetenvp 97714->97726 97716->97693 97717 61ed10 97775 5e538e 97717->97775 97718 5e7b52 59 API calls 97718->97726 97721 61ed38 97778 5e7d2c 97721->97778 97723 61ed52 97723->97714 97725 5e3f84 59 API calls 97725->97726 97726->97716 97726->97718 97726->97725 97787 5e7f41 97726->97787 97852 602e84 97727->97852 97729 5e1096 97731 600ff6 Mailbox 59 API calls 97730->97731 97732 5e77e8 97731->97732 97733 600ff6 Mailbox 59 API calls 97732->97733 97734 5e72b1 97733->97734 97735 5e4864 97734->97735 97791 611b90 97735->97791 97738 5e7f41 59 API calls 97739 5e4897 97738->97739 97793 5e48ae 97739->97793 97741 5e48a1 Mailbox 97741->97701 97743 611b90 __ftell_nolock 97742->97743 97744 60075c GetFullPathNameW 97743->97744 97745 60077e 97744->97745 97746 5e7d2c 59 API calls 97745->97746 97747 5e72c5 97746->97747 97748 5e7e0b 97747->97748 97749 5e7e1f 97748->97749 97750 61f173 97748->97750 97815 5e7db0 97749->97815 97820 5e8189 97750->97820 97753 5e72d3 97755 5e3f84 97753->97755 97754 61f17e __wsetenvp _memmove 97756 5e3f92 97755->97756 97760 5e3fb4 _memmove 97755->97760 97758 600ff6 Mailbox 59 API calls 97756->97758 97757 600ff6 Mailbox 59 API calls 97759 5e3fc8 97757->97759 97758->97760 97759->97708 97760->97757 97762 5e7f06 97761->97762 97764 5e7ef9 97761->97764 97763 600ff6 Mailbox 59 API calls 97762->97763 97763->97764 97764->97711 97768 600ffe 97765->97768 97767 601018 97767->97717 97768->97767 97770 60101c std::exception::exception 97768->97770 97823 60594c 97768->97823 97840 6035e1 DecodePointer 97768->97840 97841 6087db RaiseException 97770->97841 97772 601046 97842 608711 58 API calls _free 97772->97842 97774 601058 97774->97717 97776 600ff6 Mailbox 59 API calls 97775->97776 97777 5e53a0 RegQueryValueExW 97776->97777 97777->97721 97777->97723 97779 5e7d38 __wsetenvp 97778->97779 97780 5e7da5 97778->97780 97782 5e7d4e 97779->97782 97783 5e7d73 97779->97783 97781 5e7e8c 59 API calls 97780->97781 97786 5e7d56 _memmove 97781->97786 97851 5e8087 59 API calls Mailbox 97782->97851 97784 5e8189 59 API calls 97783->97784 97784->97786 97786->97723 97788 5e7f50 __wsetenvp _memmove 97787->97788 97789 600ff6 Mailbox 59 API calls 97788->97789 97790 5e7f8e 97789->97790 97790->97726 97792 5e4871 GetModuleFileNameW 97791->97792 97792->97738 97794 611b90 __ftell_nolock 97793->97794 97795 5e48bb GetFullPathNameW 97794->97795 97796 5e48da 97795->97796 97797 5e48f7 97795->97797 97798 5e7d2c 59 API calls 97796->97798 97799 5e7eec 59 API calls 97797->97799 97800 5e48e6 97798->97800 97799->97800 97803 5e7886 97800->97803 97804 5e7894 97803->97804 97807 5e7e8c 97804->97807 97806 5e48f2 97806->97741 97808 5e7e9a 97807->97808 97810 5e7ea3 _memmove 97807->97810 97808->97810 97811 5e7faf 97808->97811 97810->97806 97812 5e7fc2 97811->97812 97814 5e7fbf _memmove 97811->97814 97813 600ff6 Mailbox 59 API calls 97812->97813 97813->97814 97814->97810 97816 5e7dbf __wsetenvp 97815->97816 97817 5e8189 59 API calls 97816->97817 97818 5e7dd0 _memmove 97816->97818 97819 61f130 _memmove 97817->97819 97818->97753 97821 600ff6 Mailbox 59 API calls 97820->97821 97822 5e8193 97821->97822 97822->97754 97824 6059c7 97823->97824 97833 605958 97823->97833 97849 6035e1 DecodePointer 97824->97849 97826 6059cd 97850 608d68 58 API calls __getptd_noexit 97826->97850 97829 60598b RtlAllocateHeap 97829->97833 97839 6059bf 97829->97839 97831 605963 97831->97833 97843 60a3ab 58 API calls 2 library calls 97831->97843 97844 60a408 58 API calls 8 library calls 97831->97844 97845 6032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97831->97845 97832 6059b3 97847 608d68 58 API calls __getptd_noexit 97832->97847 97833->97829 97833->97831 97833->97832 97837 6059b1 97833->97837 97846 6035e1 DecodePointer 97833->97846 97848 608d68 58 API calls __getptd_noexit 97837->97848 97839->97768 97840->97768 97841->97772 97842->97774 97843->97831 97844->97831 97846->97833 97847->97837 97848->97839 97849->97826 97850->97839 97851->97786 97853 602e90 _raise 97852->97853 97860 603457 97853->97860 97859 602eb7 _raise 97859->97729 97877 609e4b 97860->97877 97862 602e99 97863 602ec8 DecodePointer DecodePointer 97862->97863 97864 602ef5 97863->97864 97865 602ea5 97863->97865 97864->97865 97929 6089e4 59 API calls __wsplitpath_helper 97864->97929 97874 602ec2 97865->97874 97867 602f58 EncodePointer EncodePointer 97867->97865 97868 602f2c 97868->97865 97873 602f46 EncodePointer 97868->97873 97931 608aa4 61 API calls 2 library calls 97868->97931 97869 602f07 97869->97867 97869->97868 97930 608aa4 61 API calls 2 library calls 97869->97930 97872 602f40 97872->97865 97872->97873 97873->97867 97932 603460 97874->97932 97878 609e5c 97877->97878 97879 609e6f EnterCriticalSection 97877->97879 97884 609ed3 97878->97884 97879->97862 97881 609e62 97881->97879 97908 6032f5 58 API calls 3 library calls 97881->97908 97885 609edf _raise 97884->97885 97886 609f00 97885->97886 97887 609ee8 97885->97887 97890 609f21 _raise 97886->97890 97912 608a5d 97886->97912 97909 60a3ab 58 API calls 2 library calls 97887->97909 97890->97881 97891 609eed 97910 60a408 58 API calls 8 library calls 97891->97910 97894 609f2b 97898 609e4b __lock 58 API calls 97894->97898 97895 609f1c 97918 608d68 58 API calls __getptd_noexit 97895->97918 97896 609ef4 97911 6032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97896->97911 97900 609f32 97898->97900 97902 609f57 97900->97902 97903 609f3f 97900->97903 97920 602f95 97902->97920 97919 60a06b InitializeCriticalSectionAndSpinCount 97903->97919 97906 609f4b 97926 609f73 LeaveCriticalSection _doexit 97906->97926 97909->97891 97910->97896 97914 608a6b 97912->97914 97913 60594c __crtCompareStringA_stat 58 API calls 97913->97914 97914->97913 97915 608a9d 97914->97915 97916 608a7e 97914->97916 97915->97894 97915->97895 97916->97914 97916->97915 97927 60a372 Sleep 97916->97927 97918->97890 97919->97906 97921 602fc7 __dosmaperr 97920->97921 97922 602f9e RtlFreeHeap 97920->97922 97921->97906 97922->97921 97923 602fb3 97922->97923 97928 608d68 58 API calls __getptd_noexit 97923->97928 97925 602fb9 GetLastError 97925->97921 97926->97890 97927->97916 97928->97925 97929->97869 97930->97868 97931->97872 97935 609fb5 LeaveCriticalSection 97932->97935 97934 602ec7 97934->97859 97935->97934 97936 620226 97942 5eade2 Mailbox 97936->97942 97938 620c86 98056 6366f4 97938->98056 97940 620c8f 97942->97938 97942->97940 97943 6200e0 VariantClear 97942->97943 97944 5eb6c1 97942->97944 97951 65e237 97942->97951 97954 65474d 97942->97954 97963 65e24b 97942->97963 97966 5f2123 97942->97966 98006 64d2e6 97942->98006 98053 5e9df0 59 API calls Mailbox 97942->98053 98054 637405 59 API calls 97942->98054 97943->97942 98055 64a0b5 89 API calls 4 library calls 97944->98055 98059 65cdf1 97951->98059 97953 65e247 97953->97942 97955 5e9997 84 API calls 97954->97955 97956 654787 97955->97956 98204 5e63a0 97956->98204 97958 654797 97959 6547bc 97958->97959 98230 5ea000 97958->98230 97962 6547c0 97959->97962 98253 5e9bf8 97959->98253 97962->97942 97964 65cdf1 130 API calls 97963->97964 97965 65e25b 97964->97965 97965->97942 97967 5e9bf8 59 API calls 97966->97967 97968 5f213b 97967->97968 97970 600ff6 Mailbox 59 API calls 97968->97970 97973 6269af 97968->97973 97971 5f2154 97970->97971 97974 5f2164 97971->97974 98310 5e5906 60 API calls Mailbox 97971->98310 97972 5f2189 97981 5f2196 97972->97981 98332 5e9c9c 59 API calls 97972->98332 97973->97972 98331 64f7df 59 API calls 97973->98331 97976 5e9997 84 API calls 97974->97976 97978 5f2172 97976->97978 98311 5e5956 97978->98311 97979 6269f7 97979->97981 97982 6269ff 97979->97982 98290 5e5e3f 97981->98290 98333 5e9c9c 59 API calls 97982->98333 97987 5f219d 97988 626a11 97987->97988 97989 5f21b7 97987->97989 97991 600ff6 Mailbox 59 API calls 97988->97991 97990 5e77c7 59 API calls 97989->97990 97992 5f21bf 97990->97992 97993 626a17 97991->97993 98295 5e56d2 97992->98295 97995 626a2b 97993->97995 98334 5e59b0 ReadFile SetFilePointerEx 97993->98334 98000 626a2f _memmove 97995->98000 98335 64794e 59 API calls 2 library calls 97995->98335 97998 5f21ce 97998->98000 98324 5e9b9c 59 API calls Mailbox 97998->98324 98001 5f21e2 Mailbox 98002 5f221c 98001->98002 98325 5e5dcf 98001->98325 98002->97942 98007 64d305 98006->98007 98008 64d310 98006->98008 98417 5e9c9c 59 API calls 98007->98417 98012 5e77c7 59 API calls 98008->98012 98051 64d3ea Mailbox 98008->98051 98010 600ff6 Mailbox 59 API calls 98011 64d433 98010->98011 98013 64d43f 98011->98013 98483 5e5906 60 API calls Mailbox 98011->98483 98014 64d334 98012->98014 98017 5e9997 84 API calls 98013->98017 98016 5e77c7 59 API calls 98014->98016 98018 64d33d 98016->98018 98019 64d457 98017->98019 98020 5e9997 84 API calls 98018->98020 98021 5e5956 67 API calls 98019->98021 98022 64d349 98020->98022 98023 64d466 98021->98023 98418 5e46f9 98022->98418 98026 64d49e 98023->98026 98027 64d46a GetLastError 98023->98027 98025 64d35e 98469 5e7c8e 98025->98469 98031 64d500 98026->98031 98032 64d4c9 98026->98032 98029 64d483 98027->98029 98033 64d3f3 Mailbox 98029->98033 98484 5e5a1a CloseHandle 98029->98484 98035 600ff6 Mailbox 59 API calls 98031->98035 98036 600ff6 Mailbox 59 API calls 98032->98036 98033->97942 98034 64d3e3 98482 5e9c9c 59 API calls 98034->98482 98040 64d505 98035->98040 98041 64d4ce 98036->98041 98040->98033 98045 5e77c7 59 API calls 98040->98045 98043 64d4df 98041->98043 98046 5e77c7 59 API calls 98041->98046 98485 64f835 59 API calls 2 library calls 98043->98485 98044 64d3a5 98048 5e7f41 59 API calls 98044->98048 98045->98033 98046->98043 98049 64d3b2 98048->98049 98481 643c66 63 API calls Mailbox 98049->98481 98051->98010 98051->98033 98052 64d3bb Mailbox 98052->98034 98053->97942 98054->97942 98055->97938 98501 636636 98056->98501 98058 636702 98058->97940 98097 5e9997 98059->98097 98063 65d0cd 98064 65d242 98063->98064 98068 65d0db 98063->98068 98165 65dbdc 92 API calls Mailbox 98064->98165 98067 65d251 98067->98068 98069 65d25d 98067->98069 98128 65cc82 98068->98128 98084 65ce75 Mailbox 98069->98084 98070 5e9997 84 API calls 98087 65cec6 Mailbox 98070->98087 98075 65d114 98143 600e48 98075->98143 98078 65d147 98150 5e942e 98078->98150 98079 65d12e 98149 64a0b5 89 API calls 4 library calls 98079->98149 98082 65d139 GetCurrentProcess TerminateProcess 98082->98078 98084->97953 98087->98063 98087->98070 98087->98084 98147 64f835 59 API calls 2 library calls 98087->98147 98148 65d2f3 61 API calls 2 library calls 98087->98148 98089 65d2b8 98089->98084 98092 65d2cc FreeLibrary 98089->98092 98090 65d17f 98162 65d95d 107 API calls _free 98090->98162 98092->98084 98096 65d190 98096->98089 98163 5e8ea0 59 API calls Mailbox 98096->98163 98164 5e9e9c 60 API calls Mailbox 98096->98164 98166 65d95d 107 API calls _free 98096->98166 98098 5e99ab 98097->98098 98099 5e99b1 98097->98099 98098->98084 98115 65dab9 98098->98115 98100 61f9fc __i64tow 98099->98100 98101 5e99f9 98099->98101 98103 5e99b7 __itow 98099->98103 98106 61f903 98099->98106 98167 6038d8 83 API calls 3 library calls 98101->98167 98105 600ff6 Mailbox 59 API calls 98103->98105 98107 5e99d1 98105->98107 98108 600ff6 Mailbox 59 API calls 98106->98108 98113 61f97b Mailbox _wcscpy 98106->98113 98107->98098 98109 5e7f41 59 API calls 98107->98109 98111 61f948 98108->98111 98109->98098 98110 600ff6 Mailbox 59 API calls 98112 61f96e 98110->98112 98111->98110 98112->98113 98114 5e7f41 59 API calls 98112->98114 98168 6038d8 83 API calls 3 library calls 98113->98168 98114->98113 98116 5e7faf 59 API calls 98115->98116 98117 65dad4 CharLowerBuffW 98116->98117 98169 63f658 98117->98169 98121 5e77c7 59 API calls 98122 65db0d 98121->98122 98176 5e79ab 98122->98176 98124 65db6c Mailbox 98124->98087 98125 65db24 98126 5e7e8c 59 API calls 98125->98126 98127 65db30 Mailbox 98126->98127 98127->98124 98189 65d2f3 61 API calls 2 library calls 98127->98189 98129 65cc9d 98128->98129 98133 65ccf2 98128->98133 98130 600ff6 Mailbox 59 API calls 98129->98130 98131 65ccbf 98130->98131 98132 600ff6 Mailbox 59 API calls 98131->98132 98131->98133 98132->98131 98134 65dd64 98133->98134 98135 65df8d Mailbox 98134->98135 98142 65dd87 _strcat _wcscpy __wsetenvp 98134->98142 98135->98075 98136 5e9d46 59 API calls 98136->98142 98137 5e9c9c 59 API calls 98137->98142 98138 5e9cf8 59 API calls 98138->98142 98139 5e9997 84 API calls 98139->98142 98140 60594c 58 API calls __crtCompareStringA_stat 98140->98142 98142->98135 98142->98136 98142->98137 98142->98138 98142->98139 98142->98140 98193 645b29 61 API calls 2 library calls 98142->98193 98145 600e5d 98143->98145 98144 600ef5 VirtualAlloc 98146 600ec3 98144->98146 98145->98144 98145->98146 98146->98078 98146->98079 98147->98087 98148->98087 98149->98082 98151 5e9436 98150->98151 98152 600ff6 Mailbox 59 API calls 98151->98152 98153 5e9444 98152->98153 98154 5e9450 98153->98154 98194 5e935c 59 API calls Mailbox 98153->98194 98156 5e91b0 98154->98156 98195 5e92c0 98156->98195 98158 600ff6 Mailbox 59 API calls 98159 5e925b 98158->98159 98159->98096 98161 5e8ea0 59 API calls Mailbox 98159->98161 98160 5e91bf 98160->98158 98160->98159 98161->98090 98162->98096 98163->98096 98164->98096 98165->98067 98166->98096 98167->98103 98168->98100 98170 63f683 __wsetenvp 98169->98170 98171 63f6c2 98170->98171 98174 63f6b8 98170->98174 98175 63f769 98170->98175 98171->98121 98171->98127 98174->98171 98190 5e7a24 61 API calls 98174->98190 98175->98171 98191 5e7a24 61 API calls 98175->98191 98177 5e79ba 98176->98177 98178 5e7a17 98176->98178 98177->98178 98180 5e79c5 98177->98180 98179 5e7e8c 59 API calls 98178->98179 98186 5e79e8 _memmove 98179->98186 98181 61ef32 98180->98181 98182 5e79e0 98180->98182 98183 5e8189 59 API calls 98181->98183 98192 5e8087 59 API calls Mailbox 98182->98192 98185 61ef3c 98183->98185 98187 600ff6 Mailbox 59 API calls 98185->98187 98186->98125 98188 61ef5c 98187->98188 98189->98124 98190->98174 98191->98175 98192->98186 98193->98142 98194->98154 98196 5e92c9 Mailbox 98195->98196 98197 61f5c8 98196->98197 98200 5e92d3 98196->98200 98198 600ff6 Mailbox 59 API calls 98197->98198 98202 61f5d4 98198->98202 98199 5e92da 98199->98160 98200->98199 98203 5e9df0 59 API calls Mailbox 98200->98203 98202->98202 98203->98200 98266 5e7b76 98204->98266 98206 5e65ca 98273 5e766f 59 API calls 2 library calls 98206->98273 98208 5e65e4 Mailbox 98208->97958 98209 5e63c5 98209->98206 98212 61e41f 98209->98212 98213 61e3eb _memmove 98209->98213 98217 5e766f 59 API calls 98209->98217 98218 5e7eec 59 API calls 98209->98218 98222 5e68f9 98209->98222 98223 61e3bb 98209->98223 98227 5e7faf 59 API calls 98209->98227 98271 5e60cc 60 API calls 98209->98271 98272 5e5ea1 59 API calls Mailbox 98209->98272 98274 5e5fd2 60 API calls 98209->98274 98275 5e7a84 59 API calls 2 library calls 98209->98275 98276 63fdba 91 API calls 4 library calls 98212->98276 98213->98212 98213->98222 98217->98209 98218->98209 98219 61e42d 98277 5e766f 59 API calls 2 library calls 98219->98277 98221 61e443 98221->98208 98222->98208 98278 63fdba 91 API calls 4 library calls 98222->98278 98224 5e8189 59 API calls 98223->98224 98225 61e3c6 98224->98225 98229 600ff6 Mailbox 59 API calls 98225->98229 98228 5e659b CharUpperBuffW 98227->98228 98228->98209 98229->98213 98231 5ea01f 98230->98231 98252 5ea04d Mailbox 98230->98252 98232 600ff6 Mailbox 59 API calls 98231->98232 98232->98252 98233 5eb5da 98288 64a0b5 89 API calls 4 library calls 98233->98288 98234 5eb5d5 98282 5e81a7 98234->98282 98238 602f80 67 API calls __cinit 98238->98252 98239 600ff6 59 API calls Mailbox 98239->98252 98240 5e81a7 59 API calls 98240->98252 98241 62047f 98281 64a0b5 89 API calls 4 library calls 98241->98281 98243 5e77c7 59 API calls 98243->98252 98246 62048e 98246->97959 98247 5ea1b7 98247->97959 98248 637405 59 API calls 98248->98252 98249 620e00 98287 64a0b5 89 API calls 4 library calls 98249->98287 98251 5ea6ba 98286 64a0b5 89 API calls 4 library calls 98251->98286 98252->98233 98252->98234 98252->98238 98252->98239 98252->98240 98252->98241 98252->98243 98252->98247 98252->98248 98252->98249 98252->98251 98279 5eca20 331 API calls 2 library calls 98252->98279 98280 5eba60 60 API calls Mailbox 98252->98280 98254 5e9c08 98253->98254 98255 61fbff 98253->98255 98259 600ff6 Mailbox 59 API calls 98254->98259 98256 61fc10 98255->98256 98257 5e7d2c 59 API calls 98255->98257 98258 5e7eec 59 API calls 98256->98258 98257->98256 98260 61fc1a 98258->98260 98261 5e9c1b 98259->98261 98263 5e9c34 98260->98263 98264 5e77c7 59 API calls 98260->98264 98261->98260 98262 5e9c26 98261->98262 98262->98263 98265 5e7f41 59 API calls 98262->98265 98263->97962 98264->98263 98265->98263 98267 600ff6 Mailbox 59 API calls 98266->98267 98268 5e7b9b 98267->98268 98269 5e8189 59 API calls 98268->98269 98270 5e7baa 98269->98270 98270->98209 98271->98209 98272->98209 98273->98208 98274->98209 98275->98209 98276->98219 98277->98221 98278->98208 98279->98252 98280->98252 98281->98246 98283 5e81ba 98282->98283 98284 5e81b2 98282->98284 98283->98247 98289 5e80d7 59 API calls 2 library calls 98284->98289 98286->98247 98287->98233 98288->98247 98289->98283 98336 5e5c4e 98290->98336 98293 5e5c4e 2 API calls 98294 5e5e74 98293->98294 98294->97987 98296 5e56dd 98295->98296 98297 5e5702 98295->98297 98296->98297 98301 5e56ec 98296->98301 98298 5e7eec 59 API calls 98297->98298 98302 64349a 98298->98302 98299 6434c9 98299->97998 98348 5e5c18 98301->98348 98302->98299 98346 643436 ReadFile SetFilePointerEx 98302->98346 98347 5e7a84 59 API calls 2 library calls 98302->98347 98309 6435d8 Mailbox 98309->97998 98310->97974 98312 5e5dcf CloseHandle 98311->98312 98313 5e5962 98312->98313 98390 5e5df9 98313->98390 98315 5e59a4 98315->97972 98315->97973 98330 5e5a1a CloseHandle 98315->98330 98316 5e5981 98316->98315 98398 5e5770 98316->98398 98318 5e5993 98415 5e53db SetFilePointerEx SetFilePointerEx 98318->98415 98320 5e599a 98320->98315 98321 61e030 98320->98321 98416 643696 SetFilePointerEx SetFilePointerEx WriteFile 98321->98416 98323 61e060 98323->98315 98324->98001 98326 5e5de8 98325->98326 98327 5e5dd9 98325->98327 98326->98327 98328 5e5ded CloseHandle 98326->98328 98327->98002 98329 5e5a1a CloseHandle 98327->98329 98328->98327 98329->98002 98330->97973 98331->97973 98332->97979 98333->97987 98334->97995 98335->98000 98343 5e5c68 98336->98343 98337 5e5cef SetFilePointerEx 98344 5e5dae SetFilePointerEx 98337->98344 98338 61e151 98345 5e5dae SetFilePointerEx 98338->98345 98341 61e16b 98342 5e5cc3 98342->98293 98343->98337 98343->98338 98343->98342 98344->98342 98345->98341 98346->98302 98347->98302 98349 600ff6 Mailbox 59 API calls 98348->98349 98350 5e5c2b 98349->98350 98351 600ff6 Mailbox 59 API calls 98350->98351 98352 5e5c37 98351->98352 98353 5e5632 98352->98353 98360 5e5a2f 98353->98360 98356 5e5674 98356->98309 98359 5e793a 61 API calls Mailbox 98356->98359 98358 5e5643 98358->98356 98367 5e5d20 98358->98367 98373 5e5bda 98358->98373 98359->98309 98361 61e065 98360->98361 98362 5e5a40 98360->98362 98382 636443 59 API calls Mailbox 98361->98382 98362->98358 98364 61e06f 98365 600ff6 Mailbox 59 API calls 98364->98365 98366 61e07b 98365->98366 98368 5e5d2e 98367->98368 98369 5e5d93 98367->98369 98370 5e5d56 98368->98370 98372 5e5d66 ReadFile 98368->98372 98383 5e5dae SetFilePointerEx 98369->98383 98370->98358 98372->98368 98372->98370 98374 5e5bee 98373->98374 98375 61e117 98373->98375 98384 5e5b19 98374->98384 98389 636443 59 API calls Mailbox 98375->98389 98378 61e122 98380 600ff6 Mailbox 59 API calls 98378->98380 98379 5e5bfa 98379->98358 98381 61e137 _memmove 98380->98381 98382->98364 98383->98368 98385 5e5b31 98384->98385 98388 5e5b2a _memmove 98384->98388 98386 600ff6 Mailbox 59 API calls 98385->98386 98387 61e0a7 98385->98387 98386->98388 98388->98379 98389->98378 98391 61e181 98390->98391 98392 5e5e12 CreateFileW 98390->98392 98393 5e5e34 98391->98393 98394 61e187 CreateFileW 98391->98394 98392->98393 98393->98316 98394->98393 98395 61e1ad 98394->98395 98396 5e5c4e 2 API calls 98395->98396 98397 61e1b8 98396->98397 98397->98393 98399 5e578b 98398->98399 98400 61dfce 98398->98400 98401 5e5c4e 2 API calls 98399->98401 98414 5e581a 98399->98414 98403 5e5e3f 2 API calls 98400->98403 98400->98414 98402 5e57ad 98401->98402 98404 5e538e 59 API calls 98402->98404 98403->98414 98405 5e57b7 98404->98405 98405->98400 98406 5e57c4 98405->98406 98407 600ff6 Mailbox 59 API calls 98406->98407 98408 5e57cf 98407->98408 98409 5e538e 59 API calls 98408->98409 98410 5e57da 98409->98410 98411 5e5d20 2 API calls 98410->98411 98412 5e5807 98411->98412 98413 5e5c4e 2 API calls 98412->98413 98413->98414 98414->98318 98415->98320 98416->98323 98417->98008 98419 5e77c7 59 API calls 98418->98419 98420 5e470f 98419->98420 98421 5e77c7 59 API calls 98420->98421 98422 5e4717 98421->98422 98423 5e77c7 59 API calls 98422->98423 98424 5e471f 98423->98424 98425 5e77c7 59 API calls 98424->98425 98426 5e4727 98425->98426 98427 5e475b 98426->98427 98428 61d8fb 98426->98428 98429 5e79ab 59 API calls 98427->98429 98430 5e81a7 59 API calls 98428->98430 98431 5e4769 98429->98431 98432 61d904 98430->98432 98433 5e7e8c 59 API calls 98431->98433 98434 5e7eec 59 API calls 98432->98434 98435 5e4773 98433->98435 98437 5e479e 98434->98437 98436 5e79ab 59 API calls 98435->98436 98435->98437 98440 5e4794 98436->98440 98438 5e47de 98437->98438 98441 5e47bd 98437->98441 98451 61d924 98437->98451 98439 5e79ab 59 API calls 98438->98439 98442 5e47ef 98439->98442 98443 5e7e8c 59 API calls 98440->98443 98486 5e7b52 98441->98486 98447 5e4801 98442->98447 98449 5e81a7 59 API calls 98442->98449 98443->98437 98444 61d9f4 98448 5e7d2c 59 API calls 98444->98448 98450 5e4811 98447->98450 98453 5e81a7 59 API calls 98447->98453 98464 61d9b1 98448->98464 98449->98447 98455 5e4818 98450->98455 98456 5e81a7 59 API calls 98450->98456 98451->98444 98454 61d9dd 98451->98454 98463 61d95b 98451->98463 98452 5e79ab 59 API calls 98452->98438 98453->98450 98454->98444 98460 61d9c8 98454->98460 98457 5e81a7 59 API calls 98455->98457 98466 5e481f Mailbox 98455->98466 98456->98455 98457->98466 98458 5e7b52 59 API calls 98458->98464 98459 61d9b9 98461 5e7d2c 59 API calls 98459->98461 98462 5e7d2c 59 API calls 98460->98462 98461->98464 98462->98464 98463->98459 98467 61d9a4 98463->98467 98464->98438 98464->98458 98489 5e7a84 59 API calls 2 library calls 98464->98489 98466->98025 98468 5e7d2c 59 API calls 98467->98468 98468->98464 98470 61f094 98469->98470 98471 5e7ca0 98469->98471 98496 638123 59 API calls _memmove 98470->98496 98490 5e7bb1 98471->98490 98474 5e7cac 98474->98034 98478 643e73 98474->98478 98475 61f09e 98476 5e81a7 59 API calls 98475->98476 98477 61f0a6 Mailbox 98476->98477 98497 644696 GetFileAttributesW 98478->98497 98481->98052 98482->98051 98483->98013 98484->98033 98485->98033 98487 5e7faf 59 API calls 98486->98487 98488 5e47c7 98487->98488 98488->98438 98488->98452 98489->98464 98491 5e7bbf 98490->98491 98492 5e7be5 _memmove 98490->98492 98491->98492 98493 600ff6 Mailbox 59 API calls 98491->98493 98492->98474 98494 5e7c34 98493->98494 98495 600ff6 Mailbox 59 API calls 98494->98495 98495->98492 98496->98475 98498 643e7a 98497->98498 98499 6446b1 FindFirstFileW 98497->98499 98498->98034 98498->98044 98499->98498 98500 6446c6 FindClose 98499->98500 98500->98498 98502 63665e 98501->98502 98503 636641 98501->98503 98502->98058 98503->98502 98505 636621 59 API calls Mailbox 98503->98505 98505->98503 98506 61ff06 98507 61ff10 98506->98507 98539 5eac90 Mailbox _memmove 98506->98539 98646 5e8e34 59 API calls Mailbox 98507->98646 98511 5eb685 98651 64a0b5 89 API calls 4 library calls 98511->98651 98512 600ff6 59 API calls Mailbox 98532 5ea097 Mailbox 98512->98532 98514 5eb5d5 98520 5e81a7 59 API calls 98514->98520 98517 62047f 98650 64a0b5 89 API calls 4 library calls 98517->98650 98518 5eb5da 98656 64a0b5 89 API calls 4 library calls 98518->98656 98528 5ea1b7 98520->98528 98521 5e77c7 59 API calls 98521->98532 98523 5e81a7 59 API calls 98523->98532 98524 5e7f41 59 API calls 98524->98539 98526 62048e 98527 602f80 67 API calls __cinit 98527->98532 98530 637405 59 API calls 98530->98532 98531 620c86 98531->98528 98533 6366f4 Mailbox 59 API calls 98531->98533 98532->98512 98532->98514 98532->98517 98532->98518 98532->98521 98532->98523 98532->98527 98532->98528 98532->98530 98534 620e00 98532->98534 98537 5ea6ba 98532->98537 98640 5eca20 331 API calls 2 library calls 98532->98640 98641 5eba60 60 API calls Mailbox 98532->98641 98533->98528 98655 64a0b5 89 API calls 4 library calls 98534->98655 98654 64a0b5 89 API calls 4 library calls 98537->98654 98538 6366f4 Mailbox 59 API calls 98538->98539 98539->98511 98539->98524 98539->98528 98539->98532 98539->98538 98540 5ea000 331 API calls 98539->98540 98542 620c94 98539->98542 98544 620ca2 98539->98544 98546 5eb37c 98539->98546 98548 600ff6 59 API calls Mailbox 98539->98548 98552 5eb416 98539->98552 98555 5eade2 Mailbox 98539->98555 98562 65c5f4 98539->98562 98594 647be0 98539->98594 98600 65bf80 98539->98600 98647 637405 59 API calls 98539->98647 98648 65c4a7 85 API calls 2 library calls 98539->98648 98540->98539 98652 5e9df0 59 API calls Mailbox 98542->98652 98653 64a0b5 89 API calls 4 library calls 98544->98653 98643 5e9e9c 60 API calls Mailbox 98546->98643 98548->98539 98549 5eb38d 98644 5e9e9c 60 API calls Mailbox 98549->98644 98645 5ef803 331 API calls 98552->98645 98555->98511 98555->98528 98555->98531 98556 6200e0 VariantClear 98555->98556 98557 64d2e6 101 API calls 98555->98557 98558 65e237 130 API calls 98555->98558 98559 65474d 331 API calls 98555->98559 98560 5f2123 95 API calls 98555->98560 98561 65e24b 130 API calls 98555->98561 98642 5e9df0 59 API calls Mailbox 98555->98642 98649 637405 59 API calls 98555->98649 98556->98555 98557->98555 98558->98555 98559->98555 98560->98555 98561->98555 98563 5e77c7 59 API calls 98562->98563 98564 65c608 98563->98564 98565 5e77c7 59 API calls 98564->98565 98566 65c610 98565->98566 98567 5e77c7 59 API calls 98566->98567 98568 65c618 98567->98568 98569 5e9997 84 API calls 98568->98569 98589 65c626 98569->98589 98570 5e7d2c 59 API calls 98570->98589 98571 65c80f 98572 65c83c Mailbox 98571->98572 98670 5e9b9c 59 API calls Mailbox 98571->98670 98572->98539 98573 65c7f6 98575 5e7e0b 59 API calls 98573->98575 98577 65c803 98575->98577 98576 65c811 98579 5e7e0b 59 API calls 98576->98579 98581 5e7c8e 59 API calls 98577->98581 98578 5e7a84 59 API calls 98578->98589 98582 65c820 98579->98582 98580 5e81a7 59 API calls 98580->98589 98581->98571 98584 5e7c8e 59 API calls 98582->98584 98583 5e7faf 59 API calls 98586 65c6bd CharUpperBuffW 98583->98586 98584->98571 98585 5e7faf 59 API calls 98588 65c77d CharUpperBuffW 98585->98588 98657 5e859a 68 API calls 98586->98657 98658 5ec707 98588->98658 98589->98570 98589->98571 98589->98572 98589->98573 98589->98576 98589->98578 98589->98580 98589->98583 98589->98585 98591 5e9997 84 API calls 98589->98591 98592 5e7e0b 59 API calls 98589->98592 98593 5e7c8e 59 API calls 98589->98593 98591->98589 98592->98589 98593->98589 98595 647bec 98594->98595 98596 600ff6 Mailbox 59 API calls 98595->98596 98597 647bfa 98596->98597 98598 647c08 98597->98598 98599 5e77c7 59 API calls 98597->98599 98598->98539 98599->98598 98601 65bfc5 98600->98601 98602 65bfab 98600->98602 98674 65a528 59 API calls Mailbox 98601->98674 98673 64a0b5 89 API calls 4 library calls 98602->98673 98605 65bfd0 98606 5ea000 330 API calls 98605->98606 98607 65c031 98606->98607 98608 65c0c3 98607->98608 98612 65c072 98607->98612 98633 65bfbd Mailbox 98607->98633 98609 65c119 98608->98609 98610 65c0c9 98608->98610 98611 5e9997 84 API calls 98609->98611 98609->98633 98695 647ba4 59 API calls 98610->98695 98613 65c12b 98611->98613 98675 647581 59 API calls Mailbox 98612->98675 98615 5e7faf 59 API calls 98613->98615 98618 65c14f CharUpperBuffW 98615->98618 98616 65c0ec 98696 5e5ea1 59 API calls Mailbox 98616->98696 98623 65c169 98618->98623 98620 65c0a2 98676 5ef5c0 98620->98676 98621 65c0f4 Mailbox 98697 5efe40 331 API calls 2 library calls 98621->98697 98624 65c170 98623->98624 98625 65c1bc 98623->98625 98698 647581 59 API calls Mailbox 98624->98698 98626 5e9997 84 API calls 98625->98626 98628 65c1c4 98626->98628 98699 5e9fbd 60 API calls 98628->98699 98631 65c19e 98632 5ef5c0 330 API calls 98631->98632 98632->98633 98633->98539 98634 65c1ce 98634->98633 98635 5e9997 84 API calls 98634->98635 98636 65c1e9 98635->98636 98700 5e5ea1 59 API calls Mailbox 98636->98700 98638 65c1f9 98701 5efe40 331 API calls 2 library calls 98638->98701 98640->98532 98641->98532 98642->98555 98643->98549 98644->98552 98645->98511 98646->98539 98647->98539 98648->98539 98649->98555 98650->98526 98651->98531 98652->98531 98653->98531 98654->98528 98655->98518 98656->98528 98657->98589 98659 5e7b76 59 API calls 98658->98659 98660 5ec72c _wcscmp 98658->98660 98659->98660 98661 5e7f41 59 API calls 98660->98661 98662 5ec760 Mailbox 98660->98662 98663 621abb 98661->98663 98662->98589 98662->98662 98664 5e7c8e 59 API calls 98663->98664 98665 621ac6 98664->98665 98671 5e859a 68 API calls 98665->98671 98667 621ad7 98669 621adb Mailbox 98667->98669 98672 5e9e9c 60 API calls Mailbox 98667->98672 98669->98589 98670->98572 98671->98667 98672->98669 98673->98633 98674->98605 98675->98620 98677 5ef61a 98676->98677 98678 5ef7b0 98676->98678 98680 5ef626 98677->98680 98681 624848 98677->98681 98679 5e7f41 59 API calls 98678->98679 98687 5ef6ec Mailbox 98679->98687 98702 5ef3f0 98680->98702 98682 65bf80 331 API calls 98681->98682 98684 624856 98682->98684 98688 5ef790 98684->98688 98804 64a0b5 89 API calls 4 library calls 98684->98804 98686 5ef65d 98686->98684 98686->98687 98686->98688 98693 643e73 3 API calls 98687->98693 98694 65474d 331 API calls 98687->98694 98717 5e4faa 98687->98717 98723 64cde5 98687->98723 98688->98633 98690 5ef743 98690->98688 98803 5e9df0 59 API calls Mailbox 98690->98803 98693->98690 98694->98690 98695->98616 98696->98621 98697->98633 98698->98631 98699->98634 98700->98638 98701->98633 98703 5ef59a 98702->98703 98706 5ef41c 98702->98706 98806 64a0b5 89 API calls 4 library calls 98703->98806 98705 6247d3 98705->98686 98706->98703 98714 5ef459 _memmove 98706->98714 98707 5ef533 98710 5ef543 98707->98710 98805 65a5ee 85 API calls Mailbox 98707->98805 98709 600ff6 59 API calls Mailbox 98709->98714 98710->98686 98711 624823 98808 5ef803 331 API calls 98711->98808 98712 5ea000 331 API calls 98712->98714 98714->98705 98714->98707 98714->98709 98714->98711 98714->98712 98715 6247d5 98714->98715 98807 64a0b5 89 API calls 4 library calls 98715->98807 98718 5e4fb4 98717->98718 98722 5e4fbb 98717->98722 98809 6055d6 98718->98809 98720 5e4fca 98720->98690 98721 5e4fdb FreeLibrary 98721->98720 98722->98720 98722->98721 98724 5e77c7 59 API calls 98723->98724 98725 64ce1a 98724->98725 98726 5e77c7 59 API calls 98725->98726 98727 64ce23 98726->98727 98728 64ce37 98727->98728 99216 5e9c9c 59 API calls 98727->99216 98730 5e9997 84 API calls 98728->98730 98731 64ce54 98730->98731 98732 64cf55 98731->98732 98733 64ce76 98731->98733 98739 64cf85 Mailbox 98731->98739 99083 5e4f3d 98732->99083 98734 5e9997 84 API calls 98733->98734 98736 64ce82 98734->98736 98740 5e81a7 59 API calls 98736->98740 98738 64cf81 98738->98739 98742 5e77c7 59 API calls 98738->98742 98739->98690 98743 64ce8e 98740->98743 98741 5e4f3d 136 API calls 98741->98738 98744 64cfb6 98742->98744 98746 64ced4 98743->98746 98747 64cea2 98743->98747 98745 5e77c7 59 API calls 98744->98745 98748 64cfbf 98745->98748 98750 5e9997 84 API calls 98746->98750 98749 5e81a7 59 API calls 98747->98749 98751 5e77c7 59 API calls 98748->98751 98752 64ceb2 98749->98752 98753 64cee1 98750->98753 98754 64cfc8 98751->98754 98755 5e7e0b 59 API calls 98752->98755 98756 5e81a7 59 API calls 98753->98756 98757 5e77c7 59 API calls 98754->98757 98759 64cebc 98755->98759 98760 64ceed 98756->98760 98758 64cfd1 98757->98758 98761 5e9997 84 API calls 98758->98761 98762 5e9997 84 API calls 98759->98762 99217 644cd3 GetFileAttributesW 98760->99217 98765 64cfde 98761->98765 98766 64cec8 98762->98766 98764 64cef6 98767 64cf09 98764->98767 98770 5e7b52 59 API calls 98764->98770 98768 5e46f9 59 API calls 98765->98768 98769 5e7c8e 59 API calls 98766->98769 98772 5e9997 84 API calls 98767->98772 98775 64cf0f 98767->98775 98771 64cff9 98768->98771 98769->98746 98770->98767 98773 5e7b52 59 API calls 98771->98773 98774 64cf36 98772->98774 98778 64d008 98773->98778 99218 643a2b 75 API calls Mailbox 98774->99218 98775->98739 98777 64d03c 98780 5e81a7 59 API calls 98777->98780 98778->98777 98779 5e7b52 59 API calls 98778->98779 98782 64d019 98779->98782 98781 64d04a 98780->98781 98783 5e7c8e 59 API calls 98781->98783 98782->98777 98785 5e7d2c 59 API calls 98782->98785 98784 64d058 98783->98784 98786 5e7c8e 59 API calls 98784->98786 98787 64d02e 98785->98787 98788 64d066 98786->98788 98789 5e7d2c 59 API calls 98787->98789 98790 5e7c8e 59 API calls 98788->98790 98789->98777 98791 64d074 98790->98791 98792 5e9997 84 API calls 98791->98792 98793 64d080 98792->98793 99107 6442ad 98793->99107 98795 64d091 98796 643e73 3 API calls 98795->98796 98797 64d09b 98796->98797 98798 5e9997 84 API calls 98797->98798 98801 64d0cc 98797->98801 98799 64d0b9 98798->98799 99161 6493df 98799->99161 98802 5e4faa 84 API calls 98801->98802 98802->98739 98803->98690 98804->98688 98805->98710 98806->98705 98807->98705 98808->98705 98810 6055e2 _raise 98809->98810 98811 6055f6 98810->98811 98812 60560e 98810->98812 98844 608d68 58 API calls __getptd_noexit 98811->98844 98818 605606 _raise 98812->98818 98822 606e4e 98812->98822 98815 6055fb 98845 608ff6 9 API calls __wsplitpath_helper 98815->98845 98818->98722 98823 606e80 EnterCriticalSection 98822->98823 98824 606e5e 98822->98824 98826 605620 98823->98826 98824->98823 98825 606e66 98824->98825 98827 609e4b __lock 58 API calls 98825->98827 98828 60556a 98826->98828 98827->98826 98829 605579 98828->98829 98830 60558d 98828->98830 98890 608d68 58 API calls __getptd_noexit 98829->98890 98832 605589 98830->98832 98847 604c6d 98830->98847 98846 605645 LeaveCriticalSection LeaveCriticalSection _fprintf 98832->98846 98833 60557e 98891 608ff6 9 API calls __wsplitpath_helper 98833->98891 98840 6055a7 98864 610c52 98840->98864 98842 6055ad 98842->98832 98843 602f95 _free 58 API calls 98842->98843 98843->98832 98844->98815 98845->98818 98846->98818 98848 604ca4 98847->98848 98849 604c80 98847->98849 98853 610dc7 98848->98853 98849->98848 98850 604916 __fclose_nolock 58 API calls 98849->98850 98851 604c9d 98850->98851 98892 60dac6 98851->98892 98854 610dd4 98853->98854 98856 6055a1 98853->98856 98855 602f95 _free 58 API calls 98854->98855 98854->98856 98855->98856 98857 604916 98856->98857 98858 604920 98857->98858 98859 604935 98857->98859 99038 608d68 58 API calls __getptd_noexit 98858->99038 98859->98840 98861 604925 99039 608ff6 9 API calls __wsplitpath_helper 98861->99039 98863 604930 98863->98840 98865 610c5e _raise 98864->98865 98866 610c82 98865->98866 98867 610c6b 98865->98867 98869 610d0d 98866->98869 98872 610c92 98866->98872 99055 608d34 58 API calls __getptd_noexit 98867->99055 99060 608d34 58 API calls __getptd_noexit 98869->99060 98871 610c70 99056 608d68 58 API calls __getptd_noexit 98871->99056 98873 610cb0 98872->98873 98874 610cba 98872->98874 99057 608d34 58 API calls __getptd_noexit 98873->99057 98878 60d446 ___lock_fhandle 59 API calls 98874->98878 98875 610cb5 99061 608d68 58 API calls __getptd_noexit 98875->99061 98880 610cc0 98878->98880 98882 610cd3 98880->98882 98883 610cde 98880->98883 98881 610d19 99062 608ff6 9 API calls __wsplitpath_helper 98881->99062 99040 610d2d 98882->99040 99058 608d68 58 API calls __getptd_noexit 98883->99058 98886 610c77 _raise 98886->98842 98888 610cd9 99059 610d05 LeaveCriticalSection __unlock_fhandle 98888->99059 98890->98833 98891->98832 98893 60dad2 _raise 98892->98893 98894 60daf6 98893->98894 98895 60dadf 98893->98895 98897 60db95 98894->98897 98899 60db0a 98894->98899 98993 608d34 58 API calls __getptd_noexit 98895->98993 98999 608d34 58 API calls __getptd_noexit 98897->98999 98898 60dae4 98994 608d68 58 API calls __getptd_noexit 98898->98994 98902 60db32 98899->98902 98903 60db28 98899->98903 98920 60d446 98902->98920 98995 608d34 58 API calls __getptd_noexit 98903->98995 98904 60db2d 99000 608d68 58 API calls __getptd_noexit 98904->99000 98907 60db38 98909 60db4b 98907->98909 98910 60db5e 98907->98910 98929 60dbb5 98909->98929 98996 608d68 58 API calls __getptd_noexit 98910->98996 98911 60dba1 99001 608ff6 9 API calls __wsplitpath_helper 98911->99001 98915 60daeb _raise 98915->98848 98916 60db57 98998 60db8d LeaveCriticalSection __unlock_fhandle 98916->98998 98917 60db63 98997 608d34 58 API calls __getptd_noexit 98917->98997 98921 60d452 _raise 98920->98921 98922 60d4a1 EnterCriticalSection 98921->98922 98924 609e4b __lock 58 API calls 98921->98924 98923 60d4c7 _raise 98922->98923 98923->98907 98925 60d477 98924->98925 98926 60d48f 98925->98926 99002 60a06b InitializeCriticalSectionAndSpinCount 98925->99002 99003 60d4cb LeaveCriticalSection _doexit 98926->99003 98930 60dbc2 __ftell_nolock 98929->98930 98931 60dc20 98930->98931 98932 60dc01 98930->98932 98960 60dbf6 98930->98960 98937 60dc78 98931->98937 98938 60dc5c 98931->98938 99013 608d34 58 API calls __getptd_noexit 98932->99013 98935 60e416 98935->98916 98936 60dc06 99014 608d68 58 API calls __getptd_noexit 98936->99014 98940 60dc91 98937->98940 99019 611b11 60 API calls 3 library calls 98937->99019 99016 608d34 58 API calls __getptd_noexit 98938->99016 99004 615ebb 98940->99004 98942 60dc0d 99015 608ff6 9 API calls __wsplitpath_helper 98942->99015 98945 60dc61 99017 608d68 58 API calls __getptd_noexit 98945->99017 98947 60dc9f 98950 60dff8 98947->98950 99020 609bec 58 API calls 2 library calls 98947->99020 98949 60dc68 99018 608ff6 9 API calls __wsplitpath_helper 98949->99018 98952 60e016 98950->98952 98953 60e38b WriteFile 98950->98953 98955 60e13a 98952->98955 98956 60e02c 98952->98956 98957 60dfeb GetLastError 98953->98957 98959 60dfb8 98953->98959 98970 60e22f 98955->98970 98977 60e145 98955->98977 98963 60e09b WriteFile 98956->98963 98967 60e3c4 98956->98967 98957->98959 98958 60dccb GetConsoleMode 98958->98950 98961 60dd0a 98958->98961 98959->98960 98959->98967 98968 60e118 98959->98968 99027 60c836 98960->99027 98961->98950 98962 60dd1a GetConsoleCP 98961->98962 98962->98967 98990 60dd49 98962->98990 98963->98957 98965 60e0d8 98963->98965 98965->98956 98971 60e0fc 98965->98971 98966 60e3f2 99026 608d34 58 API calls __getptd_noexit 98966->99026 98967->98960 99025 608d68 58 API calls __getptd_noexit 98967->99025 98974 60e123 98968->98974 98975 60e3bb 98968->98975 98969 60e2a4 WideCharToMultiByte 98969->98957 98985 60e2eb 98969->98985 98970->98967 98970->98969 98971->98959 98972 60e1aa WriteFile 98972->98957 98978 60e1f9 98972->98978 99022 608d68 58 API calls __getptd_noexit 98974->99022 99024 608d47 58 API calls 3 library calls 98975->99024 98977->98967 98977->98972 98978->98959 98978->98971 98978->98977 98980 60e2f3 WriteFile 98984 60e346 GetLastError 98980->98984 98980->98985 98981 60e128 99023 608d34 58 API calls __getptd_noexit 98981->99023 98984->98985 98985->98959 98985->98970 98985->98971 98985->98980 98986 617cae WriteConsoleW CreateFileW __putwch_nolock 98991 60de9f 98986->98991 98987 60de32 WideCharToMultiByte 98987->98959 98989 60de6d WriteFile 98987->98989 98988 61650a 60 API calls __write_nolock 98988->98990 98989->98957 98989->98991 98990->98959 98990->98987 98990->98988 98990->98991 99021 603835 58 API calls __isleadbyte_l 98990->99021 98991->98957 98991->98959 98991->98986 98991->98990 98992 60dec7 WriteFile 98991->98992 98992->98957 98992->98991 98993->98898 98994->98915 98995->98904 98996->98917 98997->98916 98998->98915 98999->98904 99000->98911 99001->98915 99002->98926 99003->98922 99005 615ed3 99004->99005 99006 615ec6 99004->99006 99009 615edf 99005->99009 99035 608d68 58 API calls __getptd_noexit 99005->99035 99034 608d68 58 API calls __getptd_noexit 99006->99034 99008 615ecb 99008->98947 99009->98947 99011 615f00 99036 608ff6 9 API calls __wsplitpath_helper 99011->99036 99013->98936 99014->98942 99015->98960 99016->98945 99017->98949 99018->98960 99019->98940 99020->98958 99021->98990 99022->98981 99023->98960 99024->98960 99025->98966 99026->98960 99028 60c840 IsProcessorFeaturePresent 99027->99028 99029 60c83e 99027->99029 99031 615b5a 99028->99031 99029->98935 99037 615b09 5 API calls 2 library calls 99031->99037 99033 615c3d 99033->98935 99034->99008 99035->99011 99036->99008 99037->99033 99038->98861 99039->98863 99063 60d703 99040->99063 99042 610d3b 99043 610d91 99042->99043 99044 610d6f 99042->99044 99047 60d703 __chsize_nolock 58 API calls 99042->99047 99076 60d67d 59 API calls 2 library calls 99043->99076 99044->99043 99048 60d703 __chsize_nolock 58 API calls 99044->99048 99046 610d99 99049 610dbb 99046->99049 99077 608d47 58 API calls 3 library calls 99046->99077 99050 610d66 99047->99050 99051 610d7b FindCloseChangeNotification 99048->99051 99049->98888 99053 60d703 __chsize_nolock 58 API calls 99050->99053 99051->99043 99054 610d87 GetLastError 99051->99054 99053->99044 99054->99043 99055->98871 99056->98886 99057->98875 99058->98888 99059->98886 99060->98875 99061->98881 99062->98886 99064 60d723 99063->99064 99065 60d70e 99063->99065 99071 60d748 99064->99071 99080 608d34 58 API calls __getptd_noexit 99064->99080 99078 608d34 58 API calls __getptd_noexit 99065->99078 99068 60d713 99079 608d68 58 API calls __getptd_noexit 99068->99079 99069 60d752 99081 608d68 58 API calls __getptd_noexit 99069->99081 99071->99042 99073 60d71b 99073->99042 99074 60d75a 99082 608ff6 9 API calls __wsplitpath_helper 99074->99082 99076->99046 99077->99049 99078->99068 99079->99073 99080->99069 99081->99074 99082->99073 99219 5e4d13 99083->99219 99088 5e4f68 LoadLibraryExW 99229 5e4cc8 99088->99229 99089 61dd0f 99090 5e4faa 84 API calls 99089->99090 99092 61dd16 99090->99092 99094 5e4cc8 3 API calls 99092->99094 99096 61dd1e 99094->99096 99255 5e506b 99096->99255 99097 5e4f8f 99097->99096 99098 5e4f9b 99097->99098 99100 5e4faa 84 API calls 99098->99100 99102 5e4fa0 99100->99102 99102->98738 99102->98741 99104 61dd45 99261 5e5027 99104->99261 99108 6442c9 99107->99108 99109 6442dc 99108->99109 99110 6442ce 99108->99110 99112 5e77c7 59 API calls 99109->99112 99111 5e81a7 59 API calls 99110->99111 99113 6442d7 Mailbox 99111->99113 99114 6442e4 99112->99114 99113->98795 99115 5e77c7 59 API calls 99114->99115 99116 6442ec 99115->99116 99117 5e77c7 59 API calls 99116->99117 99118 6442f7 99117->99118 99119 5e77c7 59 API calls 99118->99119 99120 6442ff 99119->99120 99121 5e77c7 59 API calls 99120->99121 99122 644307 99121->99122 99123 5e77c7 59 API calls 99122->99123 99124 64430f 99123->99124 99125 5e77c7 59 API calls 99124->99125 99162 6493ec __ftell_nolock 99161->99162 99163 600ff6 Mailbox 59 API calls 99162->99163 99164 649449 99163->99164 99165 5e538e 59 API calls 99164->99165 99216->98728 99217->98764 99218->98775 99266 5e4d61 99219->99266 99222 5e4d3a 99224 5e4d4a FreeLibrary 99222->99224 99225 5e4d53 99222->99225 99223 5e4d61 2 API calls 99223->99222 99224->99225 99226 60548b 99225->99226 99270 6054a0 99226->99270 99228 5e4f5c 99228->99088 99228->99089 99427 5e4d94 99229->99427 99232 5e4ced 99233 5e4cff FreeLibrary 99232->99233 99234 5e4d08 99232->99234 99233->99234 99236 5e4dd0 99234->99236 99235 5e4d94 2 API calls 99235->99232 99237 600ff6 Mailbox 59 API calls 99236->99237 99238 5e4de5 99237->99238 99239 5e538e 59 API calls 99238->99239 99240 5e4df1 _memmove 99239->99240 99241 5e4e2c 99240->99241 99243 5e4ee9 99240->99243 99244 5e4f21 99240->99244 99242 5e5027 69 API calls 99241->99242 99250 5e4e35 99242->99250 99431 5e4fe9 CreateStreamOnHGlobal 99243->99431 99442 649ba5 95 API calls 99244->99442 99247 5e506b 74 API calls 99247->99250 99249 5e4ec9 99249->99097 99250->99247 99250->99249 99251 61dcd0 99250->99251 99437 5e5045 99250->99437 99252 5e5045 85 API calls 99251->99252 99253 61dce4 99252->99253 99254 5e506b 74 API calls 99253->99254 99254->99249 99256 5e507d 99255->99256 99257 61ddf6 99255->99257 99460 605812 99256->99460 99260 649393 GetSystemTimeAsFileTime 99260->99104 99262 61ddb9 99261->99262 99263 5e5036 99261->99263 99641 605e90 99263->99641 99265 5e503e 99267 5e4d2e 99266->99267 99268 5e4d6a LoadLibraryA 99266->99268 99267->99222 99267->99223 99268->99267 99269 5e4d7b GetProcAddress 99268->99269 99269->99267 99271 6054ac _raise 99270->99271 99272 6054bf 99271->99272 99275 6054f0 99271->99275 99319 608d68 58 API calls __getptd_noexit 99272->99319 99274 6054c4 99320 608ff6 9 API calls __wsplitpath_helper 99274->99320 99289 610738 99275->99289 99278 6054f5 99279 60550b 99278->99279 99280 6054fe 99278->99280 99281 605535 99279->99281 99282 605515 99279->99282 99321 608d68 58 API calls __getptd_noexit 99280->99321 99304 610857 99281->99304 99322 608d68 58 API calls __getptd_noexit 99282->99322 99286 6054cf _raise @_EH4_CallFilterFunc@8 99286->99228 99290 610744 _raise 99289->99290 99291 609e4b __lock 58 API calls 99290->99291 99302 610752 99291->99302 99292 6107c6 99324 61084e 99292->99324 99293 6107cd 99294 608a5d __malloc_crt 58 API calls 99293->99294 99296 6107d4 99294->99296 99296->99292 99329 60a06b InitializeCriticalSectionAndSpinCount 99296->99329 99297 610843 _raise 99297->99278 99299 609ed3 __mtinitlocknum 58 API calls 99299->99302 99301 6107fa EnterCriticalSection 99301->99292 99302->99292 99302->99293 99302->99299 99327 606e8d 59 API calls __lock 99302->99327 99328 606ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99302->99328 99313 610877 __wopenfile 99304->99313 99305 610891 99334 608d68 58 API calls __getptd_noexit 99305->99334 99307 610a4c 99307->99305 99311 610aaf 99307->99311 99308 610896 99335 608ff6 9 API calls __wsplitpath_helper 99308->99335 99310 605540 99323 605562 LeaveCriticalSection LeaveCriticalSection _fprintf 99310->99323 99331 6187f1 99311->99331 99313->99305 99313->99307 99313->99313 99336 603a0b 60 API calls 2 library calls 99313->99336 99315 610a45 99315->99307 99337 603a0b 60 API calls 2 library calls 99315->99337 99317 610a64 99317->99307 99338 603a0b 60 API calls 2 library calls 99317->99338 99319->99274 99320->99286 99321->99286 99322->99286 99323->99286 99330 609fb5 LeaveCriticalSection 99324->99330 99326 610855 99326->99297 99327->99302 99328->99302 99329->99301 99330->99326 99339 617fd5 99331->99339 99333 61880a 99333->99310 99334->99308 99335->99310 99336->99315 99337->99317 99338->99307 99342 617fe1 _raise 99339->99342 99340 617ff7 99424 608d68 58 API calls __getptd_noexit 99340->99424 99342->99340 99343 61802d 99342->99343 99350 61809e 99343->99350 99344 617ffc 99425 608ff6 9 API calls __wsplitpath_helper 99344->99425 99347 618049 99426 618072 LeaveCriticalSection __unlock_fhandle 99347->99426 99349 618006 _raise 99349->99333 99351 6180be 99350->99351 99352 60471a __wsopen_nolock 58 API calls 99351->99352 99356 6180da 99352->99356 99353 618211 99354 609006 __invoke_watson 8 API calls 99353->99354 99355 6187f0 99354->99355 99357 617fd5 __wsopen_helper 103 API calls 99355->99357 99356->99353 99358 618114 99356->99358 99365 618137 99356->99365 99359 61880a 99357->99359 99360 608d34 __chsize_nolock 58 API calls 99358->99360 99359->99347 99361 618119 99360->99361 99362 608d68 __wsplitpath_helper 58 API calls 99361->99362 99363 618126 99362->99363 99366 608ff6 __wsplitpath_helper 9 API calls 99363->99366 99364 6181f5 99367 608d34 __chsize_nolock 58 API calls 99364->99367 99365->99364 99373 6181d3 99365->99373 99368 618130 99366->99368 99369 6181fa 99367->99369 99368->99347 99370 608d68 __wsplitpath_helper 58 API calls 99369->99370 99371 618207 99370->99371 99372 608ff6 __wsplitpath_helper 9 API calls 99371->99372 99372->99353 99374 60d4d4 __alloc_osfhnd 61 API calls 99373->99374 99375 6182a1 99374->99375 99376 6182ab 99375->99376 99377 6182ce 99375->99377 99379 608d34 __chsize_nolock 58 API calls 99376->99379 99378 617f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99377->99378 99389 6182f0 99378->99389 99380 6182b0 99379->99380 99381 608d68 __wsplitpath_helper 58 API calls 99380->99381 99383 6182ba 99381->99383 99382 61836e GetFileType 99384 618379 GetLastError 99382->99384 99385 6183bb 99382->99385 99387 608d68 __wsplitpath_helper 58 API calls 99383->99387 99388 608d47 __dosmaperr 58 API calls 99384->99388 99396 60d76a __set_osfhnd 59 API calls 99385->99396 99386 61833c GetLastError 99390 608d47 __dosmaperr 58 API calls 99386->99390 99387->99368 99391 6183a0 CloseHandle 99388->99391 99389->99382 99389->99386 99392 617f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99389->99392 99393 618361 99390->99393 99391->99393 99394 6183ae 99391->99394 99395 618331 99392->99395 99397 608d68 __wsplitpath_helper 58 API calls 99393->99397 99398 608d68 __wsplitpath_helper 58 API calls 99394->99398 99395->99382 99395->99386 99401 6183d9 99396->99401 99397->99353 99399 6183b3 99398->99399 99399->99393 99400 618594 99400->99353 99403 618767 CloseHandle 99400->99403 99401->99400 99402 611b11 __lseeki64_nolock 60 API calls 99401->99402 99418 61845a 99401->99418 99404 618443 99402->99404 99405 617f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99403->99405 99407 608d34 __chsize_nolock 58 API calls 99404->99407 99404->99418 99406 61878e 99405->99406 99408 618796 GetLastError 99406->99408 99409 6187c2 99406->99409 99407->99418 99410 608d47 __dosmaperr 58 API calls 99408->99410 99409->99353 99412 6187a2 99410->99412 99411 61848c 99415 6199f2 __chsize_nolock 82 API calls 99411->99415 99411->99418 99416 60d67d __free_osfhnd 59 API calls 99412->99416 99413 610d2d __close_nolock 61 API calls 99413->99418 99414 6110ab 70 API calls __read_nolock 99414->99418 99415->99411 99416->99409 99417 60dac6 __write 78 API calls 99417->99418 99418->99400 99418->99411 99418->99413 99418->99414 99418->99417 99419 618611 99418->99419 99422 611b11 60 API calls __lseeki64_nolock 99418->99422 99420 610d2d __close_nolock 61 API calls 99419->99420 99421 618618 99420->99421 99423 608d68 __wsplitpath_helper 58 API calls 99421->99423 99422->99418 99423->99353 99424->99344 99425->99349 99426->99349 99428 5e4ce1 99427->99428 99429 5e4d9d LoadLibraryA 99427->99429 99428->99232 99428->99235 99429->99428 99430 5e4dae GetProcAddress 99429->99430 99430->99428 99432 5e5003 FindResourceExW 99431->99432 99436 5e5020 99431->99436 99433 61dd5c LoadResource 99432->99433 99432->99436 99434 61dd71 SizeofResource 99433->99434 99433->99436 99435 61dd85 LockResource 99434->99435 99434->99436 99435->99436 99436->99241 99438 61ddd4 99437->99438 99439 5e5054 99437->99439 99443 605a7d 99439->99443 99441 5e5062 99441->99250 99442->99241 99444 605a89 _raise 99443->99444 99445 605a9b 99444->99445 99447 605ac1 99444->99447 99456 608d68 58 API calls __getptd_noexit 99445->99456 99449 606e4e __lock_file 59 API calls 99447->99449 99448 605aa0 99457 608ff6 9 API calls __wsplitpath_helper 99448->99457 99450 605ac7 99449->99450 99458 6059ee 83 API calls 5 library calls 99450->99458 99453 605ad6 99459 605af8 LeaveCriticalSection LeaveCriticalSection _fprintf 99453->99459 99455 605aab _raise 99455->99441 99456->99448 99457->99455 99458->99453 99459->99455 99463 60582d 99460->99463 99462 5e508e 99462->99260 99464 605839 _raise 99463->99464 99465 60587c 99464->99465 99466 60584f _memset 99464->99466 99467 605874 _raise 99464->99467 99468 606e4e __lock_file 59 API calls 99465->99468 99490 608d68 58 API calls __getptd_noexit 99466->99490 99467->99462 99470 605882 99468->99470 99476 60564d 99470->99476 99471 605869 99491 608ff6 9 API calls __wsplitpath_helper 99471->99491 99477 605683 99476->99477 99480 605668 _memset 99476->99480 99492 6058b6 LeaveCriticalSection LeaveCriticalSection _fprintf 99477->99492 99478 605673 99581 608d68 58 API calls __getptd_noexit 99478->99581 99480->99477 99480->99478 99482 6056c3 99480->99482 99482->99477 99484 6057d4 _memset 99482->99484 99486 604916 __fclose_nolock 58 API calls 99482->99486 99493 6110ab 99482->99493 99561 610df7 99482->99561 99583 610f18 58 API calls 3 library calls 99482->99583 99584 608d68 58 API calls __getptd_noexit 99484->99584 99486->99482 99489 605678 99582 608ff6 9 API calls __wsplitpath_helper 99489->99582 99490->99471 99491->99467 99492->99467 99494 6110e3 99493->99494 99495 6110cc 99493->99495 99497 61181b 99494->99497 99501 61111d 99494->99501 99585 608d34 58 API calls __getptd_noexit 99495->99585 99600 608d34 58 API calls __getptd_noexit 99497->99600 99498 6110d1 99586 608d68 58 API calls __getptd_noexit 99498->99586 99503 611125 99501->99503 99510 61113c 99501->99510 99502 611820 99601 608d68 58 API calls __getptd_noexit 99502->99601 99587 608d34 58 API calls __getptd_noexit 99503->99587 99506 611131 99602 608ff6 9 API calls __wsplitpath_helper 99506->99602 99507 61112a 99588 608d68 58 API calls __getptd_noexit 99507->99588 99509 611151 99589 608d34 58 API calls __getptd_noexit 99509->99589 99510->99509 99512 61116b 99510->99512 99514 611189 99510->99514 99541 6110d8 99510->99541 99512->99509 99517 611176 99512->99517 99515 608a5d __malloc_crt 58 API calls 99514->99515 99518 611199 99515->99518 99516 615ebb __flsbuf 58 API calls 99519 61128a 99516->99519 99517->99516 99520 6111a1 99518->99520 99521 6111bc 99518->99521 99523 611303 ReadFile 99519->99523 99528 6112a0 GetConsoleMode 99519->99528 99590 608d68 58 API calls __getptd_noexit 99520->99590 99592 611b11 60 API calls 3 library calls 99521->99592 99526 6117e3 GetLastError 99523->99526 99527 611325 99523->99527 99525 6111a6 99591 608d34 58 API calls __getptd_noexit 99525->99591 99530 6117f0 99526->99530 99531 6112e3 99526->99531 99527->99526 99535 6112f5 99527->99535 99532 611300 99528->99532 99533 6112b4 99528->99533 99598 608d68 58 API calls __getptd_noexit 99530->99598 99543 6112e9 99531->99543 99593 608d47 58 API calls 3 library calls 99531->99593 99532->99523 99533->99532 99536 6112ba ReadConsoleW 99533->99536 99535->99543 99544 61135a 99535->99544 99547 6115c7 99535->99547 99536->99535 99538 6112dd GetLastError 99536->99538 99537 6117f5 99599 608d34 58 API calls __getptd_noexit 99537->99599 99538->99531 99541->99482 99542 602f95 _free 58 API calls 99542->99541 99543->99541 99543->99542 99546 6113c6 ReadFile 99544->99546 99552 611447 99544->99552 99549 6113e7 GetLastError 99546->99549 99555 6113f1 99546->99555 99547->99543 99548 6116cd ReadFile 99547->99548 99554 6116f0 GetLastError 99548->99554 99560 6116fe 99548->99560 99549->99555 99550 611504 99558 6114b4 MultiByteToWideChar 99550->99558 99596 611b11 60 API calls 3 library calls 99550->99596 99551 6114f4 99595 608d68 58 API calls __getptd_noexit 99551->99595 99552->99543 99552->99550 99552->99551 99552->99558 99554->99560 99555->99544 99594 611b11 60 API calls 3 library calls 99555->99594 99558->99538 99558->99543 99560->99547 99597 611b11 60 API calls 3 library calls 99560->99597 99562 610e02 99561->99562 99565 610e17 99561->99565 99636 608d68 58 API calls __getptd_noexit 99562->99636 99564 610e07 99637 608ff6 9 API calls __wsplitpath_helper 99564->99637 99567 610e4c 99565->99567 99572 610e12 99565->99572 99638 616234 99565->99638 99569 604916 __fclose_nolock 58 API calls 99567->99569 99570 610e60 99569->99570 99603 610f97 99570->99603 99572->99482 99573 610e67 99573->99572 99574 604916 __fclose_nolock 58 API calls 99573->99574 99575 610e8a 99574->99575 99575->99572 99576 604916 __fclose_nolock 58 API calls 99575->99576 99577 610e96 99576->99577 99577->99572 99578 604916 __fclose_nolock 58 API calls 99577->99578 99579 610ea3 99578->99579 99580 604916 __fclose_nolock 58 API calls 99579->99580 99580->99572 99581->99489 99582->99477 99583->99482 99584->99489 99585->99498 99586->99541 99587->99507 99588->99506 99589->99507 99590->99525 99591->99541 99592->99517 99593->99543 99594->99555 99595->99543 99596->99558 99597->99560 99598->99537 99599->99543 99600->99502 99601->99506 99602->99541 99604 610fa3 _raise 99603->99604 99605 610fb0 99604->99605 99608 610fc7 99604->99608 99606 608d34 __chsize_nolock 58 API calls 99605->99606 99610 610fb5 99606->99610 99607 61108b 99609 608d34 __chsize_nolock 58 API calls 99607->99609 99608->99607 99611 610fdb 99608->99611 99612 610ffe 99609->99612 99613 608d68 __wsplitpath_helper 58 API calls 99610->99613 99614 611006 99611->99614 99615 610ff9 99611->99615 99621 608d68 __wsplitpath_helper 58 API calls 99612->99621 99628 610fbc _raise 99613->99628 99617 611013 99614->99617 99618 611028 99614->99618 99616 608d34 __chsize_nolock 58 API calls 99615->99616 99616->99612 99619 608d34 __chsize_nolock 58 API calls 99617->99619 99620 60d446 ___lock_fhandle 59 API calls 99618->99620 99622 611018 99619->99622 99623 61102e 99620->99623 99624 611020 99621->99624 99625 608d68 __wsplitpath_helper 58 API calls 99622->99625 99626 611041 99623->99626 99627 611054 99623->99627 99630 608ff6 __wsplitpath_helper 9 API calls 99624->99630 99625->99624 99629 6110ab __read_nolock 70 API calls 99626->99629 99631 608d68 __wsplitpath_helper 58 API calls 99627->99631 99628->99573 99632 61104d 99629->99632 99630->99628 99633 611059 99631->99633 99635 611083 __read LeaveCriticalSection 99632->99635 99634 608d34 __chsize_nolock 58 API calls 99633->99634 99634->99632 99635->99628 99636->99564 99637->99572 99639 608a5d __malloc_crt 58 API calls 99638->99639 99640 616249 99639->99640 99640->99567 99642 605e9c _raise 99641->99642 99643 605ec3 99642->99643 99644 605eae 99642->99644 99646 606e4e __lock_file 59 API calls 99643->99646 99655 608d68 58 API calls __getptd_noexit 99644->99655 99648 605ec9 99646->99648 99647 605eb3 99656 608ff6 9 API calls __wsplitpath_helper 99647->99656 99657 605b00 67 API calls 6 library calls 99648->99657 99651 605ed4 99658 605ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 99651->99658 99653 605ee6 99654 605ebe _raise 99653->99654 99654->99265 99655->99647 99656->99654 99657->99651 99658->99653 99801 5e1016 99806 5e4ad2 99801->99806 99804 602f80 __cinit 67 API calls 99805 5e1025 99804->99805 99807 600ff6 Mailbox 59 API calls 99806->99807 99808 5e4ada 99807->99808 99810 5e101b 99808->99810 99813 5e4a94 99808->99813 99810->99804 99814 5e4a9d 99813->99814 99816 5e4aaf 99813->99816 99815 602f80 __cinit 67 API calls 99814->99815 99815->99816 99817 5e4afe 99816->99817 99818 5e77c7 59 API calls 99817->99818 99819 5e4b16 GetVersionExW 99818->99819 99820 5e7d2c 59 API calls 99819->99820 99821 5e4b59 99820->99821 99822 5e7e8c 59 API calls 99821->99822 99831 5e4b86 99821->99831 99823 5e4b7a 99822->99823 99824 5e7886 59 API calls 99823->99824 99824->99831 99825 5e4bf1 GetCurrentProcess IsWow64Process 99826 5e4c0a 99825->99826 99828 5e4c89 GetSystemInfo 99826->99828 99829 5e4c20 99826->99829 99827 61dc8d 99830 5e4c56 99828->99830 99841 5e4c95 99829->99841 99830->99810 99831->99825 99831->99827 99834 5e4c7d GetSystemInfo 99836 5e4c47 99834->99836 99835 5e4c32 99837 5e4c95 2 API calls 99835->99837 99836->99830 99838 5e4c4d FreeLibrary 99836->99838 99839 5e4c3a GetNativeSystemInfo 99837->99839 99838->99830 99839->99836 99842 5e4c2e 99841->99842 99843 5e4c9e LoadLibraryA 99841->99843 99842->99834 99842->99835 99843->99842 99844 5e4caf GetProcAddress 99843->99844 99844->99842 99845 5e1055 99850 5e2649 99845->99850 99848 602f80 __cinit 67 API calls 99849 5e1064 99848->99849 99851 5e77c7 59 API calls 99850->99851 99852 5e26b7 99851->99852 99858 5e3582 99852->99858 99854 61c2b9 99856 5e2754 99856->99854 99857 5e105a 99856->99857 99861 5e3416 59 API calls 2 library calls 99856->99861 99857->99848 99862 5e35b0 99858->99862 99861->99856 99863 5e35bd 99862->99863 99865 5e35a1 99862->99865 99864 5e35c4 RegOpenKeyExW 99863->99864 99863->99865 99864->99865 99866 5e35de RegQueryValueExW 99864->99866 99865->99856 99867 5e35ff 99866->99867 99868 5e3614 RegCloseKey 99866->99868 99867->99868 99868->99865 99869 62220e GetTempPathW 99870 62222b 99869->99870 99871 5e3633 99872 5e366a 99871->99872 99873 5e3688 99872->99873 99874 5e36e7 99872->99874 99915 5e36e5 99872->99915 99877 5e375d PostQuitMessage 99873->99877 99878 5e3695 99873->99878 99875 5e36ed 99874->99875 99876 61d31c 99874->99876 99880 5e3715 SetTimer RegisterWindowMessageW 99875->99880 99881 5e36f2 99875->99881 99921 5f11d0 10 API calls Mailbox 99876->99921 99912 5e36d8 99877->99912 99882 61d38f 99878->99882 99883 5e36a0 99878->99883 99879 5e36ca DefWindowProcW 99879->99912 99887 5e373e CreatePopupMenu 99880->99887 99880->99912 99885 5e36f9 KillTimer 99881->99885 99886 61d2bf 99881->99886 99936 642a16 71 API calls _memset 99882->99936 99888 5e36a8 99883->99888 99889 5e3767 99883->99889 99916 5e44cb Shell_NotifyIconW _memset 99885->99916 99892 61d2c4 99886->99892 99893 61d2f8 MoveWindow 99886->99893 99887->99912 99895 61d374 99888->99895 99896 5e36b3 99888->99896 99919 5e4531 64 API calls _memset 99889->99919 99891 61d343 99922 5f11f3 331 API calls Mailbox 99891->99922 99900 61d2e7 SetFocus 99892->99900 99901 61d2c8 99892->99901 99893->99912 99895->99879 99935 63817e 59 API calls Mailbox 99895->99935 99903 5e374b 99896->99903 99910 5e36be 99896->99910 99897 61d3a1 99897->99879 99897->99912 99900->99912 99904 61d2d1 99901->99904 99901->99910 99902 5e370c 99917 5e3114 DeleteObject DestroyWindow Mailbox 99902->99917 99918 5e45df 81 API calls _memset 99903->99918 99920 5f11d0 10 API calls Mailbox 99904->99920 99909 5e375b 99909->99912 99910->99879 99923 5e44cb Shell_NotifyIconW _memset 99910->99923 99913 61d368 99924 5e43db 99913->99924 99915->99879 99916->99902 99917->99912 99918->99909 99919->99909 99920->99912 99921->99891 99922->99910 99923->99913 99925 5e4406 _memset 99924->99925 99937 5e4213 99925->99937 99928 5e448b 99930 5e44a5 Shell_NotifyIconW 99928->99930 99931 5e44c1 Shell_NotifyIconW 99928->99931 99932 5e44b3 99930->99932 99931->99932 99941 5e410d 99932->99941 99934 5e44ba 99934->99915 99935->99915 99936->99897 99938 61d638 99937->99938 99939 5e4227 99937->99939 99938->99939 99940 61d641 DestroyIcon 99938->99940 99939->99928 99963 643226 62 API calls _W_store_winword 99939->99963 99940->99939 99942 5e4129 99941->99942 99943 5e4200 Mailbox 99941->99943 99944 5e7b76 59 API calls 99942->99944 99943->99934 99945 5e4137 99944->99945 99946 5e4144 99945->99946 99947 61d5dd LoadStringW 99945->99947 99948 5e7d2c 59 API calls 99946->99948 99949 61d5f7 99947->99949 99950 5e4159 99948->99950 99951 5e7c8e 59 API calls 99949->99951 99950->99949 99952 5e416a 99950->99952 99957 61d601 99951->99957 99953 5e4174 99952->99953 99954 5e4205 99952->99954 99955 5e7c8e 59 API calls 99953->99955 99956 5e81a7 59 API calls 99954->99956 99959 5e417e _memset _wcscpy 99955->99959 99956->99959 99958 5e7e0b 59 API calls 99957->99958 99957->99959 99960 61d623 99958->99960 99961 5e41e6 Shell_NotifyIconW 99959->99961 99962 5e7e0b 59 API calls 99960->99962 99961->99943 99962->99959 99963->99928 99964 1fd2410 99978 1fd0000 99964->99978 99966 1fd2496 99981 1fd2300 99966->99981 99984 1fd34c0 GetPEB 99978->99984 99980 1fd068b 99980->99966 99982 1fd2309 Sleep 99981->99982 99983 1fd2317 99982->99983 99985 1fd34ea 99984->99985 99985->99980 99986 5eb56e 99993 5ffb84 99986->99993 99988 5eb584 99989 5ec707 69 API calls 99988->99989 99990 5eb5ac 99989->99990 99992 5ea4e8 99990->99992 100002 64a0b5 89 API calls 4 library calls 99990->100002 99994 5ffba2 99993->99994 99995 5ffb90 99993->99995 99997 5ffba8 99994->99997 99998 5ffbd1 99994->99998 100003 5e9e9c 60 API calls Mailbox 99995->100003 99999 600ff6 Mailbox 59 API calls 99997->99999 100004 5e9e9c 60 API calls Mailbox 99998->100004 100001 5ffb9a 99999->100001 100001->99988 100002->99992 100003->100001 100004->100001 100005 607e93 100006 607e9f _raise 100005->100006 100042 60a048 GetStartupInfoW 100006->100042 100008 607ea4 100044 608dbc GetProcessHeap 100008->100044 100010 607efc 100011 607f07 100010->100011 100127 607fe3 58 API calls 3 library calls 100010->100127 100045 609d26 100011->100045 100014 607f0d 100015 607f18 __RTC_Initialize 100014->100015 100128 607fe3 58 API calls 3 library calls 100014->100128 100066 60d812 100015->100066 100018 607f33 GetCommandLineW 100085 615173 GetEnvironmentStringsW 100018->100085 100019 607f27 100019->100018 100129 607fe3 58 API calls 3 library calls 100019->100129 100022 607f32 100022->100018 100025 607f4d 100026 607f58 100025->100026 100130 6032f5 58 API calls 3 library calls 100025->100130 100095 614fa8 100026->100095 100029 607f5e 100030 607f69 100029->100030 100131 6032f5 58 API calls 3 library calls 100029->100131 100109 60332f 100030->100109 100033 607f71 100034 607f7c __wwincmdln 100033->100034 100132 6032f5 58 API calls 3 library calls 100033->100132 100115 5e492e 100034->100115 100037 607f90 100038 607f9f 100037->100038 100133 603598 58 API calls _doexit 100037->100133 100134 603320 58 API calls _doexit 100038->100134 100041 607fa4 _raise 100043 60a05e 100042->100043 100043->100008 100044->100010 100135 6033c7 36 API calls 2 library calls 100045->100135 100047 609d2b 100136 609f7c InitializeCriticalSectionAndSpinCount __mtinitlocks 100047->100136 100049 609d30 100050 609d34 100049->100050 100138 609fca TlsAlloc 100049->100138 100137 609d9c 61 API calls 2 library calls 100050->100137 100053 609d46 100053->100050 100055 609d51 100053->100055 100054 609d39 100054->100014 100139 608a15 100055->100139 100058 609d93 100147 609d9c 61 API calls 2 library calls 100058->100147 100061 609d72 100061->100058 100063 609d78 100061->100063 100062 609d98 100062->100014 100146 609c73 58 API calls 4 library calls 100063->100146 100065 609d80 GetCurrentThreadId 100065->100014 100067 60d81e _raise 100066->100067 100068 609e4b __lock 58 API calls 100067->100068 100069 60d825 100068->100069 100070 608a15 __calloc_crt 58 API calls 100069->100070 100071 60d836 100070->100071 100072 60d8a1 GetStartupInfoW 100071->100072 100074 60d841 _raise @_EH4_CallFilterFunc@8 100071->100074 100073 60d8b6 100072->100073 100077 60d9e5 100072->100077 100073->100077 100078 608a15 __calloc_crt 58 API calls 100073->100078 100081 60d904 100073->100081 100074->100019 100075 60daad 100161 60dabd LeaveCriticalSection _doexit 100075->100161 100077->100075 100079 60da32 GetStdHandle 100077->100079 100080 60da45 GetFileType 100077->100080 100160 60a06b InitializeCriticalSectionAndSpinCount 100077->100160 100078->100073 100079->100077 100080->100077 100081->100077 100082 60d938 GetFileType 100081->100082 100159 60a06b InitializeCriticalSectionAndSpinCount 100081->100159 100082->100081 100086 615184 100085->100086 100087 607f43 100085->100087 100088 608a5d __malloc_crt 58 API calls 100086->100088 100091 614d6b GetModuleFileNameW 100087->100091 100090 6151aa _memmove 100088->100090 100089 6151c0 FreeEnvironmentStringsW 100089->100087 100090->100089 100092 614d9f _wparse_cmdline 100091->100092 100093 608a5d __malloc_crt 58 API calls 100092->100093 100094 614ddf _wparse_cmdline 100092->100094 100093->100094 100094->100025 100096 614fc1 __wsetenvp 100095->100096 100100 614fb9 100095->100100 100097 608a15 __calloc_crt 58 API calls 100096->100097 100105 614fea __wsetenvp 100097->100105 100098 615041 100099 602f95 _free 58 API calls 100098->100099 100099->100100 100100->100029 100101 608a15 __calloc_crt 58 API calls 100101->100105 100102 615066 100103 602f95 _free 58 API calls 100102->100103 100103->100100 100105->100098 100105->100100 100105->100101 100105->100102 100106 61507d 100105->100106 100162 614857 58 API calls __wsplitpath_helper 100105->100162 100163 609006 IsProcessorFeaturePresent 100106->100163 100108 615089 100108->100029 100110 60333b __IsNonwritableInCurrentImage 100109->100110 100178 60a711 100110->100178 100112 603359 __initterm_e 100113 602f80 __cinit 67 API calls 100112->100113 100114 603378 __cinit __IsNonwritableInCurrentImage 100112->100114 100113->100114 100114->100033 100116 5e4948 100115->100116 100126 5e49e7 100115->100126 100117 5e4982 IsThemeActive 100116->100117 100181 6035ac 100117->100181 100121 5e49ae 100193 5e4a5b SystemParametersInfoW SystemParametersInfoW 100121->100193 100123 5e49ba 100194 5e3b4c 100123->100194 100126->100037 100127->100011 100128->100015 100129->100022 100133->100038 100134->100041 100135->100047 100136->100049 100137->100054 100138->100053 100141 608a1c 100139->100141 100142 608a57 100141->100142 100144 608a3a 100141->100144 100148 615446 100141->100148 100142->100058 100145 60a026 TlsSetValue 100142->100145 100144->100141 100144->100142 100156 60a372 Sleep 100144->100156 100145->100061 100146->100065 100147->100062 100149 615451 100148->100149 100155 61546c 100148->100155 100150 61545d 100149->100150 100149->100155 100157 608d68 58 API calls __getptd_noexit 100150->100157 100152 61547c RtlAllocateHeap 100153 615462 100152->100153 100152->100155 100153->100141 100155->100152 100155->100153 100158 6035e1 DecodePointer 100155->100158 100156->100144 100157->100153 100158->100155 100159->100081 100160->100077 100161->100074 100162->100105 100164 609011 100163->100164 100169 608e99 100164->100169 100168 60902c 100168->100108 100170 608eb3 _memset ___raise_securityfailure 100169->100170 100171 608ed3 IsDebuggerPresent 100170->100171 100177 60a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 100171->100177 100173 60c836 __except_handler4 6 API calls 100175 608fba 100173->100175 100174 608f97 ___raise_securityfailure 100174->100173 100176 60a380 GetCurrentProcess TerminateProcess 100175->100176 100176->100168 100177->100174 100179 60a714 EncodePointer 100178->100179 100179->100179 100180 60a72e 100179->100180 100180->100112 100182 609e4b __lock 58 API calls 100181->100182 100183 6035b7 DecodePointer EncodePointer 100182->100183 100246 609fb5 LeaveCriticalSection 100183->100246 100185 5e49a7 100186 603614 100185->100186 100187 603638 100186->100187 100188 60361e 100186->100188 100187->100121 100188->100187 100247 608d68 58 API calls __getptd_noexit 100188->100247 100190 603628 100248 608ff6 9 API calls __wsplitpath_helper 100190->100248 100192 603633 100192->100121 100193->100123 100195 5e3b59 __ftell_nolock 100194->100195 100196 5e77c7 59 API calls 100195->100196 100197 5e3b63 GetCurrentDirectoryW 100196->100197 100249 5e3778 100197->100249 100246->100185 100247->100190 100248->100192 100250 5e77c7 59 API calls 100249->100250 100251 5e378e 100250->100251 100450 5e3d43 100251->100450 100253 5e37ac 100254 5e4864 61 API calls 100253->100254 100255 5e37c0 100254->100255 100256 5e7f41 59 API calls 100255->100256 100257 5e37cd 100256->100257 100258 5e4f3d 136 API calls 100257->100258 100259 5e37e6 100258->100259 100260 5e37ee Mailbox 100259->100260 100261 61d3ae 100259->100261 100265 5e81a7 59 API calls 100260->100265 100496 6497e5 100261->100496 100264 61d3cd 100267 602f95 _free 58 API calls 100264->100267 100268 5e3801 100265->100268 100266 5e4faa 84 API calls 100266->100264 100269 61d3da 100267->100269 100464 5e93ea 100268->100464 100271 5e4faa 84 API calls 100269->100271 100274 61d3e3 100271->100274 100273 5e7f41 59 API calls 100275 5e381a 100273->100275 100277 5e3ee2 59 API calls 100274->100277 100467 5e8620 100275->100467 100279 61d3fe 100277->100279 100278 5e382c Mailbox 100280 5e7f41 59 API calls 100278->100280 100281 5e3ee2 59 API calls 100279->100281 100282 5e3852 100280->100282 100283 61d41a 100281->100283 100284 5e8620 69 API calls 100282->100284 100285 5e4864 61 API calls 100283->100285 100287 5e3861 Mailbox 100284->100287 100286 61d43f 100285->100286 100288 5e3ee2 59 API calls 100286->100288 100290 5e77c7 59 API calls 100287->100290 100289 61d44b 100288->100289 100291 5e81a7 59 API calls 100289->100291 100292 5e387f 100290->100292 100294 61d459 100291->100294 100471 5e3ee2 100292->100471 100295 5e3ee2 59 API calls 100294->100295 100451 5e3d50 __ftell_nolock 100450->100451 100452 5e7d2c 59 API calls 100451->100452 100456 5e3eb6 Mailbox 100451->100456 100454 5e3d82 100452->100454 100453 5e7b52 59 API calls 100453->100454 100454->100453 100461 5e3db8 Mailbox 100454->100461 100455 5e3e89 100455->100456 100457 5e7f41 59 API calls 100455->100457 100456->100253 100459 5e3eaa 100457->100459 100458 5e7f41 59 API calls 100458->100461 100460 5e3f84 59 API calls 100459->100460 100460->100456 100461->100455 100461->100456 100461->100458 100462 5e3f84 59 API calls 100461->100462 100463 5e7b52 59 API calls 100461->100463 100462->100461 100463->100461 100465 600ff6 Mailbox 59 API calls 100464->100465 100466 5e380d 100465->100466 100466->100273 100468 5e862b 100467->100468 100470 5e8652 100468->100470 100531 5e8b13 69 API calls Mailbox 100468->100531 100470->100278 100472 5e3eec 100471->100472 100473 5e3f05 100471->100473 100474 5e81a7 59 API calls 100472->100474 100475 5e7d2c 59 API calls 100473->100475 100476 5e388b 100474->100476 100475->100476 100477 60313d 100476->100477 100497 5e5045 85 API calls 100496->100497 100498 649854 100497->100498 100537 6499be 96 API calls 2 library calls 100498->100537 100500 649866 100501 5e506b 74 API calls 100500->100501 100529 61d3c1 100500->100529 100502 649881 100501->100502 100503 5e506b 74 API calls 100502->100503 100504 649891 100503->100504 100505 5e506b 74 API calls 100504->100505 100506 6498ac 100505->100506 100507 5e506b 74 API calls 100506->100507 100508 6498c7 100507->100508 100509 5e5045 85 API calls 100508->100509 100510 6498de 100509->100510 100511 60594c __crtCompareStringA_stat 58 API calls 100510->100511 100512 6498e5 100511->100512 100513 60594c __crtCompareStringA_stat 58 API calls 100512->100513 100514 6498ef 100513->100514 100515 5e506b 74 API calls 100514->100515 100516 649903 100515->100516 100538 649393 GetSystemTimeAsFileTime 100516->100538 100529->100264 100529->100266 100531->100470 100537->100500 100815 5e568a 100816 5e5c18 59 API calls 100815->100816 100817 5e569c 100816->100817 100818 5e5632 61 API calls 100817->100818 100819 5e56aa 100818->100819 100821 5e56ba Mailbox 100819->100821 100822 5e81c1 61 API calls Mailbox 100819->100822 100822->100821 100823 5ee70b 100826 5ed260 100823->100826 100825 5ee719 100827 5ed27d 100826->100827 100844 5ed4dd 100826->100844 100828 622b0a 100827->100828 100829 622abb 100827->100829 100854 5ed2a4 100827->100854 100870 65a6fb 331 API calls __cinit 100828->100870 100831 622abe 100829->100831 100840 622ad9 100829->100840 100833 622aca 100831->100833 100831->100854 100868 65ad0f 331 API calls 100833->100868 100834 602f80 __cinit 67 API calls 100834->100854 100837 5ed594 100862 5e8bb2 68 API calls 100837->100862 100838 622cdf 100838->100838 100839 5ed6ab 100839->100825 100840->100844 100869 65b1b7 331 API calls 3 library calls 100840->100869 100844->100839 100875 64a0b5 89 API calls 4 library calls 100844->100875 100845 622c26 100874 65aa66 89 API calls 100845->100874 100846 5ed5a3 100846->100825 100849 5e8620 69 API calls 100849->100854 100854->100834 100854->100837 100854->100839 100854->100844 100854->100845 100854->100849 100857 5ea000 331 API calls 100854->100857 100858 5e81a7 59 API calls 100854->100858 100860 5e88a0 68 API calls __cinit 100854->100860 100861 5e86a2 68 API calls 100854->100861 100863 5e859a 68 API calls 100854->100863 100864 5ed0dc 331 API calls 100854->100864 100865 5e9f3a 59 API calls Mailbox 100854->100865 100866 5ed060 89 API calls 100854->100866 100867 5ecedd 331 API calls 100854->100867 100871 5e8bb2 68 API calls 100854->100871 100872 5e9e9c 60 API calls Mailbox 100854->100872 100873 636d03 60 API calls 100854->100873 100857->100854 100858->100854 100860->100854 100861->100854 100862->100846 100863->100854 100864->100854 100865->100854 100866->100854 100867->100854 100868->100839 100869->100844 100870->100854 100871->100854 100872->100854 100873->100854 100874->100844 100875->100838 100876 5e1066 100881 5ef8cf 100876->100881 100878 5e106c 100879 602f80 __cinit 67 API calls 100878->100879 100880 5e1076 100879->100880 100882 5ef8f0 100881->100882 100914 600143 100882->100914 100886 5ef937 100887 5e77c7 59 API calls 100886->100887 100888 5ef941 100887->100888 100889 5e77c7 59 API calls 100888->100889 100890 5ef94b 100889->100890 100891 5e77c7 59 API calls 100890->100891 100892 5ef955 100891->100892 100893 5e77c7 59 API calls 100892->100893 100894 5ef993 100893->100894 100895 5e77c7 59 API calls 100894->100895 100896 5efa5e 100895->100896 100924 5f60e7 100896->100924 100900 5efa90 100901 5e77c7 59 API calls 100900->100901 100902 5efa9a 100901->100902 100952 5fffde 100902->100952 100904 5efae1 100905 5efaf1 GetStdHandle 100904->100905 100906 5efb3d 100905->100906 100907 6249d5 100905->100907 100908 5efb45 OleInitialize 100906->100908 100907->100906 100909 6249de 100907->100909 100908->100878 100959 646dda 64 API calls Mailbox 100909->100959 100911 6249e5 100960 6474a9 CreateThread 100911->100960 100913 6249f1 CloseHandle 100913->100908 100961 60021c 100914->100961 100917 60021c 59 API calls 100918 600185 100917->100918 100919 5e77c7 59 API calls 100918->100919 100920 600191 100919->100920 100921 5e7d2c 59 API calls 100920->100921 100922 5ef8f6 100921->100922 100923 6003a2 6 API calls 100922->100923 100923->100886 100925 5e77c7 59 API calls 100924->100925 100926 5f60f7 100925->100926 100927 5e77c7 59 API calls 100926->100927 100928 5f60ff 100927->100928 100968 5f5bfd 100928->100968 100931 5f5bfd 59 API calls 100932 5f610f 100931->100932 100933 5e77c7 59 API calls 100932->100933 100934 5f611a 100933->100934 100935 600ff6 Mailbox 59 API calls 100934->100935 100936 5efa68 100935->100936 100937 5f6259 100936->100937 100938 5f6267 100937->100938 100939 5e77c7 59 API calls 100938->100939 100940 5f6272 100939->100940 100941 5e77c7 59 API calls 100940->100941 100942 5f627d 100941->100942 100943 5e77c7 59 API calls 100942->100943 100944 5f6288 100943->100944 100945 5e77c7 59 API calls 100944->100945 100946 5f6293 100945->100946 100947 5f5bfd 59 API calls 100946->100947 100948 5f629e 100947->100948 100949 600ff6 Mailbox 59 API calls 100948->100949 100950 5f62a5 RegisterWindowMessageW 100949->100950 100950->100900 100953 635cc3 100952->100953 100954 5fffee 100952->100954 100971 649d71 60 API calls 100953->100971 100956 600ff6 Mailbox 59 API calls 100954->100956 100958 5ffff6 100956->100958 100957 635cce 100958->100904 100959->100911 100960->100913 100972 64748f 65 API calls 100960->100972 100962 5e77c7 59 API calls 100961->100962 100963 600227 100962->100963 100964 5e77c7 59 API calls 100963->100964 100965 60022f 100964->100965 100966 5e77c7 59 API calls 100965->100966 100967 60017b 100966->100967 100967->100917 100969 5e77c7 59 API calls 100968->100969 100970 5f5c05 100969->100970 100970->100931 100971->100957

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005E3B7A
                                        • IsDebuggerPresent.KERNEL32 ref: 005E3B8C
                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,006A62F8,006A62E0,?,?), ref: 005E3BFD
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                          • Part of subcall function 005F0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005E3C26,006A62F8,?,?,?), ref: 005F0ACE
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 005E3C81
                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006993F0,00000010), ref: 0061D4BC
                                        • SetCurrentDirectoryW.KERNEL32(?,006A62F8,?,?,?), ref: 0061D4F4
                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00695D40,006A62F8,?,?,?), ref: 0061D57A
                                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 0061D581
                                          • Part of subcall function 005E3A58: GetSysColorBrush.USER32(0000000F), ref: 005E3A62
                                          • Part of subcall function 005E3A58: LoadCursorW.USER32(00000000,00007F00), ref: 005E3A71
                                          • Part of subcall function 005E3A58: LoadIconW.USER32(00000063), ref: 005E3A88
                                          • Part of subcall function 005E3A58: LoadIconW.USER32(000000A4), ref: 005E3A9A
                                          • Part of subcall function 005E3A58: LoadIconW.USER32(000000A2), ref: 005E3AAC
                                          • Part of subcall function 005E3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005E3AD2
                                          • Part of subcall function 005E3A58: RegisterClassExW.USER32(?), ref: 005E3B28
                                          • Part of subcall function 005E39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E3A15
                                          • Part of subcall function 005E39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3A36
                                          • Part of subcall function 005E39E7: ShowWindow.USER32(00000000,?,?), ref: 005E3A4A
                                          • Part of subcall function 005E39E7: ShowWindow.USER32(00000000,?,?), ref: 005E3A53
                                          • Part of subcall function 005E43DB: _memset.LIBCMT ref: 005E4401
                                          • Part of subcall function 005E43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E44A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                        • String ID: This is a third-party compiled AutoIt script.$runas$%g
                                        • API String ID: 529118366-2073506830
                                        • Opcode ID: bb3ca689f3fc8535fbdacbf8a72c4209332ed697549e291018377296a31b1b32
                                        • Instruction ID: c3e78f243b154269b68c63f8caea15bae9dc9595e693791b3fb189eea88cd8a2
                                        • Opcode Fuzzy Hash: bb3ca689f3fc8535fbdacbf8a72c4209332ed697549e291018377296a31b1b32
                                        • Instruction Fuzzy Hash: F0511831904289AACF15BBB5DC09AFD7F7BBF4A300B185069F495A31A1DA749B45CF20
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 983 5e4fe9-5e5001 CreateStreamOnHGlobal 984 5e5003-5e501a FindResourceExW 983->984 985 5e5021-5e5026 983->985 986 61dd5c-61dd6b LoadResource 984->986 987 5e5020 984->987 986->987 988 61dd71-61dd7f SizeofResource 986->988 987->985 988->987 989 61dd85-61dd90 LockResource 988->989 989->987 990 61dd96-61ddb4 989->990 990->987
                                        APIs
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,005E4EEE,?,?,00000000,00000000), ref: 005E4FF9
                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005E4EEE,?,?,00000000,00000000), ref: 005E5010
                                        • LoadResource.KERNEL32(?,00000000,?,?,005E4EEE,?,?,00000000,00000000,?,?,?,?,?,?,005E4F8F), ref: 0061DD60
                                        • SizeofResource.KERNEL32(?,00000000,?,?,005E4EEE,?,?,00000000,00000000,?,?,?,?,?,?,005E4F8F), ref: 0061DD75
                                        • LockResource.KERNEL32(N^,?,?,005E4EEE,?,?,00000000,00000000,?,?,?,?,?,?,005E4F8F,00000000), ref: 0061DD88
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                        • String ID: SCRIPT$N^
                                        • API String ID: 3051347437-1861342959
                                        • Opcode ID: 44fe1ace0f1ccec32c2f86015015d77a19b2da6861e76cf8236cf470907771f0
                                        • Instruction ID: dc8606554263523726a0d58ba85bfc33f165b5f2050192bb6649ec2ceffa614c
                                        • Opcode Fuzzy Hash: 44fe1ace0f1ccec32c2f86015015d77a19b2da6861e76cf8236cf470907771f0
                                        • Instruction Fuzzy Hash: EE115A75200700BFD7258B66EC58F677BBEFBC9B15F20516CF446C6260EBA1ED008A60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1047 5e4afe-5e4b5e call 5e77c7 GetVersionExW call 5e7d2c 1052 5e4c69-5e4c6b 1047->1052 1053 5e4b64 1047->1053 1054 61db90-61db9c 1052->1054 1055 5e4b67-5e4b6c 1053->1055 1056 61db9d-61dba1 1054->1056 1057 5e4b72 1055->1057 1058 5e4c70-5e4c71 1055->1058 1060 61dba3 1056->1060 1061 61dba4-61dbb0 1056->1061 1059 5e4b73-5e4baa call 5e7e8c call 5e7886 1057->1059 1058->1059 1069 61dc8d-61dc90 1059->1069 1070 5e4bb0-5e4bb1 1059->1070 1060->1061 1061->1056 1063 61dbb2-61dbb7 1061->1063 1063->1055 1065 61dbbd-61dbc4 1063->1065 1065->1054 1067 61dbc6 1065->1067 1071 61dbcb-61dbce 1067->1071 1072 61dc92 1069->1072 1073 61dca9-61dcad 1069->1073 1070->1071 1074 5e4bb7-5e4bc2 1070->1074 1075 61dbd4-61dbf2 1071->1075 1076 5e4bf1-5e4c08 GetCurrentProcess IsWow64Process 1071->1076 1077 61dc95 1072->1077 1081 61dc98-61dca1 1073->1081 1082 61dcaf-61dcb8 1073->1082 1078 61dc13-61dc19 1074->1078 1079 5e4bc8-5e4bca 1074->1079 1075->1076 1080 61dbf8-61dbfe 1075->1080 1083 5e4c0d-5e4c1e 1076->1083 1084 5e4c0a 1076->1084 1077->1081 1089 61dc23-61dc29 1078->1089 1090 61dc1b-61dc1e 1078->1090 1085 5e4bd0-5e4bd3 1079->1085 1086 61dc2e-61dc3a 1079->1086 1087 61dc00-61dc03 1080->1087 1088 61dc08-61dc0e 1080->1088 1081->1073 1082->1077 1091 61dcba-61dcbd 1082->1091 1092 5e4c89-5e4c93 GetSystemInfo 1083->1092 1093 5e4c20-5e4c30 call 5e4c95 1083->1093 1084->1083 1094 5e4bd9-5e4be8 1085->1094 1095 61dc5a-61dc5d 1085->1095 1097 61dc44-61dc4a 1086->1097 1098 61dc3c-61dc3f 1086->1098 1087->1076 1088->1076 1089->1076 1090->1076 1091->1081 1096 5e4c56-5e4c66 1092->1096 1104 5e4c7d-5e4c87 GetSystemInfo 1093->1104 1105 5e4c32-5e4c3f call 5e4c95 1093->1105 1100 5e4bee 1094->1100 1101 61dc4f-61dc55 1094->1101 1095->1076 1103 61dc63-61dc78 1095->1103 1097->1076 1098->1076 1100->1076 1101->1076 1106 61dc82-61dc88 1103->1106 1107 61dc7a-61dc7d 1103->1107 1108 5e4c47-5e4c4b 1104->1108 1112 5e4c76-5e4c7b 1105->1112 1113 5e4c41-5e4c45 GetNativeSystemInfo 1105->1113 1106->1076 1107->1076 1108->1096 1110 5e4c4d-5e4c50 FreeLibrary 1108->1110 1110->1096 1112->1113 1113->1108
                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 005E4B2B
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        • GetCurrentProcess.KERNEL32(?,0066FAEC,00000000,00000000,?), ref: 005E4BF8
                                        • IsWow64Process.KERNEL32(00000000), ref: 005E4BFF
                                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 005E4C45
                                        • FreeLibrary.KERNEL32(00000000), ref: 005E4C50
                                        • GetSystemInfo.KERNEL32(00000000), ref: 005E4C81
                                        • GetSystemInfo.KERNEL32(00000000), ref: 005E4C8D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                        • String ID:
                                        • API String ID: 1986165174-0
                                        • Opcode ID: 495a0eb22fcd6f4f8593439bb5c6b41349dad977286d3019ac12330dbbf982bd
                                        • Instruction ID: 653ba722d7986e25b07e3c3243381c476dfb3a19434268b94cc6820a26951cdd
                                        • Opcode Fuzzy Hash: 495a0eb22fcd6f4f8593439bb5c6b41349dad977286d3019ac12330dbbf982bd
                                        • Instruction Fuzzy Hash: 4B91B23154A7C0DECB35CB7994551EABFE9BF2A300B584D9DE0CB83A01D224F948DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Dtj$Dtj$Dtj$Dtj$Variable must be of type 'Object'.
                                        • API String ID: 0-1753279395
                                        • Opcode ID: 7a86347ff71ac8a1ee572efaa70585a09925414ee355a13464d9368c993947d3
                                        • Instruction ID: ca51098e10c4255fe41991f4adec1385f80e06d2c8efc32c88e5e0075c61973e
                                        • Opcode Fuzzy Hash: 7a86347ff71ac8a1ee572efaa70585a09925414ee355a13464d9368c993947d3
                                        • Instruction Fuzzy Hash: B4A2BF74A04255CFCB28CF55C885AADBBB6FF49300F248469E996AB351D731ED42CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,0061E7C1), ref: 006446A6
                                        • FindFirstFileW.KERNELBASE(?,?), ref: 006446B7
                                        • FindClose.KERNEL32(00000000), ref: 006446C7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirst
                                        • String ID:
                                        • API String ID: 48322524-0
                                        • Opcode ID: 8940aacbd75c98c13a689f94953061e4d3c708fddad7c3e46271f5ac3b3f5a43
                                        • Instruction ID: 06ce2e309924b822799e8df5514a2f0639a143c22fd9ba59b6b588f82372667c
                                        • Opcode Fuzzy Hash: 8940aacbd75c98c13a689f94953061e4d3c708fddad7c3e46271f5ac3b3f5a43
                                        • Instruction Fuzzy Hash: FFE0D8314104005B47106778FC5E4EA775E9F06335F100716F835C11E0EBF05D5089D5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F0BBB
                                        • timeGetTime.WINMM ref: 005F0E76
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F0FB3
                                        • TranslateMessage.USER32(?), ref: 005F0FC7
                                        • DispatchMessageW.USER32(?), ref: 005F0FD5
                                        • Sleep.KERNEL32(0000000A), ref: 005F0FDF
                                        • LockWindowUpdate.USER32(00000000,?,?), ref: 005F105A
                                        • DestroyWindow.USER32 ref: 005F1066
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005F1080
                                        • Sleep.KERNEL32(0000000A,?,?), ref: 006252AD
                                        • TranslateMessage.USER32(?), ref: 0062608A
                                        • DispatchMessageW.USER32(?), ref: 00626098
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006260AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$prj$prj$prj$prj
                                        • API String ID: 4003667617-914299402
                                        • Opcode ID: 6bbbb92fffdb7092067d13987db7b91decbdef895ebd361ad21c3b2994b16bb8
                                        • Instruction ID: add3ef1155cdf36b4c6178bbc08d6b6f065f5103f60aca06d5ce587d98601e09
                                        • Opcode Fuzzy Hash: 6bbbb92fffdb7092067d13987db7b91decbdef895ebd361ad21c3b2994b16bb8
                                        • Instruction Fuzzy Hash: A6B2B370608B51DFD738DF24D844BAABBE6BF84304F18491DE58A872A1DB75E845CF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 006491E9: __time64.LIBCMT ref: 006491F3
                                          • Part of subcall function 005E5045: _fseek.LIBCMT ref: 005E505D
                                        • __wsplitpath.LIBCMT ref: 006494BE
                                          • Part of subcall function 0060432E: __wsplitpath_helper.LIBCMT ref: 0060436E
                                        • _wcscpy.LIBCMT ref: 006494D1
                                        • _wcscat.LIBCMT ref: 006494E4
                                        • __wsplitpath.LIBCMT ref: 00649509
                                        • _wcscat.LIBCMT ref: 0064951F
                                        • _wcscat.LIBCMT ref: 00649532
                                          • Part of subcall function 0064922F: _memmove.LIBCMT ref: 00649268
                                          • Part of subcall function 0064922F: _memmove.LIBCMT ref: 00649277
                                        • _wcscmp.LIBCMT ref: 00649479
                                          • Part of subcall function 006499BE: _wcscmp.LIBCMT ref: 00649AAE
                                          • Part of subcall function 006499BE: _wcscmp.LIBCMT ref: 00649AC1
                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006496DC
                                        • _wcsncpy.LIBCMT ref: 0064974F
                                        • DeleteFileW.KERNEL32(?,?), ref: 00649785
                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0064979B
                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006497AC
                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006497BE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                        • String ID:
                                        • API String ID: 1500180987-0
                                        • Opcode ID: 0338aa7918962e92050a9b61fc9f45fc556b9d6cdb542fa45ceb816ae7ec1440
                                        • Instruction ID: 3dbbb6ab0b9e7463c50a3ab7ada6f745643927a19cc56226f3960be207351ccf
                                        • Opcode Fuzzy Hash: 0338aa7918962e92050a9b61fc9f45fc556b9d6cdb542fa45ceb816ae7ec1440
                                        • Instruction Fuzzy Hash: 98C14AB1D40219AEDF25DF95CC85ADFBBBEEF45304F0040AAF609E6241EB709A448F65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                        • RegisterClassExW.USER32(00000030), ref: 005E309E
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                        • InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                        • LoadIconW.USER32(000000A9), ref: 005E30F2
                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: b37da8c751ad23f042778bbe349fe18705666b96b66773e980c18b9f606d6ffc
                                        • Instruction ID: 687aa1090888ccd1cbe6ee1f1807c7d4b6eadc99b8d628db2aff1c08a2063d5c
                                        • Opcode Fuzzy Hash: b37da8c751ad23f042778bbe349fe18705666b96b66773e980c18b9f606d6ffc
                                        • Instruction Fuzzy Hash: B3316971801308AFDB00DFA4EC48AC9BFF6FB0A310F18552AF590AA2A1D3BA5541CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                        • RegisterClassExW.USER32(00000030), ref: 005E309E
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                        • InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                        • LoadIconW.USER32(000000A9), ref: 005E30F2
                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: d52a7ecbeeebe2021eb82b298ea4b5d83718a07dc60d17e39a33dfde7b3ab5a6
                                        • Instruction ID: 60e4f00762c3b0186f312173bfa4be2b07eb6398223f352c2267af63595adfee
                                        • Opcode Fuzzy Hash: d52a7ecbeeebe2021eb82b298ea4b5d83718a07dc60d17e39a33dfde7b3ab5a6
                                        • Instruction Fuzzy Hash: 4121F7B1901208AFDB00EFA4FC49B9DBFFAFB09700F04612AF511A62A0D7B555448FA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 005E4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A62F8,?,005E37C0,?), ref: 005E4882
                                          • Part of subcall function 0060074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,005E72C5), ref: 00600771
                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005E7308
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0061ECF1
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0061ED32
                                        • RegCloseKey.ADVAPI32(?), ref: 0061ED70
                                        • _wcscat.LIBCMT ref: 0061EDC9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                        • API String ID: 2673923337-2727554177
                                        • Opcode ID: eddaa36d1cdd6372c0b9ae7523fec3389fda203cdd4d6e451e55723a83a80dbc
                                        • Instruction ID: 32de06103021caff2275a80c6249604f7aeec985c6ed21b0f7cdc1ff6b4b7b0a
                                        • Opcode Fuzzy Hash: eddaa36d1cdd6372c0b9ae7523fec3389fda203cdd4d6e451e55723a83a80dbc
                                        • Instruction Fuzzy Hash: B27191715083469EC318EF65EC4599BBBEAFF9A300F44152EF485831A1EB30EA48CF55
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 760 5e3633-5e3681 762 5e3683-5e3686 760->762 763 5e36e1-5e36e3 760->763 764 5e3688-5e368f 762->764 765 5e36e7 762->765 763->762 766 5e36e5 763->766 769 5e375d-5e3765 PostQuitMessage 764->769 770 5e3695-5e369a 764->770 767 5e36ed-5e36f0 765->767 768 61d31c-61d34a call 5f11d0 call 5f11f3 765->768 771 5e36ca-5e36d2 DefWindowProcW 766->771 772 5e3715-5e373c SetTimer RegisterWindowMessageW 767->772 773 5e36f2-5e36f3 767->773 807 61d34f-61d356 768->807 778 5e3711-5e3713 769->778 774 61d38f-61d3a3 call 642a16 770->774 775 5e36a0-5e36a2 770->775 777 5e36d8-5e36de 771->777 772->778 781 5e373e-5e3749 CreatePopupMenu 772->781 779 5e36f9-5e370c KillTimer call 5e44cb call 5e3114 773->779 780 61d2bf-61d2c2 773->780 774->778 800 61d3a9 774->800 782 5e36a8-5e36ad 775->782 783 5e3767-5e3776 call 5e4531 775->783 778->777 779->778 786 61d2c4-61d2c6 780->786 787 61d2f8-61d317 MoveWindow 780->787 781->778 789 61d374-61d37b 782->789 790 5e36b3-5e36b8 782->790 783->778 794 61d2e7-61d2f3 SetFocus 786->794 795 61d2c8-61d2cb 786->795 787->778 789->771 797 61d381-61d38a call 63817e 789->797 798 5e36be-5e36c4 790->798 799 5e374b-5e375b call 5e45df 790->799 794->778 795->798 803 61d2d1-61d2e2 call 5f11d0 795->803 797->771 798->771 798->807 799->778 800->771 803->778 807->771 811 61d35c-61d36f call 5e44cb call 5e43db 807->811 811->771
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 005E36D2
                                        • KillTimer.USER32(?,00000001), ref: 005E36FC
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005E371F
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E372A
                                        • CreatePopupMenu.USER32 ref: 005E373E
                                        • PostQuitMessage.USER32(00000000), ref: 005E375F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                        • String ID: TaskbarCreated$%g
                                        • API String ID: 129472671-2615855565
                                        • Opcode ID: f83f6da857b0c08351d90813e5ca894e82fb3d0a17eedc730bf817b9b6ccd138
                                        • Instruction ID: 0bbbf150c732c3792b4ef95d8c4d3e41fa090a31f7f830783b5c468282073cd1
                                        • Opcode Fuzzy Hash: f83f6da857b0c08351d90813e5ca894e82fb3d0a17eedc730bf817b9b6ccd138
                                        • Instruction Fuzzy Hash: 654128B2200285BBDF186F75EC0DBB93F5BF741300F181529F692872B1CAA5AF409B61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 005E3A62
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 005E3A71
                                        • LoadIconW.USER32(00000063), ref: 005E3A88
                                        • LoadIconW.USER32(000000A4), ref: 005E3A9A
                                        • LoadIconW.USER32(000000A2), ref: 005E3AAC
                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005E3AD2
                                        • RegisterClassExW.USER32(?), ref: 005E3B28
                                          • Part of subcall function 005E3041: GetSysColorBrush.USER32(0000000F), ref: 005E3074
                                          • Part of subcall function 005E3041: RegisterClassExW.USER32(00000030), ref: 005E309E
                                          • Part of subcall function 005E3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E30AF
                                          • Part of subcall function 005E3041: InitCommonControlsEx.COMCTL32(?), ref: 005E30CC
                                          • Part of subcall function 005E3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E30DC
                                          • Part of subcall function 005E3041: LoadIconW.USER32(000000A9), ref: 005E30F2
                                          • Part of subcall function 005E3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                        • String ID: #$0$AutoIt v3
                                        • API String ID: 423443420-4155596026
                                        • Opcode ID: 2eb0a3407b6eab8af3c37b5fc29fdc0f17f5d166b75da405c98d21d477480548
                                        • Instruction ID: 689fd87eb0f73a9e1655934fe6cc1c1138213ecf70b56788be95beb3d84d19ab
                                        • Opcode Fuzzy Hash: 2eb0a3407b6eab8af3c37b5fc29fdc0f17f5d166b75da405c98d21d477480548
                                        • Instruction Fuzzy Hash: C0212A71E00308AFEB10AFA5FC09B9D7FF6FB09711F04512AF505A62A0D3B6A6549F94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$bj
                                        • API String ID: 1825951767-3892150585
                                        • Opcode ID: bc55f4223cff7dacde0d946f98a99420d1323bc9f67ddc1c4516e4aefd2de596
                                        • Instruction ID: a6432792209fd4edfb31f9f8f267fd10ccae430ab30fbfe32ff1268d5caac04c
                                        • Opcode Fuzzy Hash: bc55f4223cff7dacde0d946f98a99420d1323bc9f67ddc1c4516e4aefd2de596
                                        • Instruction Fuzzy Hash: DFA15271C1026E9ACF08EFA2DC99AEEBB79BF55300F040429F456A7191EF745A09CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006003D3
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 006003DB
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006003E6
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006003F1
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 006003F9
                                          • Part of subcall function 006003A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00600401
                                          • Part of subcall function 005F6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,005EFA90), ref: 005F62B4
                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005EFB2D
                                        • OleInitialize.OLE32(00000000), ref: 005EFBAA
                                        • CloseHandle.KERNEL32(00000000), ref: 006249F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                        • String ID: <gj$\dj$%g$cj
                                        • API String ID: 1986988660-715575889
                                        • Opcode ID: ee205efd8a81eac753c2c63a72b4cf7a7c73b8d4fb788ea09eceeed630a7f7da
                                        • Instruction ID: 5c87d5b3f10fd34c85154cb02edb1d3c38e0d920e1e83cc5323ae3a8b9b4a56a
                                        • Opcode Fuzzy Hash: ee205efd8a81eac753c2c63a72b4cf7a7c73b8d4fb788ea09eceeed630a7f7da
                                        • Instruction Fuzzy Hash: 47819AB09152418ECB84FF29E9546157EE7FB9F308718E13AF029C72A2EB75A8058F51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 993 1fd2610-1fd26be call 1fd0000 996 1fd26c5-1fd26eb call 1fd3520 CreateFileW 993->996 999 1fd26ed 996->999 1000 1fd26f2-1fd2702 996->1000 1001 1fd283d-1fd2841 999->1001 1007 1fd2709-1fd2723 VirtualAlloc 1000->1007 1008 1fd2704 1000->1008 1002 1fd2883-1fd2886 1001->1002 1003 1fd2843-1fd2847 1001->1003 1009 1fd2889-1fd2890 1002->1009 1005 1fd2849-1fd284c 1003->1005 1006 1fd2853-1fd2857 1003->1006 1005->1006 1012 1fd2859-1fd2863 1006->1012 1013 1fd2867-1fd286b 1006->1013 1014 1fd272a-1fd2741 ReadFile 1007->1014 1015 1fd2725 1007->1015 1008->1001 1010 1fd28e5-1fd28fa 1009->1010 1011 1fd2892-1fd289d 1009->1011 1018 1fd28fc-1fd2907 VirtualFree 1010->1018 1019 1fd290a-1fd2912 1010->1019 1016 1fd289f 1011->1016 1017 1fd28a1-1fd28ad 1011->1017 1012->1013 1020 1fd286d-1fd2877 1013->1020 1021 1fd287b 1013->1021 1022 1fd2748-1fd2788 VirtualAlloc 1014->1022 1023 1fd2743 1014->1023 1015->1001 1016->1010 1026 1fd28af-1fd28bf 1017->1026 1027 1fd28c1-1fd28cd 1017->1027 1018->1019 1020->1021 1021->1002 1024 1fd278f-1fd27aa call 1fd3770 1022->1024 1025 1fd278a 1022->1025 1023->1001 1033 1fd27b5-1fd27bf 1024->1033 1025->1001 1029 1fd28e3 1026->1029 1030 1fd28cf-1fd28d8 1027->1030 1031 1fd28da-1fd28e0 1027->1031 1029->1009 1030->1029 1031->1029 1034 1fd27c1-1fd27f0 call 1fd3770 1033->1034 1035 1fd27f2-1fd2806 call 1fd3580 1033->1035 1034->1033 1041 1fd2808 1035->1041 1042 1fd280a-1fd280e 1035->1042 1041->1001 1043 1fd281a-1fd281e 1042->1043 1044 1fd2810-1fd2814 FindCloseChangeNotification 1042->1044 1045 1fd282e-1fd2837 1043->1045 1046 1fd2820-1fd282b VirtualFree 1043->1046 1044->1043 1045->996 1045->1001 1046->1045
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01FD26E1
                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01FD2907
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2026103312.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1fd0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateFileFreeVirtual
                                        • String ID:
                                        • API String ID: 204039940-0
                                        • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                        • Instruction ID: 73dd5674e373e396813485aab05d5d0ffc708a8955cbded46f39acd14d124e90
                                        • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                        • Instruction Fuzzy Hash: 14A11675E00209EBDB14DFA4C895BFEBBB6FF48304F248159E601BB280D7769A41CB94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1114 5e39e7-5e3a57 CreateWindowExW * 2 ShowWindow * 2
                                        APIs
                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E3A15
                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3A36
                                        • ShowWindow.USER32(00000000,?,?), ref: 005E3A4A
                                        • ShowWindow.USER32(00000000,?,?), ref: 005E3A53
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$CreateShow
                                        • String ID: AutoIt v3$edit
                                        • API String ID: 1584632944-3779509399
                                        • Opcode ID: 1611579a2a83d82b8f536de209265518b350c20483be177f2343e2fbc1ba2c54
                                        • Instruction ID: ba92bf3c62759719a187c8de3453bd83d13758ced594e81b01ed545ed524dd25
                                        • Opcode Fuzzy Hash: 1611579a2a83d82b8f536de209265518b350c20483be177f2343e2fbc1ba2c54
                                        • Instruction Fuzzy Hash: 08F03A70600290BEEB302B23BC08F273E7FD7C7F50B04212AB900A2170C6A62800DEB0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1115 1fd2410-1fd250c call 1fd0000 call 1fd2300 CreateFileW 1122 1fd250e 1115->1122 1123 1fd2513-1fd2523 1115->1123 1124 1fd25c3-1fd25c8 1122->1124 1126 1fd252a-1fd2544 VirtualAlloc 1123->1126 1127 1fd2525 1123->1127 1128 1fd2548-1fd255f ReadFile 1126->1128 1129 1fd2546 1126->1129 1127->1124 1130 1fd2561 1128->1130 1131 1fd2563-1fd259d call 1fd2340 call 1fd1300 1128->1131 1129->1124 1130->1124 1136 1fd259f-1fd25b4 call 1fd2390 1131->1136 1137 1fd25b9-1fd25c1 ExitProcess 1131->1137 1136->1137 1137->1124
                                        APIs
                                          • Part of subcall function 01FD2300: Sleep.KERNELBASE(000001F4), ref: 01FD2311
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01FD2502
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2026103312.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1fd0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateFileSleep
                                        • String ID: D52VHCONV3H
                                        • API String ID: 2694422964-2875186482
                                        • Opcode ID: c23418b155bca6202602b1053a712394eb65cccb1a17b33cf67b664716d02ee3
                                        • Instruction ID: 147410f9b549ff05cac121293afa2ffbb8d6d634a3d89afa679a0ef1d6a7c23d
                                        • Opcode Fuzzy Hash: c23418b155bca6202602b1053a712394eb65cccb1a17b33cf67b664716d02ee3
                                        • Instruction Fuzzy Hash: 6C517131D04249EBEF11DBA4C814BFEBB79AF44300F044199E609BB2C0DB7A5B45CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1139 5e410d-5e4123 1140 5e4129-5e413e call 5e7b76 1139->1140 1141 5e4200-5e4204 1139->1141 1144 5e4144-5e4164 call 5e7d2c 1140->1144 1145 61d5dd-61d5ec LoadStringW 1140->1145 1147 61d5f7-61d60f call 5e7c8e call 5e7143 1144->1147 1150 5e416a-5e416e 1144->1150 1145->1147 1157 5e417e-5e41fb call 603020 call 5e463e call 602ffc Shell_NotifyIconW call 5e5a64 1147->1157 1161 61d615-61d633 call 5e7e0b call 5e7143 call 5e7e0b 1147->1161 1151 5e4174-5e4179 call 5e7c8e 1150->1151 1152 5e4205-5e420e call 5e81a7 1150->1152 1151->1157 1152->1157 1157->1141 1161->1157
                                        APIs
                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0061D5EC
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        • _memset.LIBCMT ref: 005E418D
                                        • _wcscpy.LIBCMT ref: 005E41E1
                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005E41F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                        • String ID: Line:
                                        • API String ID: 3942752672-1585850449
                                        • Opcode ID: 86e172f3a5c2962d8ff88cc032dcdde560e2145f9b3e59fe3994f09e36a56db1
                                        • Instruction ID: dcd465b25b0f90d94b32f8f0fffc18f972471c37bee323027d08ba954de823e4
                                        • Opcode Fuzzy Hash: 86e172f3a5c2962d8ff88cc032dcdde560e2145f9b3e59fe3994f09e36a56db1
                                        • Instruction Fuzzy Hash: BB31E7710083859AD729EB61DC49FDB7BEDBF95300F14491EF1C5920A1EF70AA48CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                        • String ID:
                                        • API String ID: 1559183368-0
                                        • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                        • Instruction ID: b480d6136ec05233afdd40633b31fd4dbcbf1e32e9d7b8770558b1dc9898b6d3
                                        • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                        • Instruction Fuzzy Hash: 18519130A80B05DBDB2C8F6988806AF77A7AF40320F64872DF827963E0D7719D51AF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,006A62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4F6F
                                        • _free.LIBCMT ref: 0061E68C
                                        • _free.LIBCMT ref: 0061E6D3
                                          • Part of subcall function 005E6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005E6D0D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                        • API String ID: 2861923089-1757145024
                                        • Opcode ID: d77d8ca3bccceae5b464a34d392b2d37af60a342015dbb041184741ed395915c
                                        • Instruction ID: 4c4241d65b84e4d11bc20c1c4496d52c8b8a390ac18ad05d724f8a7f5e57bf0d
                                        • Opcode Fuzzy Hash: d77d8ca3bccceae5b464a34d392b2d37af60a342015dbb041184741ed395915c
                                        • Instruction Fuzzy Hash: 3791AF7191025AEFCF08EFA5C8959EDBBB6FF18304F044429F856AB291EB31D945CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,005E35A1,SwapMouseButtons,00000004,?), ref: 005E35D4
                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,005E35A1,SwapMouseButtons,00000004,?,?,?,?,005E2754), ref: 005E35F5
                                        • RegCloseKey.KERNELBASE(00000000,?,?,005E35A1,SwapMouseButtons,00000004,?,?,?,?,005E2754), ref: 005E3617
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID: Control Panel\Mouse
                                        • API String ID: 3677997916-824357125
                                        • Opcode ID: 0628498d27eec9c256ba2700b1771e33c6aa125f58db0b061dac989cf53e0ff0
                                        • Instruction ID: 7e40c5cb043039eb0bdc9d0fbb2d87b4a524f6c0fcc80c8526a4534aedbc38b8
                                        • Opcode Fuzzy Hash: 0628498d27eec9c256ba2700b1771e33c6aa125f58db0b061dac989cf53e0ff0
                                        • Instruction Fuzzy Hash: E6114871510248BFDB24CFA5EC489AEBBB9FF05740F016469E845D7210D2719E409760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 01FD1ABB
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01FD1B51
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01FD1B73
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2026103312.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1fd0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                                        • Instruction ID: cb6e9f6b1c627bd621b895a23c20a6d552a9044eaf284b3086dc49b7e2494425
                                        • Opcode Fuzzy Hash: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                                        • Instruction Fuzzy Hash: 4E621D30A14258DBEB24CFA4C850BEEB772EF58300F1491A9D10DEB390E7769E81CB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                        • String ID:
                                        • API String ID: 2782032738-0
                                        • Opcode ID: 6b900c82ae833c016f0ad4fafe5841f230cacf6ecaddb2f96621bb99e00bcb06
                                        • Instruction ID: 912b7b383ddb722399be8faf1f815faa46a0e46e05ea85265b6a9832b25d812f
                                        • Opcode Fuzzy Hash: 6b900c82ae833c016f0ad4fafe5841f230cacf6ecaddb2f96621bb99e00bcb06
                                        • Instruction Fuzzy Hash: 2241B3B0B806069BDB3CCEA9C8809AF77A7EF84360B24817DEA55876D4DE709D418B44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: AU3!P/g$EA06
                                        • API String ID: 4104443479-1337525066
                                        • Opcode ID: 7fb6d3dada1a75a3920d273eb8eb3e51485e0b3eb6ea0655943742ebbd9f2439
                                        • Instruction ID: 30f1db97d91ecacb1c3bebffad5d0eee9070bebdbcc8cb9d8956c6a82fcb1e84
                                        • Opcode Fuzzy Hash: 7fb6d3dada1a75a3920d273eb8eb3e51485e0b3eb6ea0655943742ebbd9f2439
                                        • Instruction Fuzzy Hash: 67417C22A041D45BCF2D5F6688557BF7FAABF45300F2C44A5F8C2AB282D6219D448BE2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0061EE62
                                        • GetOpenFileNameW.COMDLG32(?), ref: 0061EEAC
                                          • Part of subcall function 005E48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E48A1,?,?,005E37C0,?), ref: 005E48CE
                                          • Part of subcall function 006009D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006009F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Name$Path$FileFullLongOpen_memset
                                        • String ID: X
                                        • API String ID: 3777226403-3081909835
                                        • Opcode ID: 3153ec57cb965dc8dd9bc166cb3d33702b088bdcefea8a14eae8009864226c84
                                        • Instruction ID: c671ca9856421a2e46a05b07e4e6a60c8c7e621e925897a8c1e1118ea405b6eb
                                        • Opcode Fuzzy Hash: 3153ec57cb965dc8dd9bc166cb3d33702b088bdcefea8a14eae8009864226c84
                                        • Instruction Fuzzy Hash: 4C21C67190429C9BDF55DF94C8457EE7FFDAF49300F04401AE449E7281DBB459898FA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __fread_nolock_memmove
                                        • String ID: EA06
                                        • API String ID: 1988441806-3962188686
                                        • Opcode ID: 3a6d02ef760ec360c564a4928c68a874ed9137f7c4248346a45b833af5ea23eb
                                        • Instruction ID: fe2365ac2eb875910aa4c60e99ca303d34c39325a63fa642ac6320d4670fd9cb
                                        • Opcode Fuzzy Hash: 3a6d02ef760ec360c564a4928c68a874ed9137f7c4248346a45b833af5ea23eb
                                        • Instruction Fuzzy Hash: F701F971844218AEDB28C6A8C816EFF7BFC9B11701F00419EF593D21C1E5B5A6088BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00649B82
                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00649B99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Temp$FileNamePath
                                        • String ID: aut
                                        • API String ID: 3285503233-3010740371
                                        • Opcode ID: dfd5c315394f029846c37dfc9db99c9fc0d805993363b81b941aac22c242fc9a
                                        • Instruction ID: d263780155123e769c132a17610486925c22c52ffd5699014b1bdbffd3314f1a
                                        • Opcode Fuzzy Hash: dfd5c315394f029846c37dfc9db99c9fc0d805993363b81b941aac22c242fc9a
                                        • Instruction Fuzzy Hash: F6D05E7954030DABDB109BD0EC0EF9A776DE704B04F0052A1FE54910A1DEF056988FD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 062cc5b229d30859b53f8384e85a26e665feeaa0e34f9f9fa94372601c7a7994
                                        • Instruction ID: 25bf85d61bd3e7a2da7fc160aa565d02cbc7b4f0b9495d623e3fca06c267c528
                                        • Opcode Fuzzy Hash: 062cc5b229d30859b53f8384e85a26e665feeaa0e34f9f9fa94372601c7a7994
                                        • Instruction Fuzzy Hash: 74F139706083419FC724DF29C484A6ABBE6FF88314F14896DF8999B391D771E946CF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 005E4401
                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E44A6
                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005E44C3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_$_memset
                                        • String ID:
                                        • API String ID: 1505330794-0
                                        • Opcode ID: 6e8feb5e2ce7b55d45fa0004af9c6d18a454f0ffc8976f411d85bc569c82be10
                                        • Instruction ID: 7aea0ded18b8ed11463b872c8a96b875ef55727dfdfd413f66995afa65ed525b
                                        • Opcode Fuzzy Hash: 6e8feb5e2ce7b55d45fa0004af9c6d18a454f0ffc8976f411d85bc569c82be10
                                        • Instruction Fuzzy Hash: 183181B06043518FDB24DF25D88479BBBE9FB49304F04092EF5DA83291D7B1AA44CF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __FF_MSGBANNER.LIBCMT ref: 00605963
                                          • Part of subcall function 0060A3AB: __NMSG_WRITE.LIBCMT ref: 0060A3D2
                                          • Part of subcall function 0060A3AB: __NMSG_WRITE.LIBCMT ref: 0060A3DC
                                        • __NMSG_WRITE.LIBCMT ref: 0060596A
                                          • Part of subcall function 0060A408: GetModuleFileNameW.KERNEL32(00000000,006A43BA,00000104,?,00000001,00000000), ref: 0060A49A
                                          • Part of subcall function 0060A408: ___crtMessageBoxW.LIBCMT ref: 0060A548
                                          • Part of subcall function 006032DF: ___crtCorExitProcess.LIBCMT ref: 006032E5
                                          • Part of subcall function 006032DF: ExitProcess.KERNEL32 ref: 006032EE
                                          • Part of subcall function 00608D68: __getptd_noexit.LIBCMT ref: 00608D68
                                        • RtlAllocateHeap.NTDLL(013A0000,00000000,00000001,00000000,?,?,?,00601013,?), ref: 0060598F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                        • String ID:
                                        • API String ID: 1372826849-0
                                        • Opcode ID: 6189bd6274266b2158a2f296d280ffdd580ddd269348a8c07db840a7658af0c0
                                        • Instruction ID: f9710bd856d647e236629ee44d3835abb149c602251205d48c36f75664d5966c
                                        • Opcode Fuzzy Hash: 6189bd6274266b2158a2f296d280ffdd580ddd269348a8c07db840a7658af0c0
                                        • Instruction Fuzzy Hash: 1A01D2312C0B51DEE65D7B64EC42BAF738B8F92771F10012EF4029B2D1DEB09D018A69
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,006497D2,?,?,?,?,?,00000004), ref: 00649B45
                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,006497D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00649B5B
                                        • CloseHandle.KERNEL32(00000000,?,006497D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00649B62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: File$CloseCreateHandleTime
                                        • String ID:
                                        • API String ID: 3397143404-0
                                        • Opcode ID: a241cf019be0b41e35c20d12052098070c612fd9198be72d60d64dd33113bfc4
                                        • Instruction ID: a0b657fcb113fc1655e1814564755e4e072f69a46004b7ef959e3d9fa6c7129e
                                        • Opcode Fuzzy Hash: a241cf019be0b41e35c20d12052098070c612fd9198be72d60d64dd33113bfc4
                                        • Instruction Fuzzy Hash: C3E08632181214B7D7211B54FC09FCA7B5AEB067A1F104120FB54791E087F129119798
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 00648FA5
                                          • Part of subcall function 00602F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00609C64), ref: 00602FA9
                                          • Part of subcall function 00602F95: GetLastError.KERNEL32(00000000,?,00609C64), ref: 00602FBB
                                        • _free.LIBCMT ref: 00648FB6
                                        • _free.LIBCMT ref: 00648FC8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                                        • Instruction ID: 7bfd1b235c114e89c9597d958bfb5c38a9fa538ac31c466c2ef2f695c4a5d20b
                                        • Opcode Fuzzy Hash: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                                        • Instruction Fuzzy Hash: 1AE012A16497034ECBA8A978AD54AD757EF9F483D0758081DB419DB282DE24E8558128
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CALL
                                        • API String ID: 0-4196123274
                                        • Opcode ID: 38161a1aa3a655778cab87dd4e86435839c9dd88d0ad1efc4d41e0c07f088dd3
                                        • Instruction ID: 82008a7e15362ab1843d4cb8e11d709bd5595943599a2f8319249eb1cad81998
                                        • Opcode Fuzzy Hash: 38161a1aa3a655778cab87dd4e86435839c9dd88d0ad1efc4d41e0c07f088dd3
                                        • Instruction Fuzzy Hash: D3224970508291DFD728DF25C494B6ABBE2BF85300F14895DE8DA8B362D731ED85CB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscmp
                                        • String ID: ^
                                        • API String ID: 856254489-1590793086
                                        • Opcode ID: 7f2d62c73df6da5c22bb4e943cfeb3efb33f0af5dbdfd5e4493c55633f341cf1
                                        • Instruction ID: d638aa4ea12da63fcf1b5b76892bfc63822d3c8285843dc98e8cdacbc275a3d0
                                        • Opcode Fuzzy Hash: 7f2d62c73df6da5c22bb4e943cfeb3efb33f0af5dbdfd5e4493c55633f341cf1
                                        • Instruction Fuzzy Hash: 3E11C4329082D55FDB19DB29C8916DAFF75EF57360F15409BD8D0AB2A1E2309C42CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsThemeActive.UXTHEME ref: 005E4992
                                          • Part of subcall function 006035AC: __lock.LIBCMT ref: 006035B2
                                          • Part of subcall function 006035AC: DecodePointer.KERNEL32(00000001,?,005E49A7,006381BC), ref: 006035BE
                                          • Part of subcall function 006035AC: EncodePointer.KERNEL32(?,?,005E49A7,006381BC), ref: 006035C9
                                          • Part of subcall function 005E4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 005E4A73
                                          • Part of subcall function 005E4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E4A88
                                          • Part of subcall function 005E3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005E3B7A
                                          • Part of subcall function 005E3B4C: IsDebuggerPresent.KERNEL32 ref: 005E3B8C
                                          • Part of subcall function 005E3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,006A62F8,006A62E0,?,?), ref: 005E3BFD
                                          • Part of subcall function 005E3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 005E3C81
                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E49D2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                        • String ID:
                                        • API String ID: 1438897964-0
                                        • Opcode ID: b787c53b419ecb9f778da50017601f560f740c8e5f8847666998e18a2936d6a0
                                        • Instruction ID: 57510d20ac28380fa8f76f1bd5b1494b90f87e3564825f3925986f3ebf6e01ab
                                        • Opcode Fuzzy Hash: b787c53b419ecb9f778da50017601f560f740c8e5f8847666998e18a2936d6a0
                                        • Instruction Fuzzy Hash: 5D116A719183529BC304EF2AEC0990AFFE9FF99710F00552EF095872A1DBB0A644CF96
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,005E5981,?,?,?,?), ref: 005E5E27
                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,005E5981,?,?,?,?), ref: 0061E19C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 16ba365636afaab204d963721fd60f9dd516de15f6c58f7a57f2bb9b1d71300a
                                        • Instruction ID: 4c513ea13005d13c4fe832d6440abdc1152d64f85fc25250636c4d4ad0276c2b
                                        • Opcode Fuzzy Hash: 16ba365636afaab204d963721fd60f9dd516de15f6c58f7a57f2bb9b1d71300a
                                        • Instruction Fuzzy Hash: EF019270244748BEF3280E25DC8AFA67B9CBB0176CF108318FAE55A1E0D6B05E458B50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0060594C: __FF_MSGBANNER.LIBCMT ref: 00605963
                                          • Part of subcall function 0060594C: __NMSG_WRITE.LIBCMT ref: 0060596A
                                          • Part of subcall function 0060594C: RtlAllocateHeap.NTDLL(013A0000,00000000,00000001,00000000,?,?,?,00601013,?), ref: 0060598F
                                        • std::exception::exception.LIBCMT ref: 0060102C
                                        • __CxxThrowException@8.LIBCMT ref: 00601041
                                          • Part of subcall function 006087DB: RaiseException.KERNEL32(?,?,?,0069BAF8,00000000,?,?,?,?,00601046,?,0069BAF8,?,00000001), ref: 00608830
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                        • String ID:
                                        • API String ID: 3902256705-0
                                        • Opcode ID: eb7fc64e9298ab46139bdda8d737341eb4853ad45e1fef97ff2408df6ee9f169
                                        • Instruction ID: 2a21c8084cd095fd7ae4eb8624c0a25f13fc6c6f109f5e834e52dc77b6005b65
                                        • Opcode Fuzzy Hash: eb7fc64e9298ab46139bdda8d737341eb4853ad45e1fef97ff2408df6ee9f169
                                        • Instruction Fuzzy Hash: E9F0F93458031DA6CB29EE58EC119DF7BAEDF01350F104019F889966D1DF718A909694
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __lock_file_memset
                                        • String ID:
                                        • API String ID: 26237723-0
                                        • Opcode ID: 5d64e461518485be6d7b2f99f57fb75aeb1c11062bb04b0688f20a3a73ee03d6
                                        • Instruction ID: 6c80e21c583466c0ba31589f9daa691a1215365f6ecdeb0ca9bf17f693870d66
                                        • Opcode Fuzzy Hash: 5d64e461518485be6d7b2f99f57fb75aeb1c11062bb04b0688f20a3a73ee03d6
                                        • Instruction Fuzzy Hash: F901B131880A19EBCF6AAF698C0148F7B63AF80360F048219B8155B2E1DB31CA21DF95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00608D68: __getptd_noexit.LIBCMT ref: 00608D68
                                        • __lock_file.LIBCMT ref: 0060561B
                                          • Part of subcall function 00606E4E: __lock.LIBCMT ref: 00606E71
                                        • __fclose_nolock.LIBCMT ref: 00605626
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                        • String ID:
                                        • API String ID: 2800547568-0
                                        • Opcode ID: 519b519d6275bbd6855228dce94a673b9906855aad945b39048df0cc29040ff3
                                        • Instruction ID: f1f5427f56be9259e985b9e14b8e8b319bbbf26b428d2d9ba4b7ee132c740faa
                                        • Opcode Fuzzy Hash: 519b519d6275bbd6855228dce94a673b9906855aad945b39048df0cc29040ff3
                                        • Instruction Fuzzy Hash: 25F0F031890B019EDBA8AB74C80276F77A32F40334F55820EA452AB1D1CFBC89029F49
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 01FD1ABB
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01FD1B51
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01FD1B73
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2026103312.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1fd0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                        • Instruction ID: 22e84fc22c9875e4ce32267e4d6c80bc11c2979e619058f957e255b4d2d3b844
                                        • Opcode Fuzzy Hash: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                        • Instruction Fuzzy Hash: 7612DF24E18658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5132619147255654998fe2637bcfaef8c3cb6f68d89a427af21dbd40fe19860d
                                        • Instruction ID: af6f46ca2775eaf9dc4c78cfd014d36c99e0bfcd8da802a4b387cc8fa70efc37
                                        • Opcode Fuzzy Hash: 5132619147255654998fe2637bcfaef8c3cb6f68d89a427af21dbd40fe19860d
                                        • Instruction Fuzzy Hash: 8E61BE7060068A9FDB18DF65D880AABBBE5FF44300F14847EE9968B281EB70ED51CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e0bb24ef1cced1a33958258f4a4586c9f499818acc7fe23d3046bfaf2ecb519
                                        • Instruction ID: cb93a0486f5581b7ce38f2ec06420665e37ebb0c51afad7e55eb081607ecd2d5
                                        • Opcode Fuzzy Hash: 1e0bb24ef1cced1a33958258f4a4586c9f499818acc7fe23d3046bfaf2ecb519
                                        • Instruction Fuzzy Hash: 2651AF34600615AFCF18EB68C995FBE7BA6BF85310F148068F946AB382DE34ED00CB45
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 005E5CF6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: dcf76eaa46fe5855c183c4c80cc777a64c0851fd2be3bc9c658017db0ed362a9
                                        • Instruction ID: 23a1475ed7cc1dca830768d51d4258c15bce91ced0ef61d72c82303f109c46b6
                                        • Opcode Fuzzy Hash: dcf76eaa46fe5855c183c4c80cc777a64c0851fd2be3bc9c658017db0ed362a9
                                        • Instruction Fuzzy Hash: F9316071A00B4AAFCB18CF2EC99469DBBB5FF88314F248629D85993710E771BD50DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 05e57ad114cc774572be363f90e838a81ddad3e05a2cb0c3cd837da50bde506e
                                        • Instruction ID: acbf19914e59d13997a5a593ad41a79258207d27d028c80164fe3bfbf4b76a37
                                        • Opcode Fuzzy Hash: 05e57ad114cc774572be363f90e838a81ddad3e05a2cb0c3cd837da50bde506e
                                        • Instruction Fuzzy Hash: 0B410874504791CFEB18DF25C484B1ABBE1BF45314F1988ACE8994B762C731E885CF56
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 75a253a3b5936dfb5ba063aea72c4cbdc6df311c0a88823a2ddca8c3e265d3e6
                                        • Instruction ID: aeaedafb09cc7574bc5cf85f3a54c1008959b5d8d2bb2bdc2f978970b771701b
                                        • Opcode Fuzzy Hash: 75a253a3b5936dfb5ba063aea72c4cbdc6df311c0a88823a2ddca8c3e265d3e6
                                        • Instruction Fuzzy Hash: 5821F031A00A08EBDB145F12E8856AA7FBEFF14390F25886EF886C5410EB72C4E08745
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscmp
                                        • String ID:
                                        • API String ID: 856254489-0
                                        • Opcode ID: 4da7022922b8d34942b19728ef89d59458f1ac5751ef07c82a72115ff01b0df2
                                        • Instruction ID: 13a2bb77ba67155a4069e0ef4bb28e8522435815ec964d145f75d08dc0df9d6f
                                        • Opcode Fuzzy Hash: 4da7022922b8d34942b19728ef89d59458f1ac5751ef07c82a72115ff01b0df2
                                        • Instruction Fuzzy Hash: A711D87290415ADBCF18EF9ADC858EEFB79FF95350F10412AE8519B190E7309D06CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E4D13: FreeLibrary.KERNEL32(00000000,?), ref: 005E4D4D
                                          • Part of subcall function 0060548B: __wfsopen.LIBCMT ref: 00605496
                                        • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,006A62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4F6F
                                          • Part of subcall function 005E4CC8: FreeLibrary.KERNEL32(00000000), ref: 005E4D02
                                          • Part of subcall function 005E4DD0: _memmove.LIBCMT ref: 005E4E1A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Library$Free$Load__wfsopen_memmove
                                        • String ID:
                                        • API String ID: 1396898556-0
                                        • Opcode ID: 78c377bbbaa31612bfc12609514407a78da94abab5f5f3e61de2a487cc2adf35
                                        • Instruction ID: 9a6ea2e6b1bb86017732d4aba18b4c7557f9296ab8c2a806a42708914a3f4a32
                                        • Opcode Fuzzy Hash: 78c377bbbaa31612bfc12609514407a78da94abab5f5f3e61de2a487cc2adf35
                                        • Instruction Fuzzy Hash: 11110D31A00306ABCB18FF71DC1AFAE7BA5AF80B00F10842DF591972C1DE719A059F50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 1084bfdc1bf60068a43c6f29d797492eaff10b9a1bb53539fc728db787515d34
                                        • Instruction ID: 5114686f8464c845adff0e4e8ec1cdb38a9eaede8768dd7e21601cf137e34951
                                        • Opcode Fuzzy Hash: 1084bfdc1bf60068a43c6f29d797492eaff10b9a1bb53539fc728db787515d34
                                        • Instruction Fuzzy Hash: 582102B4508391DFDB18DF24C444A1ABBE5BF85304F05896CE8DA4B762D731F845CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,005E5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 005E5D76
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: d34862c0de61c5334e63b87e19bfbb09f84e37173ef0767eb702dc895a909f24
                                        • Instruction ID: 60d65b82d0cad9b6ef5c513653b64e03dbcb95cb66e439b0251d31e73cd8b0b2
                                        • Opcode Fuzzy Hash: d34862c0de61c5334e63b87e19bfbb09f84e37173ef0767eb702dc895a909f24
                                        • Instruction Fuzzy Hash: 56113D31200B419FD3348F16C944B62BBE9FF45754F14C92DE5EA86A50E7B0EA45CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                                        • Instruction ID: 1bc0ba9243efae96692fe48a879f3fe9f6757d51183e9ca0ecc72450277e2124
                                        • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                                        • Instruction Fuzzy Hash: EE01A775600542AFC309DB69C842D26FBAAFF863147148159F855C7702EB71EC21CBE0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __lock_file.LIBCMT ref: 00604AD6
                                          • Part of subcall function 00608D68: __getptd_noexit.LIBCMT ref: 00608D68
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __getptd_noexit__lock_file
                                        • String ID:
                                        • API String ID: 2597487223-0
                                        • Opcode ID: 0bdb8d600f35aac41c08c8bdaae75c00d578fc37630ff1d0ba784e97b421865b
                                        • Instruction ID: 12f4d6292bfbafd71d2a6978d476f5060cd28ae6624d103eff146eaabc7531c1
                                        • Opcode Fuzzy Hash: 0bdb8d600f35aac41c08c8bdaae75c00d578fc37630ff1d0ba784e97b421865b
                                        • Instruction Fuzzy Hash: 98F081719C0209AFDFA9AF64C8063DF3663AF00325F044518B5149B1D5CF788951DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FreeLibrary.KERNEL32(?,?,006A62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4FDE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 27e6d8b186249e78355503d0972a83417044ccf5aaaae59c3bfb944436db1251
                                        • Instruction ID: 9dab0f9fa704ec79147d000f86170afdaba28b0ed022fd43658216da6b9dcb63
                                        • Opcode Fuzzy Hash: 27e6d8b186249e78355503d0972a83417044ccf5aaaae59c3bfb944436db1251
                                        • Instruction Fuzzy Hash: A9F015B1105752CFCB389F66E894812BBE2BF047293208A3EE1E682B10C771A840DF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006009F4
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LongNamePath_memmove
                                        • String ID:
                                        • API String ID: 2514874351-0
                                        • Opcode ID: ef159746d599483057da056aa06aea74e48009e0f506411b3a9f8d4d5790a507
                                        • Instruction ID: fbcde0dbb6d7b24b137070c84a9a7f4cea998ddeeb0edb54a575886b95384cf2
                                        • Opcode Fuzzy Hash: ef159746d599483057da056aa06aea74e48009e0f506411b3a9f8d4d5790a507
                                        • Instruction Fuzzy Hash: A6E0867690422C57C720D6989C15FFA77ADDF89790F0401B5FD4CD7204D9A09D818690
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __fread_nolock
                                        • String ID:
                                        • API String ID: 2638373210-0
                                        • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                        • Instruction ID: d6f41622eb517e83a25c3142c9b61f67bfc8760f61cc28a4b308d49684ac11dd
                                        • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                        • Instruction Fuzzy Hash: A4E092B0144B005FD7388A24D8107E373E1AB06315F00081DF6AB83341EB6278418B5D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0061E16B,?,?,00000000), ref: 005E5DBF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: aecc00bbe54958e6032147d32a61792cad8cd619fce9e1b0025a590de655133e
                                        • Instruction ID: b3b3f6d5fa5da840da5c51c6947508daad5583ce47bc9e10e8882b69237fd229
                                        • Opcode Fuzzy Hash: aecc00bbe54958e6032147d32a61792cad8cd619fce9e1b0025a590de655133e
                                        • Instruction Fuzzy Hash: EED0C77464420CBFE710DB80DC46FA9B77DD705710F100194FD0456290D6F27D508795
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __wfsopen
                                        • String ID:
                                        • API String ID: 197181222-0
                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction ID: a5ccd7e311a192d0c31135787fdf5e29d1bcbb2408dfbfb978c74dc73865e66b
                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction Fuzzy Hash: D8B09B7544010C77DE411D41EC02A563B595740774F404020FB0C18161957395605589
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTempPathW.KERNEL32(00000104,?), ref: 0062221A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: PathTemp
                                        • String ID:
                                        • API String ID: 2920410445-0
                                        • Opcode ID: 183d8b214816355622e3f59f028f5e9d66c2eff8fb865b0e35e78d9ce2c709ea
                                        • Instruction ID: 361110c0bed3c1a1042e15757cd5c5ce2b818cc8a4f91f00559026a91b998cea
                                        • Opcode Fuzzy Hash: 183d8b214816355622e3f59f028f5e9d66c2eff8fb865b0e35e78d9ce2c709ea
                                        • Instruction Fuzzy Hash: C0C09B704540199FF719A750DCE5BB9733DFF11701F1000D5B14595090D5F45B45CF11
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(00000002,00000000), ref: 0064D46A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID:
                                        • API String ID: 1452528299-0
                                        • Opcode ID: 1936d13ba0e51870b7fa7d2cee715d27a861c50fcab83ce9d1d4ff6cc53c0bfa
                                        • Instruction ID: 7e46ee7f61e0f33b9575eb86503d1c3e3c3eee5a7f2eac7c355fdc8f94e636d4
                                        • Opcode Fuzzy Hash: 1936d13ba0e51870b7fa7d2cee715d27a861c50fcab83ce9d1d4ff6cc53c0bfa
                                        • Instruction Fuzzy Hash: 4E7163346043428FC718EF25C495AAEBBE1BF89314F04456DF8969B3A2DB70ED49CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction ID: 7faf2722682edf5904f0f54f9a45e5211273b0e9edba9ed5fbe9acdedf81b85b
                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction Fuzzy Hash: AC31B571A80106DBE718DF58D480AAAF7A6FF59300F648AA5E409DB792D731EDC1DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • Sleep.KERNELBASE(000001F4), ref: 01FD2311
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2026103312.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1fd0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction ID: 9a3e81ad600ae5c20de31528191ea26080011f5e3c2ebb01ebcf9ea46cd6f94d
                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction Fuzzy Hash: 4FE0E67494010DDFDB00EFB8D5496AE7FB4EF04301F100561FD01D2281DB319D508A72
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0066CE50
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0066CE91
                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0066CED6
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0066CF00
                                        • SendMessageW.USER32 ref: 0066CF29
                                        • _wcsncpy.LIBCMT ref: 0066CFA1
                                        • GetKeyState.USER32(00000011), ref: 0066CFC2
                                        • GetKeyState.USER32(00000009), ref: 0066CFCF
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0066CFE5
                                        • GetKeyState.USER32(00000010), ref: 0066CFEF
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0066D018
                                        • SendMessageW.USER32 ref: 0066D03F
                                        • SendMessageW.USER32(?,00001030,?,0066B602), ref: 0066D145
                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0066D15B
                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0066D16E
                                        • SetCapture.USER32(?), ref: 0066D177
                                        • ClientToScreen.USER32(?,?), ref: 0066D1DC
                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0066D1E9
                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0066D203
                                        • ReleaseCapture.USER32 ref: 0066D20E
                                        • GetCursorPos.USER32(?), ref: 0066D248
                                        • ScreenToClient.USER32(?,?), ref: 0066D255
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0066D2B1
                                        • SendMessageW.USER32 ref: 0066D2DF
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0066D31C
                                        • SendMessageW.USER32 ref: 0066D34B
                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0066D36C
                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0066D37B
                                        • GetCursorPos.USER32(?), ref: 0066D39B
                                        • ScreenToClient.USER32(?,?), ref: 0066D3A8
                                        • GetParent.USER32(?), ref: 0066D3C8
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0066D431
                                        • SendMessageW.USER32 ref: 0066D462
                                        • ClientToScreen.USER32(?,?), ref: 0066D4C0
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0066D4F0
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0066D51A
                                        • SendMessageW.USER32 ref: 0066D53D
                                        • ClientToScreen.USER32(?,?), ref: 0066D58F
                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0066D5C3
                                          • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0066D65F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                        • String ID: @GUI_DRAGID$F$prj
                                        • API String ID: 3977979337-3855507934
                                        • Opcode ID: 74a9f9806c2b6e631acf5e227eb837fc807ff8c9f5f91aba2e10f939e11bdd99
                                        • Instruction ID: bf167db35566874b982f75c4d506cd75a2d72f764d0212c4d03019fa4d5a3189
                                        • Opcode Fuzzy Hash: 74a9f9806c2b6e631acf5e227eb837fc807ff8c9f5f91aba2e10f939e11bdd99
                                        • Instruction Fuzzy Hash: 00429D70604641AFC725DF28C848EAABBF6FF49324F14451DF6A6873A1C772A851CF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0066873F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: %d/%02d/%02d
                                        • API String ID: 3850602802-328681919
                                        • Opcode ID: e46c97d931a5a521780f99ba3c8480cf7f6f97c288e111183c990a4bca7a5809
                                        • Instruction ID: 1ef113d1cccf04fce4ae77ca91521bbe56eeefea83a0296686ed653a6d8c1228
                                        • Opcode Fuzzy Hash: e46c97d931a5a521780f99ba3c8480cf7f6f97c288e111183c990a4bca7a5809
                                        • Instruction Fuzzy Hash: 5512AD71540249AFEB258F34DC49FAE7BBAEF85710F244229F916EB2E1DB708941CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove$_memset
                                        • String ID: 0wi$DEFINE$Oa_$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                        • API String ID: 1357608183-3055020554
                                        • Opcode ID: 3ef4fa534e0531ad2f5abb3349e61f80d6f0e9f588a76547bc818ca35c4eed54
                                        • Instruction ID: 148ccbfc3ca4cae700d40abaecc068d5f62389f0126fef2ea55bc709ec6cd35f
                                        • Opcode Fuzzy Hash: 3ef4fa534e0531ad2f5abb3349e61f80d6f0e9f588a76547bc818ca35c4eed54
                                        • Instruction Fuzzy Hash: 9D939275A0421A9BDB24CF58C8917FDB7B2FF48310F25856AE945AB381E7749E81CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetForegroundWindow.USER32(00000000,?), ref: 005E4A3D
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0061DA8E
                                        • IsIconic.USER32(?), ref: 0061DA97
                                        • ShowWindow.USER32(?,00000009), ref: 0061DAA4
                                        • SetForegroundWindow.USER32(?), ref: 0061DAAE
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0061DAC4
                                        • GetCurrentThreadId.KERNEL32 ref: 0061DACB
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0061DAD7
                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0061DAE8
                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0061DAF0
                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 0061DAF8
                                        • SetForegroundWindow.USER32(?), ref: 0061DAFB
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061DB10
                                        • keybd_event.USER32(00000012,00000000), ref: 0061DB1B
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061DB25
                                        • keybd_event.USER32(00000012,00000000), ref: 0061DB2A
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061DB33
                                        • keybd_event.USER32(00000012,00000000), ref: 0061DB38
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0061DB42
                                        • keybd_event.USER32(00000012,00000000), ref: 0061DB47
                                        • SetForegroundWindow.USER32(?), ref: 0061DB4A
                                        • AttachThreadInput.USER32(?,?,00000000), ref: 0061DB71
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 4125248594-2988720461
                                        • Opcode ID: 06951b1d4bcc90542eccdfb05f4e81bf1753e12032d0012b1084975278cb89f4
                                        • Instruction ID: 094d566a0c1c5564c534a543cbed35a19fba9c5bf43c169c6cd5c78e9dc7b7d3
                                        • Opcode Fuzzy Hash: 06951b1d4bcc90542eccdfb05f4e81bf1753e12032d0012b1084975278cb89f4
                                        • Instruction Fuzzy Hash: F331C671A40318BFEB206FA1AC49FBF3E6EEB44B50F155025FA01EA1D0C6F05D40ABA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00638CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00638D0D
                                          • Part of subcall function 00638CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638D3A
                                          • Part of subcall function 00638CC3: GetLastError.KERNEL32 ref: 00638D47
                                        • _memset.LIBCMT ref: 0063889B
                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006388ED
                                        • CloseHandle.KERNEL32(?), ref: 006388FE
                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00638915
                                        • GetProcessWindowStation.USER32 ref: 0063892E
                                        • SetProcessWindowStation.USER32(00000000), ref: 00638938
                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00638952
                                          • Part of subcall function 00638713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00638851), ref: 00638728
                                          • Part of subcall function 00638713: CloseHandle.KERNEL32(?,?,00638851), ref: 0063873A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                        • String ID: $default$winsta0
                                        • API String ID: 2063423040-1027155976
                                        • Opcode ID: 2c6b013f6f701a077fbd81dc9f0fe76088f437fdf4fba7f9bc277e9c7897ff49
                                        • Instruction ID: ca6b631418e6110799b72d7b6d2bcae81fbbc983d5ebe46da28e520143e06021
                                        • Opcode Fuzzy Hash: 2c6b013f6f701a077fbd81dc9f0fe76088f437fdf4fba7f9bc277e9c7897ff49
                                        • Instruction Fuzzy Hash: 64812971900349AFDF11DFA4DC45AEEBBBAEF04304F18516AF910A72A1DB718E15DBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OpenClipboard.USER32(0066F910), ref: 00654284
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00654292
                                        • GetClipboardData.USER32(0000000D), ref: 0065429A
                                        • CloseClipboard.USER32 ref: 006542A6
                                        • GlobalLock.KERNEL32(00000000), ref: 006542C2
                                        • CloseClipboard.USER32 ref: 006542CC
                                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 006542E1
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 006542EE
                                        • GetClipboardData.USER32(00000001), ref: 006542F6
                                        • GlobalLock.KERNEL32(00000000), ref: 00654303
                                        • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00654337
                                        • CloseClipboard.USER32 ref: 00654447
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                        • String ID:
                                        • API String ID: 3222323430-0
                                        • Opcode ID: 0f9b24cfc881df526fe9733170703c607e21d9a0db0363ed13670aeb2fe03e47
                                        • Instruction ID: b43e6986d1e36a2561e3857c66b7c93ec4c0ca570dd3158c10b9f43df0901522
                                        • Opcode Fuzzy Hash: 0f9b24cfc881df526fe9733170703c607e21d9a0db0363ed13670aeb2fe03e47
                                        • Instruction Fuzzy Hash: E851B5312043026BD300EF61EC99FBE77AABF84B05F104569F996D21A1DFB0D9498B62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 0064C9F8
                                        • FindClose.KERNEL32(00000000), ref: 0064CA4C
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0064CA71
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0064CA88
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0064CAAF
                                        • __swprintf.LIBCMT ref: 0064CAFB
                                        • __swprintf.LIBCMT ref: 0064CB3E
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                        • __swprintf.LIBCMT ref: 0064CB92
                                          • Part of subcall function 006038D8: __woutput_l.LIBCMT ref: 00603931
                                        • __swprintf.LIBCMT ref: 0064CBE0
                                          • Part of subcall function 006038D8: __flsbuf.LIBCMT ref: 00603953
                                          • Part of subcall function 006038D8: __flsbuf.LIBCMT ref: 0060396B
                                        • __swprintf.LIBCMT ref: 0064CC2F
                                        • __swprintf.LIBCMT ref: 0064CC7E
                                        • __swprintf.LIBCMT ref: 0064CCCD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                        • API String ID: 3953360268-2428617273
                                        • Opcode ID: 0b058119326f89cd79e33258859fcb0789dd693b107e9f6587925b8c6c9b3857
                                        • Instruction ID: 6f7fb986d4fa5370a547a18e1d2639dc5efdc4436613bee5ebce9d1df225559a
                                        • Opcode Fuzzy Hash: 0b058119326f89cd79e33258859fcb0789dd693b107e9f6587925b8c6c9b3857
                                        • Instruction Fuzzy Hash: 56A150B1508345ABC744EB65C889DAFBBEDFF98700F40492DF585C3291EA74DA08CB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0064F221
                                        • _wcscmp.LIBCMT ref: 0064F236
                                        • _wcscmp.LIBCMT ref: 0064F24D
                                        • GetFileAttributesW.KERNEL32(?), ref: 0064F25F
                                        • SetFileAttributesW.KERNEL32(?,?), ref: 0064F279
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0064F291
                                        • FindClose.KERNEL32(00000000), ref: 0064F29C
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0064F2B8
                                        • _wcscmp.LIBCMT ref: 0064F2DF
                                        • _wcscmp.LIBCMT ref: 0064F2F6
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0064F308
                                        • SetCurrentDirectoryW.KERNEL32(0069A5A0), ref: 0064F326
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0064F330
                                        • FindClose.KERNEL32(00000000), ref: 0064F33D
                                        • FindClose.KERNEL32(00000000), ref: 0064F34F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                        • String ID: *.*
                                        • API String ID: 1803514871-438819550
                                        • Opcode ID: 1a2a43f0abecf79608ca29b7fcdfd927b2b8599b4c9e0418ad4298ec112e5130
                                        • Instruction ID: 87611b93f8264b1c1a00b17950dd263ad4b84c4bd97307fc6accacf4ddf8d590
                                        • Opcode Fuzzy Hash: 1a2a43f0abecf79608ca29b7fcdfd927b2b8599b4c9e0418ad4298ec112e5130
                                        • Instruction Fuzzy Hash: 7131C3766002196BDF11DFF4EC58ADE77AEAF08361F100176E814E3290EBB1DB45CAA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00660BDE
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0066F910,00000000,?,00000000,?,?), ref: 00660C4C
                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00660C94
                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00660D1D
                                        • RegCloseKey.ADVAPI32(?), ref: 0066103D
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0066104A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Close$ConnectCreateRegistryValue
                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                        • API String ID: 536824911-966354055
                                        • Opcode ID: 1af763f8330f0f8814a2baab4960bd54b68bd77683baa75ba0ed6d6d39f68237
                                        • Instruction ID: 493f1a7d17774c63fd682b3d5a6e4ff7ac5061d1c52b0e08a0101476f8a78d79
                                        • Opcode Fuzzy Hash: 1af763f8330f0f8814a2baab4960bd54b68bd77683baa75ba0ed6d6d39f68237
                                        • Instruction Fuzzy Hash: 110271752006529FDB14DF15C895E2ABBE6FF89714F04886DF88A9B362CB30ED41CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0064F37E
                                        • _wcscmp.LIBCMT ref: 0064F393
                                        • _wcscmp.LIBCMT ref: 0064F3AA
                                          • Part of subcall function 006445C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006445DC
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0064F3D9
                                        • FindClose.KERNEL32(00000000), ref: 0064F3E4
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0064F400
                                        • _wcscmp.LIBCMT ref: 0064F427
                                        • _wcscmp.LIBCMT ref: 0064F43E
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0064F450
                                        • SetCurrentDirectoryW.KERNEL32(0069A5A0), ref: 0064F46E
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0064F478
                                        • FindClose.KERNEL32(00000000), ref: 0064F485
                                        • FindClose.KERNEL32(00000000), ref: 0064F497
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                        • String ID: *.*
                                        • API String ID: 1824444939-438819550
                                        • Opcode ID: 7f1225fd55df034d0e879eaef549c567725090ed724dab93807bea9ca464503f
                                        • Instruction ID: b8462871b50cbd6ac04f625d387c101e80ab7590e5e9b7adc6a2b9616a9e1685
                                        • Opcode Fuzzy Hash: 7f1225fd55df034d0e879eaef549c567725090ed724dab93807bea9ca464503f
                                        • Instruction Fuzzy Hash: B431E3726012196BCF10AFA4EC98ADF77EE9F49320F100175E814E32A1DBB0DE44CAA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0063874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00638766
                                          • Part of subcall function 0063874A: GetLastError.KERNEL32(?,0063822A,?,?,?), ref: 00638770
                                          • Part of subcall function 0063874A: GetProcessHeap.KERNEL32(00000008,?,?,0063822A,?,?,?), ref: 0063877F
                                          • Part of subcall function 0063874A: HeapAlloc.KERNEL32(00000000,?,0063822A,?,?,?), ref: 00638786
                                          • Part of subcall function 0063874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063879D
                                          • Part of subcall function 006387E7: GetProcessHeap.KERNEL32(00000008,00638240,00000000,00000000,?,00638240,?), ref: 006387F3
                                          • Part of subcall function 006387E7: HeapAlloc.KERNEL32(00000000,?,00638240,?), ref: 006387FA
                                          • Part of subcall function 006387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00638240,?), ref: 0063880B
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0063825B
                                        • _memset.LIBCMT ref: 00638270
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0063828F
                                        • GetLengthSid.ADVAPI32(?), ref: 006382A0
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 006382DD
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006382F9
                                        • GetLengthSid.ADVAPI32(?), ref: 00638316
                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00638325
                                        • HeapAlloc.KERNEL32(00000000), ref: 0063832C
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0063834D
                                        • CopySid.ADVAPI32(00000000), ref: 00638354
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00638385
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006383AB
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006383BF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3996160137-0
                                        • Opcode ID: 16dbe81e5043187dd4e1d29ac6dfbabf29e70ee2b679edcb9cea37df5031d601
                                        • Instruction ID: cf1c580784c94113a28f6262ed81d7f12fa647a8458c7ec24dcc83ac4d06939e
                                        • Opcode Fuzzy Hash: 16dbe81e5043187dd4e1d29ac6dfbabf29e70ee2b679edcb9cea37df5031d601
                                        • Instruction Fuzzy Hash: E5614771904219EFDF009FA5DC85AEEBBBAFF44700F148169F815A7391DB719A05CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa_$PJh$UCP)$UTF)$UTF16)
                                        • API String ID: 0-238074469
                                        • Opcode ID: 8671e35c5ae162071c81a6bbaa28cb28635c48b3d6052b7043755e9244bc6a33
                                        • Instruction ID: e0991bdaf6668ea1e42f6632979c31e5d7ba8acbfe8774a042c00e26bd3951e9
                                        • Opcode Fuzzy Hash: 8671e35c5ae162071c81a6bbaa28cb28635c48b3d6052b7043755e9244bc6a33
                                        • Instruction Fuzzy Hash: AB725D75E002199BDB24CF58C8907FEBBB6FF49310F14816AE959EB290DB749D81CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00660038,?,?), ref: 006610BC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00660737
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 006607D6
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0066086E
                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00660AAD
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00660ABA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                        • String ID:
                                        • API String ID: 1240663315-0
                                        • Opcode ID: ce52a3b8b3f1d19147923ebdfcb5caeafac42eb9d1c4998996fbc0a2d6ece1aa
                                        • Instruction ID: d86028250269a610be627ee18804372d394f8d04b6ffeff60aee052a0853d1e0
                                        • Opcode Fuzzy Hash: ce52a3b8b3f1d19147923ebdfcb5caeafac42eb9d1c4998996fbc0a2d6ece1aa
                                        • Instruction Fuzzy Hash: 81E14D31204211AFDB14DF29C895E6BBBEAFF89714F04856DF48ADB262DA31ED01CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00640241
                                        • GetAsyncKeyState.USER32(000000A0), ref: 006402C2
                                        • GetKeyState.USER32(000000A0), ref: 006402DD
                                        • GetAsyncKeyState.USER32(000000A1), ref: 006402F7
                                        • GetKeyState.USER32(000000A1), ref: 0064030C
                                        • GetAsyncKeyState.USER32(00000011), ref: 00640324
                                        • GetKeyState.USER32(00000011), ref: 00640336
                                        • GetAsyncKeyState.USER32(00000012), ref: 0064034E
                                        • GetKeyState.USER32(00000012), ref: 00640360
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00640378
                                        • GetKeyState.USER32(0000005B), ref: 0064038A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: f75f03dd8771f9da6bf376ca9fed3eeb884a2546f3ccd400bcfcf398cf001b9d
                                        • Instruction ID: 2a1da22219aee3ab87829c043d5e0f408833901492a2e5e80b31e62f632cc9e3
                                        • Opcode Fuzzy Hash: f75f03dd8771f9da6bf376ca9fed3eeb884a2546f3ccd400bcfcf398cf001b9d
                                        • Instruction Fuzzy Hash: 464199345047EA6EFF729F6494083E6BEA26B51340F18505ED7C6463C2D7F45EC48B92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                        • String ID:
                                        • API String ID: 1737998785-0
                                        • Opcode ID: 70ec259877b418f513e13ca859739058289831e3423c88280157ff92a366f9fd
                                        • Instruction ID: f86238a71d3efb9916f25bbbd7964c13a9d750d32aed43d1d056d216044c6716
                                        • Opcode Fuzzy Hash: 70ec259877b418f513e13ca859739058289831e3423c88280157ff92a366f9fd
                                        • Instruction Fuzzy Hash: B221A135240211AFDB10AF60EC09B6E7BAAFF44715F10906AF946DB2B1DBB0AD41CB54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E48A1,?,?,005E37C0,?), ref: 005E48CE
                                          • Part of subcall function 00644CD3: GetFileAttributesW.KERNEL32(?,00643947), ref: 00644CD4
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00643ADF
                                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00643B87
                                        • MoveFileW.KERNEL32(?,?), ref: 00643B9A
                                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00643BB7
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00643BD9
                                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00643BF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                        • String ID: \*.*
                                        • API String ID: 4002782344-1173974218
                                        • Opcode ID: 6f2a9960b5568805280ffc777e38f38b104c603332fb543745ba7d379b6ce10a
                                        • Instruction ID: 467e169b146408272d5b025dd25bcc5884a06cdb12b8afbb27bbf46ab9ddee13
                                        • Opcode Fuzzy Hash: 6f2a9960b5568805280ffc777e38f38b104c603332fb543745ba7d379b6ce10a
                                        • Instruction Fuzzy Hash: 1B51C53180119D9ACF09EBA1CD969EDBB7ABF64300F2441A9E44177291EF706F0DCB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ERCP$Oa_$VUUU$VUUU$VUUU$VUUU
                                        • API String ID: 0-3370365514
                                        • Opcode ID: 06e0eaebadec35087aa6634dfb79afc16b5b09694c578f0953959daf7f504bcc
                                        • Instruction ID: 55315e40b4889eee6bb95cb97a4a21fcb0967fa40b635468e2a9a4042d16548f
                                        • Opcode Fuzzy Hash: 06e0eaebadec35087aa6634dfb79afc16b5b09694c578f0953959daf7f504bcc
                                        • Instruction Fuzzy Hash: 20A27D74E0462A8BDF24CF58D940BFEBBB2BB54314F1485A9D956A7380E7389E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0064F6AB
                                        • Sleep.KERNEL32(0000000A), ref: 0064F6DB
                                        • _wcscmp.LIBCMT ref: 0064F6EF
                                        • _wcscmp.LIBCMT ref: 0064F70A
                                        • FindNextFileW.KERNEL32(?,?), ref: 0064F7A8
                                        • FindClose.KERNEL32(00000000), ref: 0064F7BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                        • String ID: *.*
                                        • API String ID: 713712311-438819550
                                        • Opcode ID: d4bc573a457aff90018aacacd8faf7429abab7870df3113948e98c1bf80f20ed
                                        • Instruction ID: e9a63610c4cee6d9c852ca3ad074a6c8693ce3aa5f6add668181bc001569d3ff
                                        • Opcode Fuzzy Hash: d4bc573a457aff90018aacacd8faf7429abab7870df3113948e98c1bf80f20ed
                                        • Instruction Fuzzy Hash: DC41827190021A9FDF15DF64DC49EEEBBBAFF05310F14456AE815A3290EB349E44CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 1e2f508b98d3250dcf3ae504d14b49c601dc58a10dd072383dc3e60d5f38d589
                                        • Instruction ID: 93e04ebdfe47f44e3c506357df69ef9f1dbc63a387f4861db694056bf2bd48d1
                                        • Opcode Fuzzy Hash: 1e2f508b98d3250dcf3ae504d14b49c601dc58a10dd072383dc3e60d5f38d589
                                        • Instruction Fuzzy Hash: 7912AD70A0060ADFDF08CFA5D985AEEBBB6FF48300F104569E546E7291EB35AD15CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00600FF6: std::exception::exception.LIBCMT ref: 0060102C
                                          • Part of subcall function 00600FF6: __CxxThrowException@8.LIBCMT ref: 00601041
                                        • _memmove.LIBCMT ref: 0063062F
                                        • _memmove.LIBCMT ref: 00630744
                                        • _memmove.LIBCMT ref: 006307EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                                        • String ID: yZ_
                                        • API String ID: 1300846289-534868854
                                        • Opcode ID: 61cf0dca1dfc9519dfdcca0ee78cdefc99fdb8972cb782dfccb1da914c9a2ee5
                                        • Instruction ID: ca25f93688b4e4bf9bc1e73aa3e442a0cddafb2844173d66c9f5583f09d87c1d
                                        • Opcode Fuzzy Hash: 61cf0dca1dfc9519dfdcca0ee78cdefc99fdb8972cb782dfccb1da914c9a2ee5
                                        • Instruction Fuzzy Hash: FF02E370E00209DBDF08DF64D991ABE7BB6FF84300F248069E946DB295EB35D954CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00638CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00638D0D
                                          • Part of subcall function 00638CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638D3A
                                          • Part of subcall function 00638CC3: GetLastError.KERNEL32 ref: 00638D47
                                        • ExitWindowsEx.USER32(?,00000000), ref: 0064549B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                        • String ID: $@$SeShutdownPrivilege
                                        • API String ID: 2234035333-194228
                                        • Opcode ID: 9434aa2c5d43449d99b155a16f352898b6280313d671d47f842998d91945ce86
                                        • Instruction ID: a90d8808774386d9bf118e923ce916cbd232ecfd2a6cba314db189e750c961e2
                                        • Opcode Fuzzy Hash: 9434aa2c5d43449d99b155a16f352898b6280313d671d47f842998d91945ce86
                                        • Instruction Fuzzy Hash: 72014231655B112FF76863B8EC4ABFA72EAEB00352F200034FC07DA2C3DA900C8581E4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __itow__swprintf
                                        • String ID: Oa_
                                        • API String ID: 674341424-62195052
                                        • Opcode ID: 5b5826b24cefd393600376d5d1cbf957bb08cd7ab9d7087aae6a1e99a7fe7809
                                        • Instruction ID: 29c4585a5a94b473396d31a1c6e9cf1f704190a76e52e05f11dae6f366621f06
                                        • Opcode Fuzzy Hash: 5b5826b24cefd393600376d5d1cbf957bb08cd7ab9d7087aae6a1e99a7fe7809
                                        • Instruction Fuzzy Hash: BD229A715083569FD724DF24C885BABBBE5BFC4300F10492DFA9A97291DB74EA04CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006565EF
                                        • WSAGetLastError.WSOCK32(00000000), ref: 006565FE
                                        • bind.WSOCK32(00000000,?,00000010), ref: 0065661A
                                        • listen.WSOCK32(00000000,00000005), ref: 00656629
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656643
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00656657
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                        • String ID:
                                        • API String ID: 1279440585-0
                                        • Opcode ID: ab2ee618e03b534bd6551c7351cfb7b80f5808a11b15fcad68e1cdbd50d218d9
                                        • Instruction ID: 7ada9d3ae2da424c0871f7d7f9af54481c4dd507c8a3b7fc02cad021dfa16fa4
                                        • Opcode Fuzzy Hash: ab2ee618e03b534bd6551c7351cfb7b80f5808a11b15fcad68e1cdbd50d218d9
                                        • Instruction Fuzzy Hash: 302191306002019FCB10AF24D889A6EB7BAEF84321F148169F956A73D1CBB0AD05CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 005E19FA
                                        • GetSysColor.USER32(0000000F), ref: 005E1A4E
                                        • SetBkColor.GDI32(?,00000000), ref: 005E1A61
                                          • Part of subcall function 005E1290: DefDlgProcW.USER32(?,00000020,?), ref: 005E12D8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ColorProc$LongWindow
                                        • String ID:
                                        • API String ID: 3744519093-0
                                        • Opcode ID: 186c8a9e809654b90bf35f1d3a73677d248e4cb7fc70a430242ba92e309f8f2a
                                        • Instruction ID: ed8da59a6ec3aa7489b79b8b2d7547960e1df22a02185f000acb76f0552f4b86
                                        • Opcode Fuzzy Hash: 186c8a9e809654b90bf35f1d3a73677d248e4cb7fc70a430242ba92e309f8f2a
                                        • Instruction Fuzzy Hash: 62A11370105DC4BAD62CAE3A9C48DFB2E5FFB82341B181529F482D6292CA349D4192FD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006580A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006580CB
                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00656AB1
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656ADA
                                        • bind.WSOCK32(00000000,?,00000010), ref: 00656B13
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656B20
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00656B34
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                        • String ID:
                                        • API String ID: 99427753-0
                                        • Opcode ID: 288037ed5263b22cf83d2ef1e127ea367cb10500a0523d6dd0fd0b3394f3b627
                                        • Instruction ID: a204c286b9281f363e4250968695beb54cb0025371fa696fd9cd6fc029d7808e
                                        • Opcode Fuzzy Hash: 288037ed5263b22cf83d2ef1e127ea367cb10500a0523d6dd0fd0b3394f3b627
                                        • Instruction Fuzzy Hash: C541C975B00211AFEB14AF25DC8AF7E7BA9EF84710F44805CF95AAB3D2DA705D018791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                        • String ID:
                                        • API String ID: 292994002-0
                                        • Opcode ID: 72c02121b018b205313eab2e254eb3b645870cab0c519f65f693287f2ac3b930
                                        • Instruction ID: b17bad36f96b977c9b52cb46119581f3be8854b1b76a4ca90dc03872114e0636
                                        • Opcode Fuzzy Hash: 72c02121b018b205313eab2e254eb3b645870cab0c519f65f693287f2ac3b930
                                        • Instruction Fuzzy Hash: AD11C471700A116FE7211F26EC49A6FBB9AFF94721F404039F847D7261CB709D02CAA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 0064C69D
                                        • CoCreateInstance.OLE32(00672D6C,00000000,00000001,00672BDC,?), ref: 0064C6B5
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                        • CoUninitialize.OLE32 ref: 0064C922
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                        • String ID: .lnk
                                        • API String ID: 2683427295-24824748
                                        • Opcode ID: bcc2543ae99a8433c45ecd56b0d003942f0526cb4dbf8b2566ebe87a834859af
                                        • Instruction ID: 7b90a70eac3e0a07bfbd166fe5e2975692678bff03d8776491cc0c4d6579d934
                                        • Opcode Fuzzy Hash: bcc2543ae99a8433c45ecd56b0d003942f0526cb4dbf8b2566ebe87a834859af
                                        • Instruction Fuzzy Hash: 58A13CB1104246AFD704EF55C895EABBBEDFF88304F00496CF19697192EB70EA49CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00621D88,?), ref: 0065C312
                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0065C324
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                        • API String ID: 2574300362-1816364905
                                        • Opcode ID: 65beb4d7ce677091c7f60fc01927f9db19c7d06cd3a716c077ecba8ef209fd1d
                                        • Instruction ID: ca0e0e152ff3472b5a5920a13da28f967915683395c20d8b3446cf1720054421
                                        • Opcode Fuzzy Hash: 65beb4d7ce677091c7f60fc01927f9db19c7d06cd3a716c077ecba8ef209fd1d
                                        • Instruction Fuzzy Hash: 1EE0EC74600717CFDB205F25E814A86B6DAEB0976AF849439E895D2650E7B4D884CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0065F151
                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0065F15F
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                        • Process32NextW.KERNEL32(00000000,?), ref: 0065F21F
                                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0065F22E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                        • String ID:
                                        • API String ID: 2576544623-0
                                        • Opcode ID: cc205648ba343ac6d5adc2570f0413406d3caf6eb532dbe3f769f47b94f67964
                                        • Instruction ID: fd504ad9556cbb429a329d57b7be50c9359774e8a16a45a8aff367fda0a2f5f7
                                        • Opcode Fuzzy Hash: cc205648ba343ac6d5adc2570f0413406d3caf6eb532dbe3f769f47b94f67964
                                        • Instruction Fuzzy Hash: B5516E715083429FD314EF21DC85A6BBBE9FFD8710F10492DF99597291EB70AA08CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0063EB19
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: ($|
                                        • API String ID: 1659193697-1631851259
                                        • Opcode ID: b0ed0db0e1834ca073510b4db391eff57412bb0134c092c9d247ca72706edab8
                                        • Instruction ID: 58cce015d0649f74ffb84349b48bfacb0c0b661282e0300ea695970ebea840ab
                                        • Opcode Fuzzy Hash: b0ed0db0e1834ca073510b4db391eff57412bb0134c092c9d247ca72706edab8
                                        • Instruction Fuzzy Hash: 4B322575A006059FDB28CF19C481AAAB7F1FF48310F15C56EE89ADB3A1D770E941CB94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 006526D5
                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0065270C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Internet$AvailableDataFileQueryRead
                                        • String ID:
                                        • API String ID: 599397726-0
                                        • Opcode ID: 0a5e886d79ad52e5eee6b0090572f58be8b629f6e64195a524c21166917d2e18
                                        • Instruction ID: 642ed8ca5b6e5f7f2cfd42d49a320aba50941653304820b68d532b5c0cffeb73
                                        • Opcode Fuzzy Hash: 0a5e886d79ad52e5eee6b0090572f58be8b629f6e64195a524c21166917d2e18
                                        • Instruction Fuzzy Hash: AE41277150020BBFEB20DB54DC95EFB77FEEB45316F10406EFE01A6240EA719D499654
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0064B5AE
                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0064B608
                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0064B655
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DiskFreeSpace
                                        • String ID:
                                        • API String ID: 1682464887-0
                                        • Opcode ID: 5130d45c9ddad5fc20b427886c52dd7d5bf4d5ec73dba927f1af65752d95a3ff
                                        • Instruction ID: 6d767407119ff9febe7dc6d08a4188d3f0c462c8fcd5c1c9f2985452daf33e1e
                                        • Opcode Fuzzy Hash: 5130d45c9ddad5fc20b427886c52dd7d5bf4d5ec73dba927f1af65752d95a3ff
                                        • Instruction Fuzzy Hash: 8D219D35A00108EFCB00EFA5E884AADFBB9FF88310F0480A9E845AB351DB31A945CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00600FF6: std::exception::exception.LIBCMT ref: 0060102C
                                          • Part of subcall function 00600FF6: __CxxThrowException@8.LIBCMT ref: 00601041
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00638D0D
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00638D3A
                                        • GetLastError.KERNEL32 ref: 00638D47
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                        • String ID:
                                        • API String ID: 1922334811-0
                                        • Opcode ID: 59c516084fc22fbead733988ecf695bf8333ca2c7305f926878ae9689a4a0abd
                                        • Instruction ID: 26be868d206a18c0d7d9d8909a3d09aac5790ff2ef96757b8943be68c92d8fdb
                                        • Opcode Fuzzy Hash: 59c516084fc22fbead733988ecf695bf8333ca2c7305f926878ae9689a4a0abd
                                        • Instruction Fuzzy Hash: BD118FB2454309AFE7289F54EC85DABB7BEEF44710B20852EF85697241EB70AC418A64
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0064404B
                                        • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00644088
                                        • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00644091
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseControlCreateDeviceFileHandle
                                        • String ID:
                                        • API String ID: 33631002-0
                                        • Opcode ID: 101e84f0a9db7ccbb045149de3fc40364ff6a59d2eb1d9e1ad89b2430c9d0208
                                        • Instruction ID: 7099655a4d0d37b4a2e53647667216512aaa6b6630edd3c33a3ec845cac9cfde
                                        • Opcode Fuzzy Hash: 101e84f0a9db7ccbb045149de3fc40364ff6a59d2eb1d9e1ad89b2430c9d0208
                                        • Instruction Fuzzy Hash: FF1170B1900228BEE7109BE8DC45FABBBBDEB09B50F000656BA04E7290C6B4591587E1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00644C2C
                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00644C43
                                        • FreeSid.ADVAPI32(?), ref: 00644C53
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                        • String ID:
                                        • API String ID: 3429775523-0
                                        • Opcode ID: 5be4eaf3bbe6f0dea27eee48431ff449dc699e9b7015aa691111fe28b5da3d32
                                        • Instruction ID: ae9bd72597060a2549975f8372386843a9804e1fd70b962809dcbd1aa2cda60a
                                        • Opcode Fuzzy Hash: 5be4eaf3bbe6f0dea27eee48431ff449dc699e9b7015aa691111fe28b5da3d32
                                        • Instruction Fuzzy Hash: FAF04F7591130CBFDF04DFF0DD99AADB7BDEF08201F004469E501E2181D6705A448B50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __time64.LIBCMT ref: 00648B25
                                          • Part of subcall function 0060543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,006491F8,00000000,?,?,?,?,006493A9,00000000,?), ref: 00605443
                                          • Part of subcall function 0060543A: __aulldiv.LIBCMT ref: 00605463
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Time$FileSystem__aulldiv__time64
                                        • String ID: 0uj
                                        • API String ID: 2893107130-604322167
                                        • Opcode ID: 728b7c7ab062b08892a9fc1701d9ded7c90c5e76b141b1a751b1628a5dbc08e8
                                        • Instruction ID: 80ac1b800ed65a8b209b9ecbde63cd8223b675094a9f17cbb42e90f83dcfa54b
                                        • Opcode Fuzzy Hash: 728b7c7ab062b08892a9fc1701d9ded7c90c5e76b141b1a751b1628a5dbc08e8
                                        • Instruction Fuzzy Hash: E421A2726255108FC729CF25D841A92B3E2EBA5311F288E6CD4E5CB2D0CE74BD45CF94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d8814eb0e30bbe5633dcb93eca8b10ffaa3ef4305b47d06a1b12eab140b2d77
                                        • Instruction ID: c4ded472d915a196dfadcb41f479a4a70e2e086e1362fc006550bc6429eaff28
                                        • Opcode Fuzzy Hash: 8d8814eb0e30bbe5633dcb93eca8b10ffaa3ef4305b47d06a1b12eab140b2d77
                                        • Instruction Fuzzy Hash: 0022E274A10256CFDB28DF55C482ABEBBF1FF08300F148469E8969B391E734AD81CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 0064C966
                                        • FindClose.KERNEL32(00000000), ref: 0064C996
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: 12d43fdba71034f50697ae1c54f27e438a53f07e5f4e5fb146b5fdfaa9990773
                                        • Instruction ID: bc7ead1b1e297117e94c64b2a5fcde7ed40077d1c709ffa572bc3b28248a8f92
                                        • Opcode Fuzzy Hash: 12d43fdba71034f50697ae1c54f27e438a53f07e5f4e5fb146b5fdfaa9990773
                                        • Instruction Fuzzy Hash: 7C1184726106019FD714EF29D849A2AFBE9FF84324F00851EF8A9D7391DB70AD01CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0065977D,?,0066FB84,?), ref: 0064A302
                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0065977D,?,0066FB84,?), ref: 0064A314
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorFormatLastMessage
                                        • String ID:
                                        • API String ID: 3479602957-0
                                        • Opcode ID: 8ae7886e219d1047f37203b1d06e6f0b6eb41ee22577a01f7dcc6c8a18c1a488
                                        • Instruction ID: e3e2b5eb028f80ebb8e0fae09108bf7aa1489f58ae1a6c2f465f9c5b44bd0b3b
                                        • Opcode Fuzzy Hash: 8ae7886e219d1047f37203b1d06e6f0b6eb41ee22577a01f7dcc6c8a18c1a488
                                        • Instruction Fuzzy Hash: CEF0E23114822DBBDB119FA4CC48FEA776EBF09761F004265F918D6280E6709940CBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00638851), ref: 00638728
                                        • CloseHandle.KERNEL32(?,?,00638851), ref: 0063873A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AdjustCloseHandlePrivilegesToken
                                        • String ID:
                                        • API String ID: 81990902-0
                                        • Opcode ID: 807565b59e74475a007dc4c1d412d4e2f3e72f3c23df92a4c22cae3b76b0753e
                                        • Instruction ID: 000cca83d34760406b046acab71d3e43c1b75a57d92118ebcbaa928be344c113
                                        • Opcode Fuzzy Hash: 807565b59e74475a007dc4c1d412d4e2f3e72f3c23df92a4c22cae3b76b0753e
                                        • Instruction Fuzzy Hash: 13E0B676014611EEE7652B60FC09DB77BAAEB04350B24882DF49684470DBA2ACD0DB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00608F97,?,?,?,00000001), ref: 0060A39A
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0060A3A3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 7809065260f12fe39c0d22695d6f1a3330981357af46727e752add745c90b2c3
                                        • Instruction ID: 614537f248353c5397ca64f1fdb805928e7e42e3fd90b44e85c7001f5341497e
                                        • Opcode Fuzzy Hash: 7809065260f12fe39c0d22695d6f1a3330981357af46727e752add745c90b2c3
                                        • Instruction Fuzzy Hash: 37B09231058208ABCB002B91FC09B883F6AEB44AA2F405020F60D94260EFA254508AD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cfad90528810dc710f64d3cc68300fcce36e1356945ee27c67e4c5c32da3bea
                                        • Instruction ID: e32bd38bf021886a207879776c9b549a8c84d40a287ebec67ccf03b28343890d
                                        • Opcode Fuzzy Hash: 9cfad90528810dc710f64d3cc68300fcce36e1356945ee27c67e4c5c32da3bea
                                        • Instruction Fuzzy Hash: 9C32F621D69F414DD72B9A34D832336A24AAFB73D4F15E737E819B5EA6EB29C4C34100
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d2adf9a8b33a589363abe0807fd4d7f3f90065d79cec395f4a00f82e251b404
                                        • Instruction ID: 92c53eb5c1e3ab62ece470df82ae95b2edaf30b794bac9b1df877c097d891a9e
                                        • Opcode Fuzzy Hash: 8d2adf9a8b33a589363abe0807fd4d7f3f90065d79cec395f4a00f82e251b404
                                        • Instruction Fuzzy Hash: FDB1CD30D2AF414DD3239A398835336B69DAFBB2D5B51E71BFC1A74922EB2285C34141
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • BlockInput.USER32(00000001), ref: 00654218
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BlockInput
                                        • String ID:
                                        • API String ID: 3456056419-0
                                        • Opcode ID: 888b1817d7c54e0542cb3322d2f40a350a33aed9b1704f091dba0d7df674aa9b
                                        • Instruction ID: eb96323103b50094015d2dbf8bcf212715778b2d653a4a29f9c7d5b1ff42b92e
                                        • Opcode Fuzzy Hash: 888b1817d7c54e0542cb3322d2f40a350a33aed9b1704f091dba0d7df674aa9b
                                        • Instruction Fuzzy Hash: DEE0DF312402159FC710EF5AE804A8AFBE9AF94360F008026FC4AC7312CAB0EC808BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00644F18
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: mouse_event
                                        • String ID:
                                        • API String ID: 2434400541-0
                                        • Opcode ID: 99098bad913f1cff8d7a5b2321423841cec85d4a43e54909f163d7150bd82556
                                        • Instruction ID: c74cfaf1b9c58d61ee11811afdd71f653ea3b81a07204607d05e4f8e08b7b263
                                        • Opcode Fuzzy Hash: 99098bad913f1cff8d7a5b2321423841cec85d4a43e54909f163d7150bd82556
                                        • Instruction Fuzzy Hash: 9AD05EF016821538FF984B20AC0FFB6050BE3C1781F8459897202955C19CE16C09A035
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006388D1), ref: 00638CB3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LogonUser
                                        • String ID:
                                        • API String ID: 1244722697-0
                                        • Opcode ID: 8552d97ce417df6ea4694cb33d192ada27ee6ed88495017a8bb434ac11dd0b9a
                                        • Instruction ID: 8c3964ad2c4bedc30e820f0694d34c6d0ffd298ea9e6fb2bb3fc134b836566fc
                                        • Opcode Fuzzy Hash: 8552d97ce417df6ea4694cb33d192ada27ee6ed88495017a8bb434ac11dd0b9a
                                        • Instruction Fuzzy Hash: 17D09E3226450EBBEF019FA4ED05EAE3B6AEB04B01F408511FE15D51A1C7B5D935AB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetUserNameW.ADVAPI32(?,?), ref: 00622242
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: 550f9bdfb87afdc4ba85b3c399d06fb885f135f8f984cfda9910ef15da6da093
                                        • Instruction ID: 1570af136115afa273786d0468487b3dfc45de3bbb9a1cc887dc2faf3701f5cf
                                        • Opcode Fuzzy Hash: 550f9bdfb87afdc4ba85b3c399d06fb885f135f8f984cfda9910ef15da6da093
                                        • Instruction Fuzzy Hash: 7AC048F1804119DBDB05DBA0EA98DEEB7BDAB08305F2040A6E102F2100E7B4AB448E72
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0060A36A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 150489708849ef45a5a68cce93cc1f847bf2508a4dce600d9384df97941d3a8a
                                        • Instruction ID: ac08cb9b52718142e1a8be7f8c9e976dbcc1506b2ea3a4b64ea824995e95959e
                                        • Opcode Fuzzy Hash: 150489708849ef45a5a68cce93cc1f847bf2508a4dce600d9384df97941d3a8a
                                        • Instruction Fuzzy Hash: EAA0223000020CFBCF002F82FC08888BFAEEB002E0B008030F80C80232EFB3A8208AC0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4fd98d03719ef86adccb852507a31e810137fa3c3c3c63b26abbad9c913cefe4
                                        • Instruction ID: 5f16f4c57644b2b2b2b3475f0234c3921c707ff28c9e088ee5a67ce087bb143e
                                        • Opcode Fuzzy Hash: 4fd98d03719ef86adccb852507a31e810137fa3c3c3c63b26abbad9c913cefe4
                                        • Instruction Fuzzy Hash: E4222A3060565ACBDF289F14C4946BD7BB2FF42304F68846ADA438F691DB38DD81CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction ID: 6ab7105dc0754e5da8d22342eb9f09fd6c22a7704ca59ffa7359d910352024b4
                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction Fuzzy Hash: 2AC181322450930ADF2D4639D5781BFBAE25EA37B131A0B5DE8B2CF6C5EF20D564D620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction ID: 4e45b4fcd5c3ab8e19767fc1e1b1ba11f7d11e1ff52b80ddea1e11cd8e5f1576
                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction Fuzzy Hash: 9FC1953224519309DF6D463A857807FBBE25EA37B131A0B6DE4B2DF6C4EF20D528D620
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperBuffW.USER32(?,?,0066F910), ref: 006638AF
                                        • IsWindowVisible.USER32(?), ref: 006638D3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharUpperVisibleWindow
                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                        • API String ID: 4105515805-45149045
                                        • Opcode ID: fa87de786f8eecca3efc200c28e25b6d139fc22a192c8d4f42cba9f9f2ff9e6f
                                        • Instruction ID: 296a702d8c31596a4ae9410d0156e05c208d6f59587ed552af3a9e791dbe717e
                                        • Opcode Fuzzy Hash: fa87de786f8eecca3efc200c28e25b6d139fc22a192c8d4f42cba9f9f2ff9e6f
                                        • Instruction Fuzzy Hash: 30D18F302083169BCB18EF11C555AAABBA7AF94744F10545CF8865B3E2CB71EE0BCB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetTextColor.GDI32(?,00000000), ref: 0066A89F
                                        • GetSysColorBrush.USER32(0000000F), ref: 0066A8D0
                                        • GetSysColor.USER32(0000000F), ref: 0066A8DC
                                        • SetBkColor.GDI32(?,000000FF), ref: 0066A8F6
                                        • SelectObject.GDI32(?,?), ref: 0066A905
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 0066A930
                                        • GetSysColor.USER32(00000010), ref: 0066A938
                                        • CreateSolidBrush.GDI32(00000000), ref: 0066A93F
                                        • FrameRect.USER32(?,?,00000000), ref: 0066A94E
                                        • DeleteObject.GDI32(00000000), ref: 0066A955
                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0066A9A0
                                        • FillRect.USER32(?,?,?), ref: 0066A9D2
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0066A9FD
                                          • Part of subcall function 0066AB60: GetSysColor.USER32(00000012), ref: 0066AB99
                                          • Part of subcall function 0066AB60: SetTextColor.GDI32(?,?), ref: 0066AB9D
                                          • Part of subcall function 0066AB60: GetSysColorBrush.USER32(0000000F), ref: 0066ABB3
                                          • Part of subcall function 0066AB60: GetSysColor.USER32(0000000F), ref: 0066ABBE
                                          • Part of subcall function 0066AB60: GetSysColor.USER32(00000011), ref: 0066ABDB
                                          • Part of subcall function 0066AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0066ABE9
                                          • Part of subcall function 0066AB60: SelectObject.GDI32(?,00000000), ref: 0066ABFA
                                          • Part of subcall function 0066AB60: SetBkColor.GDI32(?,00000000), ref: 0066AC03
                                          • Part of subcall function 0066AB60: SelectObject.GDI32(?,?), ref: 0066AC10
                                          • Part of subcall function 0066AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0066AC2F
                                          • Part of subcall function 0066AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0066AC46
                                          • Part of subcall function 0066AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0066AC5B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                        • String ID:
                                        • API String ID: 4124339563-0
                                        • Opcode ID: 8c28905bb52be21b550a99c4ec75b309ea8bde4dc5b1da9f8de2b9374c17fba7
                                        • Instruction ID: f74283b2fddf2ec89dd3fa3a40cad3a85906d730e5d92549accaf0dfb49081db
                                        • Opcode Fuzzy Hash: 8c28905bb52be21b550a99c4ec75b309ea8bde4dc5b1da9f8de2b9374c17fba7
                                        • Instruction Fuzzy Hash: E1A17272408301AFD7109FA4EC08A5BBBAAFF89321F105B29F962E61E1D771D945CF52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DestroyWindow.USER32(?,?,?), ref: 005E2CA2
                                        • DeleteObject.GDI32(00000000), ref: 005E2CE8
                                        • DeleteObject.GDI32(00000000), ref: 005E2CF3
                                        • DestroyIcon.USER32(00000000,?,?,?), ref: 005E2CFE
                                        • DestroyWindow.USER32(00000000,?,?,?), ref: 005E2D09
                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0061C68B
                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0061C6C4
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0061CAED
                                          • Part of subcall function 005E1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E2036,?,00000000,?,?,?,?,005E16CB,00000000,?), ref: 005E1B9A
                                        • SendMessageW.USER32(?,00001053), ref: 0061CB2A
                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0061CB41
                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0061CB57
                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0061CB62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                        • String ID: 0
                                        • API String ID: 464785882-4108050209
                                        • Opcode ID: 25d541aeccb2a0c600d02a9c0dc29a6738e2d8be79d06deee85dcbb3d2d8e907
                                        • Instruction ID: 5ef90e51ff4a738564bb447f717bb02e36cb486681bee3cbb14a3da1aa373277
                                        • Opcode Fuzzy Hash: 25d541aeccb2a0c600d02a9c0dc29a6738e2d8be79d06deee85dcbb3d2d8e907
                                        • Instruction Fuzzy Hash: 8312BE30644241EFCB15CF25C889BEDBBE6BF45320F184569E49ADB262C771EC82CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DestroyWindow.USER32(00000000), ref: 006577F1
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 006578B0
                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006578EE
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00657900
                                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00657946
                                        • GetClientRect.USER32(00000000,?), ref: 00657952
                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00657996
                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 006579A5
                                        • GetStockObject.GDI32(00000011), ref: 006579B5
                                        • SelectObject.GDI32(00000000,00000000), ref: 006579B9
                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006579C9
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006579D2
                                        • DeleteDC.GDI32(00000000), ref: 006579DB
                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00657A07
                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00657A1E
                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00657A59
                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00657A6D
                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00657A7E
                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00657AAE
                                        • GetStockObject.GDI32(00000011), ref: 00657AB9
                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00657AC4
                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00657ACE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                        • API String ID: 2910397461-517079104
                                        • Opcode ID: 4555c40bc52d7c861d7d61c5b60fb6c2c7b22f359cd46b2029963e6882fe879f
                                        • Instruction ID: 74872e61fa7eb8fdca2f2c8d370bc3e02929338401d7229ae70c58b88502af56
                                        • Opcode Fuzzy Hash: 4555c40bc52d7c861d7d61c5b60fb6c2c7b22f359cd46b2029963e6882fe879f
                                        • Instruction Fuzzy Hash: 48A17F71A40215BFEB14DFA4EC4AFAE7BBAEB49715F144114FA15A72E0D7B0AD00CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0064AF89
                                        • GetDriveTypeW.KERNEL32(?,0066FAC0,?,\\.\,0066F910), ref: 0064B066
                                        • SetErrorMode.KERNEL32(00000000,0066FAC0,?,\\.\,0066F910), ref: 0064B1C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DriveType
                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                        • API String ID: 2907320926-4222207086
                                        • Opcode ID: 7327b12071c4d0fb01688ef76e35c794b8a4af7e3ca0ac182728d4918329ffcd
                                        • Instruction ID: bdc44ea17e8b670b7de8e99aa64d4b8515259c73c0355db8943da1298927d87c
                                        • Opcode Fuzzy Hash: 7327b12071c4d0fb01688ef76e35c794b8a4af7e3ca0ac182728d4918329ffcd
                                        • Instruction Fuzzy Hash: 8F51E134684346EBCF04DB90C9A39BD77F7BB547427216016E40AAB690CB75DD06CF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                        • API String ID: 1038674560-86951937
                                        • Opcode ID: 77a3a90cdb7a7ba35b20ecd6533def9236c8d6ec25972b4380f5ace6af235005
                                        • Instruction ID: bae5134268edfb18272fc69eeaf195ed75bbea7216461038fab2b4b87d25b514
                                        • Opcode Fuzzy Hash: 77a3a90cdb7a7ba35b20ecd6533def9236c8d6ec25972b4380f5ace6af235005
                                        • Instruction Fuzzy Hash: 81811D70740256AADB28AF61CC86FFF7F5EBF25780F044025FD85AA1C1EB61DA41C2A5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetSysColor.USER32(00000012), ref: 0066AB99
                                        • SetTextColor.GDI32(?,?), ref: 0066AB9D
                                        • GetSysColorBrush.USER32(0000000F), ref: 0066ABB3
                                        • GetSysColor.USER32(0000000F), ref: 0066ABBE
                                        • CreateSolidBrush.GDI32(?), ref: 0066ABC3
                                        • GetSysColor.USER32(00000011), ref: 0066ABDB
                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0066ABE9
                                        • SelectObject.GDI32(?,00000000), ref: 0066ABFA
                                        • SetBkColor.GDI32(?,00000000), ref: 0066AC03
                                        • SelectObject.GDI32(?,?), ref: 0066AC10
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 0066AC2F
                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0066AC46
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0066AC5B
                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0066ACA7
                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0066ACCE
                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 0066ACEC
                                        • DrawFocusRect.USER32(?,?), ref: 0066ACF7
                                        • GetSysColor.USER32(00000011), ref: 0066AD05
                                        • SetTextColor.GDI32(?,00000000), ref: 0066AD0D
                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0066AD21
                                        • SelectObject.GDI32(?,0066A869), ref: 0066AD38
                                        • DeleteObject.GDI32(?), ref: 0066AD43
                                        • SelectObject.GDI32(?,?), ref: 0066AD49
                                        • DeleteObject.GDI32(?), ref: 0066AD4E
                                        • SetTextColor.GDI32(?,?), ref: 0066AD54
                                        • SetBkColor.GDI32(?,?), ref: 0066AD5E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 1996641542-0
                                        • Opcode ID: 2c2e4a0a568bcd726daa3b3b3bcafd683783c60be58ae7c93b0e2c58620cf86c
                                        • Instruction ID: ca4ff5e0c5039f44da5315c1ce47976cf2c14276dc8cdfbcbda5c42463098607
                                        • Opcode Fuzzy Hash: 2c2e4a0a568bcd726daa3b3b3bcafd683783c60be58ae7c93b0e2c58620cf86c
                                        • Instruction Fuzzy Hash: CF611C71900218AFDB119FA8EC48AAEBB7AEF09320F105525F915AB2A1D6B59D40DF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00668D34
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00668D45
                                        • CharNextW.USER32(0000014E), ref: 00668D74
                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00668DB5
                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00668DCB
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00668DDC
                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00668DF9
                                        • SetWindowTextW.USER32(?,0000014E), ref: 00668E45
                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00668E5B
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00668E8C
                                        • _memset.LIBCMT ref: 00668EB1
                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00668EFA
                                        • _memset.LIBCMT ref: 00668F59
                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00668F83
                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00668FDB
                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00669088
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 006690AA
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006690F4
                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00669121
                                        • DrawMenuBar.USER32(?), ref: 00669130
                                        • SetWindowTextW.USER32(?,0000014E), ref: 00669158
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                        • String ID: 0
                                        • API String ID: 1073566785-4108050209
                                        • Opcode ID: eb8f9a596eaab4a82dcbb2c1f91e8c1067757c82e2d3d68ba19405254a137837
                                        • Instruction ID: 8adf38c129b5129abd96af4be9f873fbcf39b215809e7387a1507ba09588a527
                                        • Opcode Fuzzy Hash: eb8f9a596eaab4a82dcbb2c1f91e8c1067757c82e2d3d68ba19405254a137837
                                        • Instruction Fuzzy Hash: E4E16370900219AFDF209F64DC88EEE7B7AFF05710F148259F915AB2A1DB709A85DF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCursorPos.USER32(?), ref: 00664C51
                                        • GetDesktopWindow.USER32 ref: 00664C66
                                        • GetWindowRect.USER32(00000000), ref: 00664C6D
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00664CCF
                                        • DestroyWindow.USER32(?), ref: 00664CFB
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00664D24
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00664D42
                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00664D68
                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00664D7D
                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00664D90
                                        • IsWindowVisible.USER32(?), ref: 00664DB0
                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00664DCB
                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00664DDF
                                        • GetWindowRect.USER32(?,?), ref: 00664DF7
                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00664E1D
                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00664E37
                                        • CopyRect.USER32(?,?), ref: 00664E4E
                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00664EB9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                        • String ID: ($0$tooltips_class32
                                        • API String ID: 698492251-4156429822
                                        • Opcode ID: 42954f003ee6da69c2cba824fb8cbf4ea30dac89d8e9ac1bea5a1e884d3a120f
                                        • Instruction ID: 896bd5828db9e1db1d89817ff6cce11b1fb35c1affc7015b794959b827cfed4d
                                        • Opcode Fuzzy Hash: 42954f003ee6da69c2cba824fb8cbf4ea30dac89d8e9ac1bea5a1e884d3a120f
                                        • Instruction Fuzzy Hash: 5FB19F71608341AFDB04DF25D948B6ABBE6FF88310F00891DF5999B2A1DB71EC05CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006446E8
                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0064470E
                                        • _wcscpy.LIBCMT ref: 0064473C
                                        • _wcscmp.LIBCMT ref: 00644747
                                        • _wcscat.LIBCMT ref: 0064475D
                                        • _wcsstr.LIBCMT ref: 00644768
                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00644784
                                        • _wcscat.LIBCMT ref: 006447CD
                                        • _wcscat.LIBCMT ref: 006447D4
                                        • _wcsncpy.LIBCMT ref: 006447FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                        • API String ID: 699586101-1459072770
                                        • Opcode ID: 5080731eea0448d605930ad26aa9f06a4ae7bc4f387b739f1fa68c80f31e6fcd
                                        • Instruction ID: b8b4f48f9a132e9238f34923e145096d2c38912075de8f3a220c0843da339d0b
                                        • Opcode Fuzzy Hash: 5080731eea0448d605930ad26aa9f06a4ae7bc4f387b739f1fa68c80f31e6fcd
                                        • Instruction Fuzzy Hash: 4A413871680205BAEB14A7709C47FBF77AEEF42710F14006EF905E61C2EF709A0196A9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E28BC
                                        • GetSystemMetrics.USER32(00000007), ref: 005E28C4
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005E28EF
                                        • GetSystemMetrics.USER32(00000008), ref: 005E28F7
                                        • GetSystemMetrics.USER32(00000004), ref: 005E291C
                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005E2939
                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005E2949
                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005E297C
                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005E2990
                                        • GetClientRect.USER32(00000000,000000FF), ref: 005E29AE
                                        • GetStockObject.GDI32(00000011), ref: 005E29CA
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 005E29D5
                                          • Part of subcall function 005E2344: GetCursorPos.USER32(?), ref: 005E2357
                                          • Part of subcall function 005E2344: ScreenToClient.USER32(006A67B0,?), ref: 005E2374
                                          • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000001), ref: 005E2399
                                          • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000002), ref: 005E23A7
                                        • SetTimer.USER32(00000000,00000000,00000028,005E1256), ref: 005E29FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                        • String ID: AutoIt v3 GUI
                                        • API String ID: 1458621304-248962490
                                        • Opcode ID: 4d24ca10b64a2dcba3d120b9e1ede2ab5ccc74c349a40a7e58e64bf5749c91de
                                        • Instruction ID: da4fb56a4598bd0a3d87429f1bf0de583c2cd6d094c5252880fd9786d26c06ec
                                        • Opcode Fuzzy Hash: 4d24ca10b64a2dcba3d120b9e1ede2ab5ccc74c349a40a7e58e64bf5749c91de
                                        • Instruction Fuzzy Hash: 5AB16E7164024ADFDB14DF69DC45BED7BAAFB08310F149129FA66E6294CB74A840CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 006640F6
                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006641B6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharMessageSendUpper
                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                        • API String ID: 3974292440-719923060
                                        • Opcode ID: 085254a6e5bbef6a6ca2042f39decbb1162044e0d590a5947cf3ac2b42c09200
                                        • Instruction ID: 9c85e4e8ddf4c0fcbf4df51741dfecd5923b0f362544606e6491d7e0b1f96dcd
                                        • Opcode Fuzzy Hash: 085254a6e5bbef6a6ca2042f39decbb1162044e0d590a5947cf3ac2b42c09200
                                        • Instruction Fuzzy Hash: CBA19F302143429BCB18EF21C951A6ABBABBF85314F14496CB8969B7D2DF30ED06CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00655309
                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00655314
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 0065531F
                                        • LoadCursorW.USER32(00000000,00007F03), ref: 0065532A
                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00655335
                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00655340
                                        • LoadCursorW.USER32(00000000,00007F81), ref: 0065534B
                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00655356
                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00655361
                                        • LoadCursorW.USER32(00000000,00007F86), ref: 0065536C
                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00655377
                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00655382
                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0065538D
                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00655398
                                        • LoadCursorW.USER32(00000000,00007F04), ref: 006553A3
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 006553AE
                                        • GetCursorInfo.USER32(?), ref: 006553BE
                                        • GetLastError.KERNEL32(00000001,00000000), ref: 006553E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Cursor$Load$ErrorInfoLast
                                        • String ID:
                                        • API String ID: 3215588206-0
                                        • Opcode ID: 6ec3315f7c45975cda52e2e45dba2d7431355f429fed130e102a759daf125cc9
                                        • Instruction ID: 23a13f91c9b93a700b942e1ebcca9d06d33d9cdb48cc3f079e4eb3ebd54ac77c
                                        • Opcode Fuzzy Hash: 6ec3315f7c45975cda52e2e45dba2d7431355f429fed130e102a759daf125cc9
                                        • Instruction Fuzzy Hash: 1E417370E043196ADB109FBA8C4986EFFF9EF51B10F10452FE509E7290DAB8A4018E51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetClassNameW.USER32(?,?,00000100), ref: 0063AAA5
                                        • __swprintf.LIBCMT ref: 0063AB46
                                        • _wcscmp.LIBCMT ref: 0063AB59
                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0063ABAE
                                        • _wcscmp.LIBCMT ref: 0063ABEA
                                        • GetClassNameW.USER32(?,?,00000400), ref: 0063AC21
                                        • GetDlgCtrlID.USER32(?), ref: 0063AC73
                                        • GetWindowRect.USER32(?,?), ref: 0063ACA9
                                        • GetParent.USER32(?), ref: 0063ACC7
                                        • ScreenToClient.USER32(00000000), ref: 0063ACCE
                                        • GetClassNameW.USER32(?,?,00000100), ref: 0063AD48
                                        • _wcscmp.LIBCMT ref: 0063AD5C
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0063AD82
                                        • _wcscmp.LIBCMT ref: 0063AD96
                                          • Part of subcall function 0060386C: _iswctype.LIBCMT ref: 00603874
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                        • String ID: %s%u
                                        • API String ID: 3744389584-679674701
                                        • Opcode ID: abbabcb6e97b44b6be1bb65e0a215688514ba2b85915060b9acecea4d6d5abcf
                                        • Instruction ID: c5469612330cca03e0a8b1112175538ee059adfb3bdafdb326ea6f8cf6c6d2dd
                                        • Opcode Fuzzy Hash: abbabcb6e97b44b6be1bb65e0a215688514ba2b85915060b9acecea4d6d5abcf
                                        • Instruction Fuzzy Hash: EDA1BD71204206ABD718DFA4C884BEAB7EAFF04315F00862DF9D9C2690DB30E955DBD2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 0063B3DB
                                        • _wcscmp.LIBCMT ref: 0063B3EC
                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 0063B414
                                        • CharUpperBuffW.USER32(?,00000000), ref: 0063B431
                                        • _wcscmp.LIBCMT ref: 0063B44F
                                        • _wcsstr.LIBCMT ref: 0063B460
                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0063B498
                                        • _wcscmp.LIBCMT ref: 0063B4A8
                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 0063B4CF
                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0063B518
                                        • _wcscmp.LIBCMT ref: 0063B528
                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 0063B550
                                        • GetWindowRect.USER32(00000004,?), ref: 0063B5B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                        • String ID: @$ThumbnailClass
                                        • API String ID: 1788623398-1539354611
                                        • Opcode ID: 9ff0b0b4d174910efbe68ed8b587a164fec695e9c11d9a35121a5376c60fea5f
                                        • Instruction ID: 128568a4aac4e41b6555e770ea3e60f85f1915eccb13b00cb18271cb6fc4f6de
                                        • Opcode Fuzzy Hash: 9ff0b0b4d174910efbe68ed8b587a164fec695e9c11d9a35121a5376c60fea5f
                                        • Instruction Fuzzy Hash: EF81B1710083059BDB05DF10D885FAA7BEAFF84314F04A56DFE898A296DB70DD45CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • DragQueryPoint.SHELL32(?,?), ref: 0066C917
                                          • Part of subcall function 0066ADF1: ClientToScreen.USER32(?,?), ref: 0066AE1A
                                          • Part of subcall function 0066ADF1: GetWindowRect.USER32(?,?), ref: 0066AE90
                                          • Part of subcall function 0066ADF1: PtInRect.USER32(?,?,0066C304), ref: 0066AEA0
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0066C980
                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0066C98B
                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0066C9AE
                                        • _wcscat.LIBCMT ref: 0066C9DE
                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0066C9F5
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0066CA0E
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0066CA25
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0066CA47
                                        • DragFinish.SHELL32(?), ref: 0066CA4E
                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0066CB41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$prj
                                        • API String ID: 169749273-2123286542
                                        • Opcode ID: ec98950d60e1422a7fa672d0bd1fc8ad51e001d12657c18cfe12cd125346f62c
                                        • Instruction ID: 8ca4682980e0da5a9f493a2b886678382fa188a0c19a7856c781ee28332c1dff
                                        • Opcode Fuzzy Hash: ec98950d60e1422a7fa672d0bd1fc8ad51e001d12657c18cfe12cd125346f62c
                                        • Instruction Fuzzy Hash: F2616D71108341AFC705EF65DC89DABBBE9FFC9710F000A2DF5A5921A1DB709A49CB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                        • API String ID: 1038674560-1810252412
                                        • Opcode ID: 4f8d8b4c627c842997a6508660cc7b612ae0de610fbdd75c0353e64a2de695a1
                                        • Instruction ID: 665640d733775743c52f9cb0f17f3167cbcd0c6f3e84b6e033193547ffbf270e
                                        • Opcode Fuzzy Hash: 4f8d8b4c627c842997a6508660cc7b612ae0de610fbdd75c0353e64a2de695a1
                                        • Instruction Fuzzy Hash: BA310230A4424AA6EF08FA61CD43EFF7BAEAF18750F20012CB540715D2EF616F04C5A5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadIconW.USER32(00000063), ref: 0063C4D4
                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0063C4E6
                                        • SetWindowTextW.USER32(?,?), ref: 0063C4FD
                                        • GetDlgItem.USER32(?,000003EA), ref: 0063C512
                                        • SetWindowTextW.USER32(00000000,?), ref: 0063C518
                                        • GetDlgItem.USER32(?,000003E9), ref: 0063C528
                                        • SetWindowTextW.USER32(00000000,?), ref: 0063C52E
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0063C54F
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0063C569
                                        • GetWindowRect.USER32(?,?), ref: 0063C572
                                        • SetWindowTextW.USER32(?,?), ref: 0063C5DD
                                        • GetDesktopWindow.USER32 ref: 0063C5E3
                                        • GetWindowRect.USER32(00000000), ref: 0063C5EA
                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0063C636
                                        • GetClientRect.USER32(?,?), ref: 0063C643
                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0063C668
                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0063C693
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                        • String ID:
                                        • API String ID: 3869813825-0
                                        • Opcode ID: db7f942b324b81964d81f23be61ff53bea6db003ea1a571a966dcd4237dd817b
                                        • Instruction ID: 967d1bedc2a0592d9ca1c84bf113ffe84d9c88c9b8511802e946376ea78e056f
                                        • Opcode Fuzzy Hash: db7f942b324b81964d81f23be61ff53bea6db003ea1a571a966dcd4237dd817b
                                        • Instruction Fuzzy Hash: ED516171900709AFDB20DFA8DD85BAEBBF6FF04715F004528F696A26A0C7B5A914CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0066A4C8
                                        • DestroyWindow.USER32(?,?), ref: 0066A542
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0066A5BC
                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0066A5DE
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0066A5F1
                                        • DestroyWindow.USER32(00000000), ref: 0066A613
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005E0000,00000000), ref: 0066A64A
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0066A663
                                        • GetDesktopWindow.USER32 ref: 0066A67C
                                        • GetWindowRect.USER32(00000000), ref: 0066A683
                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0066A69B
                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0066A6B3
                                          • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                        • String ID: 0$tooltips_class32
                                        • API String ID: 1297703922-3619404913
                                        • Opcode ID: a3a52e56141cd14d061028dbb783bc3b1df0077f7c7f7938eb7519ad8741b384
                                        • Instruction ID: db780c0fb5b6a21ec08b8fbcbc0275f2be3cb71e1e05443c39189dd2a4a233f3
                                        • Opcode Fuzzy Hash: a3a52e56141cd14d061028dbb783bc3b1df0077f7c7f7938eb7519ad8741b384
                                        • Instruction Fuzzy Hash: D1719971140245AFD720DF68DC49FAA7BEAFB89700F08452CF995972A0C7B4E912CF22
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 006646AB
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006646F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharMessageSendUpper
                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                        • API String ID: 3974292440-4258414348
                                        • Opcode ID: f0edccf49e356b59dbf3c4b1ea02c90e7c20a15782a264370df2ed0bd667169b
                                        • Instruction ID: a24813cc14604638615d23a905364af0b3fc24f380b1a53be26c636b1a53f881
                                        • Opcode Fuzzy Hash: f0edccf49e356b59dbf3c4b1ea02c90e7c20a15782a264370df2ed0bd667169b
                                        • Instruction Fuzzy Hash: FD915D742043429BCB18EF11C451A6ABBA7BF94314F04946CF8D65B7A2CF70ED4ACB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0066BB6E
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00669431), ref: 0066BBCA
                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0066BC03
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0066BC46
                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0066BC7D
                                        • FreeLibrary.KERNEL32(?), ref: 0066BC89
                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0066BC99
                                        • DestroyIcon.USER32(?,?,?,?,?,00669431), ref: 0066BCA8
                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0066BCC5
                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0066BCD1
                                          • Part of subcall function 0060313D: __wcsicmp_l.LIBCMT ref: 006031C6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                        • String ID: .dll$.exe$.icl
                                        • API String ID: 1212759294-1154884017
                                        • Opcode ID: 70fabeef08a033b42c4cd99b0d6fe0c232bada0fe01b9091490617da12d76d48
                                        • Instruction ID: a8fa8fc87517566a9335dca9cacd179ff5d5bc376ae2d77eb8fad5e775f00756
                                        • Opcode Fuzzy Hash: 70fabeef08a033b42c4cd99b0d6fe0c232bada0fe01b9091490617da12d76d48
                                        • Instruction Fuzzy Hash: C761EF71540219FAEB14DF64DC45BFA7BAEFF08710F10521AF815D61D0DBB0AA90CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadStringW.USER32(00000066,?,00000FFF,0066FB78), ref: 0064A0FC
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                        • LoadStringW.USER32(?,?,00000FFF,?), ref: 0064A11E
                                        • __swprintf.LIBCMT ref: 0064A177
                                        • __swprintf.LIBCMT ref: 0064A190
                                        • _wprintf.LIBCMT ref: 0064A246
                                        • _wprintf.LIBCMT ref: 0064A264
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%g
                                        • API String ID: 311963372-3054832198
                                        • Opcode ID: 27d929d9963664ef1cf46f0dfc0d46311a957db545badc1756beb0ef5d965474
                                        • Instruction ID: b10c9e21f2e6f19cf93306615b75c5a8c44105f89b6510d865fb037a43c3c8d1
                                        • Opcode Fuzzy Hash: 27d929d9963664ef1cf46f0dfc0d46311a957db545badc1756beb0ef5d965474
                                        • Instruction Fuzzy Hash: 58516F3194014ABBCF19EBE0CD86EEEBB7ABF48300F140169F505621A1EB716F58DB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • CharLowerBuffW.USER32(?,?), ref: 0064A636
                                        • GetDriveTypeW.KERNEL32 ref: 0064A683
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A6CB
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A702
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0064A730
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                        • API String ID: 2698844021-4113822522
                                        • Opcode ID: bde42b30f7e85150262f25c03f39e1b9734f4747817ed235343a9bc0eea1a46f
                                        • Instruction ID: d6d590d501c450c0cc91d28140c4d2f6e72b0e7ed50bd232bf59fc360c08a77c
                                        • Opcode Fuzzy Hash: bde42b30f7e85150262f25c03f39e1b9734f4747817ed235343a9bc0eea1a46f
                                        • Instruction Fuzzy Hash: 3F5180751043469FC704EF21C89586ABBF9FF98718F04496CF89597291DB31EE0ACB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0064A47A
                                        • __swprintf.LIBCMT ref: 0064A49C
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0064A4D9
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0064A4FE
                                        • _memset.LIBCMT ref: 0064A51D
                                        • _wcsncpy.LIBCMT ref: 0064A559
                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0064A58E
                                        • CloseHandle.KERNEL32(00000000), ref: 0064A599
                                        • RemoveDirectoryW.KERNEL32(?), ref: 0064A5A2
                                        • CloseHandle.KERNEL32(00000000), ref: 0064A5AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                        • String ID: :$\$\??\%s
                                        • API String ID: 2733774712-3457252023
                                        • Opcode ID: a068830c0f413f0c250637bc7a33ba37ee6ba64a75dc138ada692232188f7afe
                                        • Instruction ID: 3ed66d47450b550a3917091d690d5d3d70eb88bbe4d89c611e47ab24b7a35228
                                        • Opcode Fuzzy Hash: a068830c0f413f0c250637bc7a33ba37ee6ba64a75dc138ada692232188f7afe
                                        • Instruction Fuzzy Hash: 333192B5540119ABDB21DFA0DC49FEB73BEEF88701F1041B6F908D6260E7B097448B65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __wsplitpath.LIBCMT ref: 0064DC7B
                                        • _wcscat.LIBCMT ref: 0064DC93
                                        • _wcscat.LIBCMT ref: 0064DCA5
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0064DCBA
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0064DCCE
                                        • GetFileAttributesW.KERNEL32(?), ref: 0064DCE6
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 0064DD00
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0064DD12
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                        • String ID: *.*
                                        • API String ID: 34673085-438819550
                                        • Opcode ID: 1dc0218a26ed5f421378268a8e98d353da78e92450d51b28e40c2298c4e63994
                                        • Instruction ID: e461afb2ed017983b3d7d9539f3a42880893058cbda81c3d4266219c49bd2db9
                                        • Opcode Fuzzy Hash: 1dc0218a26ed5f421378268a8e98d353da78e92450d51b28e40c2298c4e63994
                                        • Instruction Fuzzy Hash: FE8192B19042419FCB64EF64C8859AEB7EAFF89350F15882EF885C7350E670DD45CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0066C4EC
                                        • GetFocus.USER32 ref: 0066C4FC
                                        • GetDlgCtrlID.USER32(00000000), ref: 0066C507
                                        • _memset.LIBCMT ref: 0066C632
                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0066C65D
                                        • GetMenuItemCount.USER32(?), ref: 0066C67D
                                        • GetMenuItemID.USER32(?,00000000), ref: 0066C690
                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0066C6C4
                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0066C70C
                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0066C744
                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0066C779
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                        • String ID: 0
                                        • API String ID: 1296962147-4108050209
                                        • Opcode ID: 9a27ab860c68234dc07ead358b3f651e5c6bf279b28323b967f8dd0575eb485b
                                        • Instruction ID: 46149132cc97d7b3234197ed6cc653869bbf3e602c800275f84f73732907e810
                                        • Opcode Fuzzy Hash: 9a27ab860c68234dc07ead358b3f651e5c6bf279b28323b967f8dd0575eb485b
                                        • Instruction Fuzzy Hash: 99816B70208711AFD710DF24D984ABBBBEAFB88324F00452DF99697291D770E905CFA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0063874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00638766
                                          • Part of subcall function 0063874A: GetLastError.KERNEL32(?,0063822A,?,?,?), ref: 00638770
                                          • Part of subcall function 0063874A: GetProcessHeap.KERNEL32(00000008,?,?,0063822A,?,?,?), ref: 0063877F
                                          • Part of subcall function 0063874A: HeapAlloc.KERNEL32(00000000,?,0063822A,?,?,?), ref: 00638786
                                          • Part of subcall function 0063874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063879D
                                          • Part of subcall function 006387E7: GetProcessHeap.KERNEL32(00000008,00638240,00000000,00000000,?,00638240,?), ref: 006387F3
                                          • Part of subcall function 006387E7: HeapAlloc.KERNEL32(00000000,?,00638240,?), ref: 006387FA
                                          • Part of subcall function 006387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00638240,?), ref: 0063880B
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00638458
                                        • _memset.LIBCMT ref: 0063846D
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0063848C
                                        • GetLengthSid.ADVAPI32(?), ref: 0063849D
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 006384DA
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006384F6
                                        • GetLengthSid.ADVAPI32(?), ref: 00638513
                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00638522
                                        • HeapAlloc.KERNEL32(00000000), ref: 00638529
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0063854A
                                        • CopySid.ADVAPI32(00000000), ref: 00638551
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00638582
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006385A8
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006385BC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3996160137-0
                                        • Opcode ID: 7cf93ebd170d08d2e33b048726fd1ba734cada4f5e11e6c95719482707ee32b3
                                        • Instruction ID: 9e8a7f82831215321ab34935609f5be610209ab71f17daab2a312e659e0998b1
                                        • Opcode Fuzzy Hash: 7cf93ebd170d08d2e33b048726fd1ba734cada4f5e11e6c95719482707ee32b3
                                        • Instruction Fuzzy Hash: 8361387190020AAFDF00DFA5EC45AEEBBBAFF45310F148169F815A7291DB719A05CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetDC.USER32(00000000), ref: 006576A2
                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 006576AE
                                        • CreateCompatibleDC.GDI32(?), ref: 006576BA
                                        • SelectObject.GDI32(00000000,?), ref: 006576C7
                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0065771B
                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00657757
                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0065777B
                                        • SelectObject.GDI32(00000006,?), ref: 00657783
                                        • DeleteObject.GDI32(?), ref: 0065778C
                                        • DeleteDC.GDI32(00000006), ref: 00657793
                                        • ReleaseDC.USER32(00000000,?), ref: 0065779E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                        • String ID: (
                                        • API String ID: 2598888154-3887548279
                                        • Opcode ID: a9f35e68b8607f8b4c783ac479588f9c8baeb9e36809615a9cd607f9fdbc1e4e
                                        • Instruction ID: 61ad9ad1fca4260c064e3d4ee44b5be6b1e39a502e24507407b934385cfef6b2
                                        • Opcode Fuzzy Hash: a9f35e68b8607f8b4c783ac479588f9c8baeb9e36809615a9cd607f9fdbc1e4e
                                        • Instruction Fuzzy Hash: 1A514875904209EFCB15CFA8EC84EAEBBBAEF48710F14842DF94A97210D771A944CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00600B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,005E6C6C,?,00008000), ref: 00600BB7
                                          • Part of subcall function 005E48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E48A1,?,?,005E37C0,?), ref: 005E48CE
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005E6D0D
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 005E6E5A
                                          • Part of subcall function 005E59CD: _wcscpy.LIBCMT ref: 005E5A05
                                          • Part of subcall function 0060387D: _iswctype.LIBCMT ref: 00603885
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                        • API String ID: 537147316-1018226102
                                        • Opcode ID: 649a87c7b2d6c6e3825daad854b4aaa98f2c523fbece72379eceab0779954172
                                        • Instruction ID: 1eb6309f57ef61424f7ee4253c824bd112bf13058d2e0e454ed2cf879f6748e4
                                        • Opcode Fuzzy Hash: 649a87c7b2d6c6e3825daad854b4aaa98f2c523fbece72379eceab0779954172
                                        • Instruction Fuzzy Hash: 68028D311083819FC718EF25C895AAFBBE6BF99354F04091DF8C6972A1DB31D949CB42
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 005E45F9
                                        • GetMenuItemCount.USER32(006A6890), ref: 0061D7CD
                                        • GetMenuItemCount.USER32(006A6890), ref: 0061D87D
                                        • GetCursorPos.USER32(?), ref: 0061D8C1
                                        • SetForegroundWindow.USER32(00000000), ref: 0061D8CA
                                        • TrackPopupMenuEx.USER32(006A6890,00000000,?,00000000,00000000,00000000), ref: 0061D8DD
                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0061D8E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                        • String ID:
                                        • API String ID: 2751501086-0
                                        • Opcode ID: a80ac0d5031a4f66ba4122ff60c52b36c89039b7b12804d4b73edbc7e810703d
                                        • Instruction ID: 9df449e24007a92ec29606989d127f7f4e5e3e3fe0ad9353926e6bdc93334c66
                                        • Opcode Fuzzy Hash: a80ac0d5031a4f66ba4122ff60c52b36c89039b7b12804d4b73edbc7e810703d
                                        • Instruction Fuzzy Hash: DE71F770600246BFEB249F25DC89FEABF66FF05368F240216F515A62E1C7B16C50DB94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 00658BEC
                                        • CoInitialize.OLE32(00000000), ref: 00658C19
                                        • CoUninitialize.OLE32 ref: 00658C23
                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00658D23
                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00658E50
                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00672C0C), ref: 00658E84
                                        • CoGetObject.OLE32(?,00000000,00672C0C,?), ref: 00658EA7
                                        • SetErrorMode.KERNEL32(00000000), ref: 00658EBA
                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00658F3A
                                        • VariantClear.OLEAUT32(?), ref: 00658F4A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                        • String ID: ,,g
                                        • API String ID: 2395222682-619837891
                                        • Opcode ID: 3eeb3bc48112c1c00f033d9eee8fbad848011453788d3e208f0948020027a5bc
                                        • Instruction ID: caedbbd5b3d8d33c1d9e1b1232556e0cfa9e5f87e64d97df1628467503bf462a
                                        • Opcode Fuzzy Hash: 3eeb3bc48112c1c00f033d9eee8fbad848011453788d3e208f0948020027a5bc
                                        • Instruction Fuzzy Hash: 43C126B1208305AFD700DF64C88496BBBEAFF89349F10495DF98A9B251DB71ED09CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00660038,?,?), ref: 006610BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharUpper
                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                        • API String ID: 3964851224-909552448
                                        • Opcode ID: ffdcaa03eac86665b737b2f5b66af4d383938d07eef99cd61c5c2598f1c167e9
                                        • Instruction ID: 70be6b037f9b3707a506fe0e19f26d94beba619e7e7fd4740e5afd28ce936639
                                        • Opcode Fuzzy Hash: ffdcaa03eac86665b737b2f5b66af4d383938d07eef99cd61c5c2598f1c167e9
                                        • Instruction Fuzzy Hash: FF41723014424E8BDF14EF90EDA16EF3B2ABF66300F144458FD915B691D731AE5ACB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                          • Part of subcall function 005E7A84: _memmove.LIBCMT ref: 005E7B0D
                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006455D2
                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006455E8
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006455F9
                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0064560B
                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0064561C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: SendString$_memmove
                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                        • API String ID: 2279737902-1007645807
                                        • Opcode ID: 0ee45e122c9f090d1a3ed064da477519fa0a621dc863bef02bc4b17fce0bcd12
                                        • Instruction ID: a5d7e4a2d157fc964a0f587e61775b71f0f1d0dee3875c40172a889940175851
                                        • Opcode Fuzzy Hash: 0ee45e122c9f090d1a3ed064da477519fa0a621dc863bef02bc4b17fce0bcd12
                                        • Instruction Fuzzy Hash: D51160305501AE7ADB24A7A2DC5ADFF7EBEFFD5B00F410469B445E20D2EEA01D05C5A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                        • String ID: 0.0.0.0
                                        • API String ID: 208665112-3771769585
                                        • Opcode ID: 62dd36c3e0b0bdf339222b489e9dca1977962d7cdd563ee5539032f3f02e94ee
                                        • Instruction ID: b1cbb4c5669d80a98e40c72d66d64394ae9efb6096a35b1cbd25c5ca2186f52d
                                        • Opcode Fuzzy Hash: 62dd36c3e0b0bdf339222b489e9dca1977962d7cdd563ee5539032f3f02e94ee
                                        • Instruction Fuzzy Hash: 0011363194811AAFCB64EB20EC0AFDB77BEDF01710F0001BAF44597191EFB09A81D6A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • timeGetTime.WINMM ref: 0064521C
                                          • Part of subcall function 00600719: timeGetTime.WINMM(?,75A8B400,005F0FF9), ref: 0060071D
                                        • Sleep.KERNEL32(0000000A), ref: 00645248
                                        • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0064526C
                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0064528E
                                        • SetActiveWindow.USER32 ref: 006452AD
                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006452BB
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 006452DA
                                        • Sleep.KERNEL32(000000FA), ref: 006452E5
                                        • IsWindow.USER32 ref: 006452F1
                                        • EndDialog.USER32(00000000), ref: 00645302
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                        • String ID: BUTTON
                                        • API String ID: 1194449130-3405671355
                                        • Opcode ID: fc1557777bfc85f4dcbb2b7c4cf0254f0466d9240e3647c80eb9c04d5d373417
                                        • Instruction ID: ee825a843fb77f29665ab322ac6fcd383cd30e11c3521621c61ec760c038c4a5
                                        • Opcode Fuzzy Hash: fc1557777bfc85f4dcbb2b7c4cf0254f0466d9240e3647c80eb9c04d5d373417
                                        • Instruction Fuzzy Hash: 5C218470204704AFE7017F70FD89B667B6BEB56786F043429F102812B2DBE1AD408E71
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • CoInitialize.OLE32(00000000), ref: 0064D855
                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0064D8E8
                                        • SHGetDesktopFolder.SHELL32(?), ref: 0064D8FC
                                        • CoCreateInstance.OLE32(00672D7C,00000000,00000001,0069A89C,?), ref: 0064D948
                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0064D9B7
                                        • CoTaskMemFree.OLE32(?,?), ref: 0064DA0F
                                        • _memset.LIBCMT ref: 0064DA4C
                                        • SHBrowseForFolderW.SHELL32(?), ref: 0064DA88
                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0064DAAB
                                        • CoTaskMemFree.OLE32(00000000), ref: 0064DAB2
                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0064DAE9
                                        • CoUninitialize.OLE32(00000001,00000000), ref: 0064DAEB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                        • String ID:
                                        • API String ID: 1246142700-0
                                        • Opcode ID: 2c9ce5c9d34ad71d3c067eaf811735225ea3aa61fc31202e2c267f3ac29cf7ef
                                        • Instruction ID: 4704c0e1ddbf8bc6e48b747458007df3a1c740e1f297c9e8b2467972e298a855
                                        • Opcode Fuzzy Hash: 2c9ce5c9d34ad71d3c067eaf811735225ea3aa61fc31202e2c267f3ac29cf7ef
                                        • Instruction Fuzzy Hash: 75B1FE75A00119AFDB04DF65D888DAEBBFAFF88314B1484A9F509EB251DB30ED45CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 006405A7
                                        • SetKeyboardState.USER32(?), ref: 00640612
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00640632
                                        • GetKeyState.USER32(000000A0), ref: 00640649
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00640678
                                        • GetKeyState.USER32(000000A1), ref: 00640689
                                        • GetAsyncKeyState.USER32(00000011), ref: 006406B5
                                        • GetKeyState.USER32(00000011), ref: 006406C3
                                        • GetAsyncKeyState.USER32(00000012), ref: 006406EC
                                        • GetKeyState.USER32(00000012), ref: 006406FA
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00640723
                                        • GetKeyState.USER32(0000005B), ref: 00640731
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: dc1be5b4f1173eecee486a212440d65fdb16657c1257690974bfd277d3e3603b
                                        • Instruction ID: b1405c2cd5d528abad0ff8afab130680fe751435e5dc69cedcba2c56ae97af40
                                        • Opcode Fuzzy Hash: dc1be5b4f1173eecee486a212440d65fdb16657c1257690974bfd277d3e3603b
                                        • Instruction Fuzzy Hash: DB511F20A0479419FB34EBB085547EABFB6DF52380F08459DD6C25B2C2D6749B8CCF55
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetDlgItem.USER32(?,00000001), ref: 0063C746
                                        • GetWindowRect.USER32(00000000,?), ref: 0063C758
                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0063C7B6
                                        • GetDlgItem.USER32(?,00000002), ref: 0063C7C1
                                        • GetWindowRect.USER32(00000000,?), ref: 0063C7D3
                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0063C827
                                        • GetDlgItem.USER32(?,000003E9), ref: 0063C835
                                        • GetWindowRect.USER32(00000000,?), ref: 0063C846
                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0063C889
                                        • GetDlgItem.USER32(?,000003EA), ref: 0063C897
                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0063C8B4
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0063C8C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$ItemMoveRect$Invalidate
                                        • String ID:
                                        • API String ID: 3096461208-0
                                        • Opcode ID: 8134bafb133f67c7116accc37d12b036266be4845fce8e0a29b7d2c07fac7304
                                        • Instruction ID: 4b913d3d833e55a78c5dc555d0a6270baad4a5ed97b41a1f33ca8c689d68d98e
                                        • Opcode Fuzzy Hash: 8134bafb133f67c7116accc37d12b036266be4845fce8e0a29b7d2c07fac7304
                                        • Instruction Fuzzy Hash: 12512171B00205AFDB18CF69DD99AAEBBB6FB88711F14812DF515E72A0D7B09D40CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005E2036,?,00000000,?,?,?,?,005E16CB,00000000,?), ref: 005E1B9A
                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005E20D3
                                        • KillTimer.USER32(-00000001,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 005E216E
                                        • DestroyAcceleratorTable.USER32(00000000), ref: 0061BEF6
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BF27
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BF3E
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005E16CB,00000000,?,?,005E1AE2,?,?), ref: 0061BF5A
                                        • DeleteObject.GDI32(00000000), ref: 0061BF6C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                        • String ID:
                                        • API String ID: 641708696-0
                                        • Opcode ID: c68fb6580ca8d3969b442aee47d9cb83da41e9c6680ee5d4ee444d4fb75ef0fa
                                        • Instruction ID: bf9a82eba6d7d72fb376dbd6eb185297021a4ad5a0b1fd8665edf34be586afba
                                        • Opcode Fuzzy Hash: c68fb6580ca8d3969b442aee47d9cb83da41e9c6680ee5d4ee444d4fb75ef0fa
                                        • Instruction Fuzzy Hash: BF61BD31500650DFCB29AF16DD48B69BBF7FB41312F18A828E09286AA4C775AD81CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E25DB: GetWindowLongW.USER32(?,000000EB), ref: 005E25EC
                                        • GetSysColor.USER32(0000000F), ref: 005E21D3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ColorLongWindow
                                        • String ID:
                                        • API String ID: 259745315-0
                                        • Opcode ID: fc33823e9bb903b2d4efbb43b80f84f718ab5e9a93283cad4543bfb06340c1ee
                                        • Instruction ID: 0e7c84662cb85a691e7411d6ae182b7ee014e5e3a566e4a917fa4a44f7ea4e9f
                                        • Opcode Fuzzy Hash: fc33823e9bb903b2d4efbb43b80f84f718ab5e9a93283cad4543bfb06340c1ee
                                        • Instruction Fuzzy Hash: 4641C935040180AFDB195F29EC48BB93B6AFB06331F185265FEA58A1E6C7718C41DB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharLowerBuffW.USER32(?,?,0066F910), ref: 0064AB76
                                        • GetDriveTypeW.KERNEL32(00000061,0069A620,00000061), ref: 0064AC40
                                        • _wcscpy.LIBCMT ref: 0064AC6A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharDriveLowerType_wcscpy
                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                        • API String ID: 2820617543-1000479233
                                        • Opcode ID: 8a946c538fe5d48ad1d6698c5a5295cd2599423b64e579e49052e3170a5717a3
                                        • Instruction ID: 1d3eaea1ff0d6d73fc9636a043cf360b203364dc512eab05bddfabfc964656cb
                                        • Opcode Fuzzy Hash: 8a946c538fe5d48ad1d6698c5a5295cd2599423b64e579e49052e3170a5717a3
                                        • Instruction Fuzzy Hash: 7851B230188342ABC714EF54C895AABBBABFF94300F54482DF496972E2DB319D09CB53
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                          • Part of subcall function 005E2344: GetCursorPos.USER32(?), ref: 005E2357
                                          • Part of subcall function 005E2344: ScreenToClient.USER32(006A67B0,?), ref: 005E2374
                                          • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000001), ref: 005E2399
                                          • Part of subcall function 005E2344: GetAsyncKeyState.USER32(00000002), ref: 005E23A7
                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0066C2E4
                                        • ImageList_EndDrag.COMCTL32 ref: 0066C2EA
                                        • ReleaseCapture.USER32 ref: 0066C2F0
                                        • SetWindowTextW.USER32(?,00000000), ref: 0066C39A
                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0066C3AD
                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0066C48F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$prj$prj
                                        • API String ID: 1924731296-2963624789
                                        • Opcode ID: 1c62a37feecf61d283e5c97f9163465084c4310b9247df1ffb273c6658fbe7e3
                                        • Instruction ID: 10eb032de977124dc7de3d435f00f38335dc85ae3b8742d705225dfdf981c885
                                        • Opcode Fuzzy Hash: 1c62a37feecf61d283e5c97f9163465084c4310b9247df1ffb273c6658fbe7e3
                                        • Instruction Fuzzy Hash: 3E518D70204305AFD704EF24DC59FAA7BEAFB88310F04452DF5A59B2E1DB70A944CB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __i64tow__itow__swprintf
                                        • String ID: %.15g$0x%p$False$True
                                        • API String ID: 421087845-2263619337
                                        • Opcode ID: a493ce2fbd50aa2c8dc025c3d30a38ac00aacf138a12de963518c0b83d8bad9d
                                        • Instruction ID: a0ad5c62664f893d06ff334bc24ad2a0ba20fa1ec34c49099e2e8d6ddcb85468
                                        • Opcode Fuzzy Hash: a493ce2fbd50aa2c8dc025c3d30a38ac00aacf138a12de963518c0b83d8bad9d
                                        • Instruction Fuzzy Hash: 9A411771544205AFDB28EF39D842FBB77EAFF44300F24486EE589D7282EA719941CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 006673D9
                                        • CreateMenu.USER32 ref: 006673F4
                                        • SetMenu.USER32(?,00000000), ref: 00667403
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00667490
                                        • IsMenu.USER32(?), ref: 006674A6
                                        • CreatePopupMenu.USER32 ref: 006674B0
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006674DD
                                        • DrawMenuBar.USER32 ref: 006674E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                        • String ID: 0$F
                                        • API String ID: 176399719-3044882817
                                        • Opcode ID: 4a5b728300f91aacc042e9e91734395a227821e302bf8eae556ea7ec07f6011c
                                        • Instruction ID: 8f3284d45de6045ffc9f18d36c1ccf97930b10e157ea32f6ec1dbd7d7a30515d
                                        • Opcode Fuzzy Hash: 4a5b728300f91aacc042e9e91734395a227821e302bf8eae556ea7ec07f6011c
                                        • Instruction Fuzzy Hash: E2411575A01205EFDB10DF64E888A9ABBFAFB89314F144029F95697360DB75AD10CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 006677CD
                                        • CreateCompatibleDC.GDI32(00000000), ref: 006677D4
                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 006677E7
                                        • SelectObject.GDI32(00000000,00000000), ref: 006677EF
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 006677FA
                                        • DeleteDC.GDI32(00000000), ref: 00667803
                                        • GetWindowLongW.USER32(?,000000EC), ref: 0066780D
                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00667821
                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0066782D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                        • String ID: static
                                        • API String ID: 2559357485-2160076837
                                        • Opcode ID: c9b7e872ac0ff9f5f31f3ef904c9925d9ddc21f54639b8fe14a69e0a255f30c9
                                        • Instruction ID: e3fefc44c9cf16494951a39590ddb19555dc7651aabe834cbc3d1e4008c02255
                                        • Opcode Fuzzy Hash: c9b7e872ac0ff9f5f31f3ef904c9925d9ddc21f54639b8fe14a69e0a255f30c9
                                        • Instruction Fuzzy Hash: CE316B32105215BBDF119FA4EC09FDA3F6AFF09365F111228FA15A61A0CB71DC61DBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0060707B
                                          • Part of subcall function 00608D68: __getptd_noexit.LIBCMT ref: 00608D68
                                        • __gmtime64_s.LIBCMT ref: 00607114
                                        • __gmtime64_s.LIBCMT ref: 0060714A
                                        • __gmtime64_s.LIBCMT ref: 00607167
                                        • __allrem.LIBCMT ref: 006071BD
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006071D9
                                        • __allrem.LIBCMT ref: 006071F0
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0060720E
                                        • __allrem.LIBCMT ref: 00607225
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00607243
                                        • __invoke_watson.LIBCMT ref: 006072B4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                        • String ID:
                                        • API String ID: 384356119-0
                                        • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                        • Instruction ID: bdbd633b79a79cf46cd8538a06956eb3a7bbf1b9a51f6f439b9e34259c5e7421
                                        • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                        • Instruction Fuzzy Hash: A871A2B1E84716ABE7189E79CC41B9BB3AAAF50324F14422EF515E73C1E770FA408794
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00642A31
                                        • GetMenuItemInfoW.USER32(006A6890,000000FF,00000000,00000030), ref: 00642A92
                                        • SetMenuItemInfoW.USER32(006A6890,00000004,00000000,00000030), ref: 00642AC8
                                        • Sleep.KERNEL32(000001F4), ref: 00642ADA
                                        • GetMenuItemCount.USER32(?), ref: 00642B1E
                                        • GetMenuItemID.USER32(?,00000000), ref: 00642B3A
                                        • GetMenuItemID.USER32(?,-00000001), ref: 00642B64
                                        • GetMenuItemID.USER32(?,?), ref: 00642BA9
                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00642BEF
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00642C03
                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00642C24
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                        • String ID:
                                        • API String ID: 4176008265-0
                                        • Opcode ID: 3cf178a9f43ca9b1a3a5d954694b69b7a66bf8246775583a48b7bea27a0e898e
                                        • Instruction ID: b9894889d07bcca9385b89c64c241fdba903a99b7c841678fb07e78a80b06492
                                        • Opcode Fuzzy Hash: 3cf178a9f43ca9b1a3a5d954694b69b7a66bf8246775583a48b7bea27a0e898e
                                        • Instruction Fuzzy Hash: C561C2B090024AAFDB11CF64DCA8EFEBBBAFB51308FA40559F84293251D771AD45DB21
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00667214
                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00667217
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0066723B
                                        • _memset.LIBCMT ref: 0066724C
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0066725E
                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006672D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow_memset
                                        • String ID:
                                        • API String ID: 830647256-0
                                        • Opcode ID: 916d99be02fbdd8acbde8e028669cc5222fe6238bab202b4127e63985da3ed69
                                        • Instruction ID: 96cdc456151b1e4df700d5498d005903f9c9d1da39f410f3aad14aae4f27e08b
                                        • Opcode Fuzzy Hash: 916d99be02fbdd8acbde8e028669cc5222fe6238bab202b4127e63985da3ed69
                                        • Instruction Fuzzy Hash: D1617A71900208AFDB10DFA4CC81EEE77BAAB09704F140199FA15A73A1D774AE41DF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00637135
                                        • SafeArrayAllocData.OLEAUT32(?), ref: 0063718E
                                        • VariantInit.OLEAUT32(?), ref: 006371A0
                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 006371C0
                                        • VariantCopy.OLEAUT32(?,?), ref: 00637213
                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00637227
                                        • VariantClear.OLEAUT32(?), ref: 0063723C
                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00637249
                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00637252
                                        • VariantClear.OLEAUT32(?), ref: 00637264
                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0063726F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                        • String ID:
                                        • API String ID: 2706829360-0
                                        • Opcode ID: 423b945a11d2d7b918f0a03bef0880af0589be3ac958266b5678cc2b0f102008
                                        • Instruction ID: 5ace8763c9dd38d1331f540ef279f96d15f68283822fc31f8c13117a1d988a73
                                        • Opcode Fuzzy Hash: 423b945a11d2d7b918f0a03bef0880af0589be3ac958266b5678cc2b0f102008
                                        • Instruction Fuzzy Hash: 9C415F75A04219AFCF14DF64D8489EEBBFAFF48354F008069F955E7262CB70AA45CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • CoInitialize.OLE32 ref: 00658718
                                        • CoUninitialize.OLE32 ref: 00658723
                                        • CoCreateInstance.OLE32(?,00000000,00000017,00672BEC,?), ref: 00658783
                                        • IIDFromString.OLE32(?,?), ref: 006587F6
                                        • VariantInit.OLEAUT32(?), ref: 00658890
                                        • VariantClear.OLEAUT32(?), ref: 006588F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                        • API String ID: 834269672-1287834457
                                        • Opcode ID: 7d760aa11fef5640fb3b9cc72d1ca0a67f44e1396791dfb8d8a33e02c4a52bca
                                        • Instruction ID: 51ba1a714c7ef2085c55a2ea5d613a2850af5ef7b976bdd0377c2650a82f8767
                                        • Opcode Fuzzy Hash: 7d760aa11fef5640fb3b9cc72d1ca0a67f44e1396791dfb8d8a33e02c4a52bca
                                        • Instruction Fuzzy Hash: DC61C270608301AFD710DF64C849B6EBBEAEF88715F14481DF985AB691CB70ED49CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 00655AA6
                                        • inet_addr.WSOCK32(?,?,?), ref: 00655AEB
                                        • gethostbyname.WSOCK32(?), ref: 00655AF7
                                        • IcmpCreateFile.IPHLPAPI ref: 00655B05
                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00655B75
                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00655B8B
                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00655C00
                                        • WSACleanup.WSOCK32 ref: 00655C06
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                        • String ID: Ping
                                        • API String ID: 1028309954-2246546115
                                        • Opcode ID: 8e5fd77236e3e8fc27b3bcdbaf576d72bb527a50b1272e13e6095b557b012660
                                        • Instruction ID: 4f8b97e8820db08c097abfc28204f045708cd9503891bbb1586ea6373b8841b7
                                        • Opcode Fuzzy Hash: 8e5fd77236e3e8fc27b3bcdbaf576d72bb527a50b1272e13e6095b557b012660
                                        • Instruction Fuzzy Hash: 6951BF312047019FDB10AF25DC6DB6ABBE6EF48310F14892AF996DB2A1DB70E804CB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0064B73B
                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0064B7B1
                                        • GetLastError.KERNEL32 ref: 0064B7BB
                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 0064B828
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Error$Mode$DiskFreeLastSpace
                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                        • API String ID: 4194297153-14809454
                                        • Opcode ID: b8182c425136ef280803843cdb445f7a453f06b58e42f65c08fb7aaecf11c1d3
                                        • Instruction ID: 7c34996f55400408ba39e5589188e8032d50e18d1d6faac3922a1e1271822a79
                                        • Opcode Fuzzy Hash: b8182c425136ef280803843cdb445f7a453f06b58e42f65c08fb7aaecf11c1d3
                                        • Instruction Fuzzy Hash: 96319035A002099FDB04EFA4D889AFEBBBAFF85740F149029E402D7291DB71D942CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006394F6
                                        • GetDlgCtrlID.USER32 ref: 00639501
                                        • GetParent.USER32 ref: 0063951D
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00639520
                                        • GetDlgCtrlID.USER32(?), ref: 00639529
                                        • GetParent.USER32(?), ref: 00639545
                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00639548
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 1536045017-1403004172
                                        • Opcode ID: 6fa17dae99bc05229464c45c558a9df8e850e9037b4703d00c595fd0b1294373
                                        • Instruction ID: 24399db791323ffa4d107b93061ee1694818e1dd5a5b4aaa7d01873826a3ce2a
                                        • Opcode Fuzzy Hash: 6fa17dae99bc05229464c45c558a9df8e850e9037b4703d00c595fd0b1294373
                                        • Instruction Fuzzy Hash: DF21B270900104BBCF05AB65CC85DFEBB7AFF89310F104129F562972A2DBB55919DA70
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006395DF
                                        • GetDlgCtrlID.USER32 ref: 006395EA
                                        • GetParent.USER32 ref: 00639606
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00639609
                                        • GetDlgCtrlID.USER32(?), ref: 00639612
                                        • GetParent.USER32(?), ref: 0063962E
                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00639631
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 1536045017-1403004172
                                        • Opcode ID: cbf24c502107a87f3e5628674fd3b5644a1c2a6a43f4ba957b3cd32c44b117e1
                                        • Instruction ID: 103d0cec1a9e7a2a5dab0f4bbd15ecb09c69acc4d066133ce8f1b456f862c5c4
                                        • Opcode Fuzzy Hash: cbf24c502107a87f3e5628674fd3b5644a1c2a6a43f4ba957b3cd32c44b117e1
                                        • Instruction Fuzzy Hash: CC21B374900208BBDF05AB65CCC5EFEBB7AFF49300F104019F961972A1DBB59919DA70
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetParent.USER32 ref: 00639651
                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00639666
                                        • _wcscmp.LIBCMT ref: 00639678
                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006396F3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameParentSend_wcscmp
                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                        • API String ID: 1704125052-3381328864
                                        • Opcode ID: 622dcc9f48726fbfd9b1b3259437f95636201f3cc4db6c2fb44a411ee568640a
                                        • Instruction ID: 5a47f194013d4491e7ada9d822bc34e496aceb93492b3a9282a1d67e284ae748
                                        • Opcode Fuzzy Hash: 622dcc9f48726fbfd9b1b3259437f95636201f3cc4db6c2fb44a411ee568640a
                                        • Instruction Fuzzy Hash: 7F110A76289317BAFB052625EC07DE7779F8B06361F21002AF900A55D1FED259114DF8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __swprintf.LIBCMT ref: 0064419D
                                        • __swprintf.LIBCMT ref: 006441AA
                                          • Part of subcall function 006038D8: __woutput_l.LIBCMT ref: 00603931
                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 006441D4
                                        • LoadResource.KERNEL32(?,00000000), ref: 006441E0
                                        • LockResource.KERNEL32(00000000), ref: 006441ED
                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 0064420D
                                        • LoadResource.KERNEL32(?,00000000), ref: 0064421F
                                        • SizeofResource.KERNEL32(?,00000000), ref: 0064422E
                                        • LockResource.KERNEL32(?), ref: 0064423A
                                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0064429B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                        • String ID:
                                        • API String ID: 1433390588-0
                                        • Opcode ID: d21e6e4770ebe548371ef0150a66f982373df310e0378cd59465ad64a55981d9
                                        • Instruction ID: e6731ef4ab831213cde84bbfb93251c0b1194b01741df1395350e5cbbcff1cb0
                                        • Opcode Fuzzy Hash: d21e6e4770ebe548371ef0150a66f982373df310e0378cd59465ad64a55981d9
                                        • Instruction Fuzzy Hash: 23317072A0521AAFDB119FA0EC55EBF7BAEFF09301F004525F915D2250DBB0DE518BA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00641700
                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00640778,?,00000001), ref: 00641714
                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0064171B
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640778,?,00000001), ref: 0064172A
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0064173C
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640778,?,00000001), ref: 00641755
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00640778,?,00000001), ref: 00641767
                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00640778,?,00000001), ref: 006417AC
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00640778,?,00000001), ref: 006417C1
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00640778,?,00000001), ref: 006417CC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                        • String ID:
                                        • API String ID: 2156557900-0
                                        • Opcode ID: d55fee359ccaf66de41a4338586a5c7b41ecd3d99ee3e523f71713b55ad7cd6e
                                        • Instruction ID: e3d7139ced60d5852c354b38fbaedae02305e1b040fa9be75be125898c646922
                                        • Opcode Fuzzy Hash: d55fee359ccaf66de41a4338586a5c7b41ecd3d99ee3e523f71713b55ad7cd6e
                                        • Instruction Fuzzy Hash: 63318F75604204BFEB11AF15ED84BA97BABEB57711F105025F904CA3A0E7B4AE818F61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$ClearInit$_memset
                                        • String ID: ,,g$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                        • API String ID: 2862541840-4066664511
                                        • Opcode ID: 626a88eb787c44085c3e3fd388e5bbc00856a43087d5e72f9dd8fab461fb793b
                                        • Instruction ID: 0968003aca0bdc933600978f4c25ba768d56612530348bb6ada7b4c4d49a1694
                                        • Opcode Fuzzy Hash: 626a88eb787c44085c3e3fd388e5bbc00856a43087d5e72f9dd8fab461fb793b
                                        • Instruction Fuzzy Hash: DE918D71A00215EBDF24DFA5C848FAEBBBAEF45711F108159F915AB280D7709949CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnumChildWindows.USER32(?,0063AA64), ref: 0063A9A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ChildEnumWindows
                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                        • API String ID: 3555792229-1603158881
                                        • Opcode ID: 8b9374c5b965cad23668c073d3deb21de4d6d4842808d8c46e2d0e0e78fc8013
                                        • Instruction ID: ef7341a0ef8fcfeb1c06f65b0112b13656645150997cb5931e2f076f12afa815
                                        • Opcode Fuzzy Hash: 8b9374c5b965cad23668c073d3deb21de4d6d4842808d8c46e2d0e0e78fc8013
                                        • Instruction Fuzzy Hash: 569185309006469BDB5CDFA0C481BEAFB7ABF14304F10811DD4DAA7691DF30695ADBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetWindowLongW.USER32(?,000000EB), ref: 005E2EAE
                                          • Part of subcall function 005E1DB3: GetClientRect.USER32(?,?), ref: 005E1DDC
                                          • Part of subcall function 005E1DB3: GetWindowRect.USER32(?,?), ref: 005E1E1D
                                          • Part of subcall function 005E1DB3: ScreenToClient.USER32(?,?), ref: 005E1E45
                                        • GetDC.USER32 ref: 0061CF82
                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0061CF95
                                        • SelectObject.GDI32(00000000,00000000), ref: 0061CFA3
                                        • SelectObject.GDI32(00000000,00000000), ref: 0061CFB8
                                        • ReleaseDC.USER32(?,00000000), ref: 0061CFC0
                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0061D04B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                        • String ID: U
                                        • API String ID: 4009187628-3372436214
                                        • Opcode ID: df1a7e1dde8a01b0d0b1aa3e94ed01affd64182c055528646edecfdcb0bb7efe
                                        • Instruction ID: 2f596fa4b05a64136ea5e16e44a9b9c104eb6302de5768bd0e7ba96f62038cf8
                                        • Opcode Fuzzy Hash: df1a7e1dde8a01b0d0b1aa3e94ed01affd64182c055528646edecfdcb0bb7efe
                                        • Instruction Fuzzy Hash: 0571B471400245DFCF259F64C884AFA7BBBFF49361F184269ED95962AAC7318C82DB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0066F910), ref: 0065903D
                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0066F910), ref: 00659071
                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 006591EB
                                        • SysFreeString.OLEAUT32(?), ref: 00659215
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                        • String ID:
                                        • API String ID: 560350794-0
                                        • Opcode ID: 21f797ed9bc122ed906adffadcfa95f6ad557a035f065e5e6c344cf477833383
                                        • Instruction ID: b8160691a134824409f6024742b926436a41746caf653c6b3b02f4c3f4b4480e
                                        • Opcode Fuzzy Hash: 21f797ed9bc122ed906adffadcfa95f6ad557a035f065e5e6c344cf477833383
                                        • Instruction Fuzzy Hash: D3F12B71900119EFDB14DF94C888EEEB7BABF49315F108459F916AB251CB31AE4ACB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0065F9C9
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065FB5C
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0065FB80
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065FBC0
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0065FBE2
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0065FD5E
                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0065FD90
                                        • CloseHandle.KERNEL32(?), ref: 0065FDBF
                                        • CloseHandle.KERNEL32(?), ref: 0065FE36
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                        • String ID:
                                        • API String ID: 4090791747-0
                                        • Opcode ID: 376bbe79e214430155b37b5bb5b99f6242b90fa91a32791dac3324e7b93b5b1f
                                        • Instruction ID: 6d3fdbdc7374d4ce038cf2a94cac9d7fa24324d2701c73ecc6575319010d4ba0
                                        • Opcode Fuzzy Hash: 376bbe79e214430155b37b5bb5b99f6242b90fa91a32791dac3324e7b93b5b1f
                                        • Instruction Fuzzy Hash: 80E1A031204242DFC714EF24C895A6BBBE6BF85314F14896DF8999B3A2DB31DC45CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006438D3,?), ref: 006448C7
                                          • Part of subcall function 006448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006438D3,?), ref: 006448E0
                                          • Part of subcall function 00644CD3: GetFileAttributesW.KERNEL32(?,00643947), ref: 00644CD4
                                        • lstrcmpiW.KERNEL32(?,?), ref: 00644FE2
                                        • _wcscmp.LIBCMT ref: 00644FFC
                                        • MoveFileW.KERNEL32(?,?), ref: 00645017
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                        • String ID:
                                        • API String ID: 793581249-0
                                        • Opcode ID: 1bc3047c7020113ea5de4a736d4ef6afbff5debb760f4901def519eb0baf3321
                                        • Instruction ID: 25c5fd3fd60f64e6a87631f070122ee473a36325fb5fb85a6919742463ae5ac6
                                        • Opcode Fuzzy Hash: 1bc3047c7020113ea5de4a736d4ef6afbff5debb760f4901def519eb0baf3321
                                        • Instruction Fuzzy Hash: 015186B20087859BC764DB60DC859DFB7EDAF84341F10092EF189D3192EF74A68C876A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0066896E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InvalidateRect
                                        • String ID:
                                        • API String ID: 634782764-0
                                        • Opcode ID: 70cd9c096e4330962d1a705050e3ad1ada80b2a06658420bb5993d1d5aaaae50
                                        • Instruction ID: 41c4a206d9abcdb9f5df95a3df1bae2136a63fd41802ce1fb00490e1a5f4ef1f
                                        • Opcode Fuzzy Hash: 70cd9c096e4330962d1a705050e3ad1ada80b2a06658420bb5993d1d5aaaae50
                                        • Instruction Fuzzy Hash: 0151B330600208BFDF249F78DC89BA97B67FB05310F644316FA11E72A1DFB1A9808B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0061C547
                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0061C569
                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0061C581
                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0061C59F
                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0061C5C0
                                        • DestroyIcon.USER32(00000000), ref: 0061C5CF
                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0061C5EC
                                        • DestroyIcon.USER32(?), ref: 0061C5FB
                                          • Part of subcall function 0066A71E: DeleteObject.GDI32(00000000), ref: 0066A757
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                        • String ID:
                                        • API String ID: 2819616528-0
                                        • Opcode ID: b367cb25dd7137d67a34d77a3eb555f3e81f1649e4035349b3d63fefb4933297
                                        • Instruction ID: 7a59f3d67854d63594b188bc8fd35e33104e98571f964082bfff7f26443e5e57
                                        • Opcode Fuzzy Hash: b367cb25dd7137d67a34d77a3eb555f3e81f1649e4035349b3d63fefb4933297
                                        • Instruction Fuzzy Hash: 18517B70640249AFDB24DF25DC45FAA3BBAFB54320F144528F956D72A0DBB0ED90DB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0063AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0063AE77
                                          • Part of subcall function 0063AE57: GetCurrentThreadId.KERNEL32 ref: 0063AE7E
                                          • Part of subcall function 0063AE57: AttachThreadInput.USER32(00000000,?,00639B65,?,00000001), ref: 0063AE85
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00639B70
                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00639B8D
                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00639B90
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00639B99
                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00639BB7
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00639BBA
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00639BC3
                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00639BDA
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00639BDD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                        • String ID:
                                        • API String ID: 2014098862-0
                                        • Opcode ID: 30c43eeb218cbb4bfda942231b3004af72fdb2fe31d65c25a40e739d0ee74160
                                        • Instruction ID: 307cf63b2960864f4c9d6f6a11c9779688f3dcda70665eecf31938e969e5e6fe
                                        • Opcode Fuzzy Hash: 30c43eeb218cbb4bfda942231b3004af72fdb2fe31d65c25a40e739d0ee74160
                                        • Instruction Fuzzy Hash: A011E171550218BEF7106F60EC89F6A7B2EEB4D791F101429F254AB0A0C9F26C10EAB4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00638A84,00000B00,?,?), ref: 00638E0C
                                        • HeapAlloc.KERNEL32(00000000,?,00638A84,00000B00,?,?), ref: 00638E13
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00638A84,00000B00,?,?), ref: 00638E28
                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00638A84,00000B00,?,?), ref: 00638E30
                                        • DuplicateHandle.KERNEL32(00000000,?,00638A84,00000B00,?,?), ref: 00638E33
                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00638A84,00000B00,?,?), ref: 00638E43
                                        • GetCurrentProcess.KERNEL32(00638A84,00000000,?,00638A84,00000B00,?,?), ref: 00638E4B
                                        • DuplicateHandle.KERNEL32(00000000,?,00638A84,00000B00,?,?), ref: 00638E4E
                                        • CreateThread.KERNEL32(00000000,00000000,00638E74,00000000,00000000,00000000), ref: 00638E68
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                        • String ID:
                                        • API String ID: 1957940570-0
                                        • Opcode ID: 29fc83e3fac5d3b9e2ce2f89be52b9de4b89a753d6535ac2c73677760d3679b6
                                        • Instruction ID: 99e77cd4e85a887e4de81ab1f6e37ca373cb2b6ca0e804e43d9a0962a165b821
                                        • Opcode Fuzzy Hash: 29fc83e3fac5d3b9e2ce2f89be52b9de4b89a753d6535ac2c73677760d3679b6
                                        • Instruction Fuzzy Hash: 3601BBB5240308FFE710ABA5EC4DF6B7BADEB89751F015421FA05DB1A1CAB1A800CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00637652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?,?,0063799D), ref: 0063766F
                                          • Part of subcall function 00637652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?), ref: 0063768A
                                          • Part of subcall function 00637652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?), ref: 00637698
                                          • Part of subcall function 00637652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?), ref: 006376A8
                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00659B1B
                                        • _memset.LIBCMT ref: 00659B28
                                        • _memset.LIBCMT ref: 00659C6B
                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00659C97
                                        • CoTaskMemFree.OLE32(?), ref: 00659CA2
                                        Strings
                                        • NULL Pointer assignment, xrefs: 00659CF0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                        • String ID: NULL Pointer assignment
                                        • API String ID: 1300414916-2785691316
                                        • Opcode ID: 4a7936397fdbd8f96be5147722894a5f28c4328492ecec0e23f4865591855724
                                        • Instruction ID: 0cb4a7b3061fd30d250c74d07622caeb0d252235edd5d0e47779e83d6b068a88
                                        • Opcode Fuzzy Hash: 4a7936397fdbd8f96be5147722894a5f28c4328492ecec0e23f4865591855724
                                        • Instruction Fuzzy Hash: 75913871D00219EBDB14DFA5DC85ADEBBBAFF48310F204169F819A7281DB715A45CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00667093
                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 006670A7
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006670C1
                                        • _wcscat.LIBCMT ref: 0066711C
                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00667133
                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00667161
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window_wcscat
                                        • String ID: SysListView32
                                        • API String ID: 307300125-78025650
                                        • Opcode ID: 48144a9173142402a6310d48044e2cda6cdd6e8d625202e914cd4c24dc96839e
                                        • Instruction ID: 963ca4ab3b71428cdb20afbf69d4174d6c2e881fd724f6af7af8bb40ce40e00a
                                        • Opcode Fuzzy Hash: 48144a9173142402a6310d48044e2cda6cdd6e8d625202e914cd4c24dc96839e
                                        • Instruction Fuzzy Hash: 3B41C370904308AFDB21DFA4DC85BEEB7EAEF08354F10052AF554E7292D6719D848B60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00643E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00643EB6
                                          • Part of subcall function 00643E91: Process32FirstW.KERNEL32(00000000,?), ref: 00643EC4
                                          • Part of subcall function 00643E91: CloseHandle.KERNEL32(00000000), ref: 00643F8E
                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065ECB8
                                        • GetLastError.KERNEL32 ref: 0065ECCB
                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0065ECFA
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0065ED77
                                        • GetLastError.KERNEL32(00000000), ref: 0065ED82
                                        • CloseHandle.KERNEL32(00000000), ref: 0065EDB7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                        • String ID: SeDebugPrivilege
                                        • API String ID: 2533919879-2896544425
                                        • Opcode ID: a4d0c113f9fe12a6cb413b1852327415e414ada90dd3ebb970b18397d33f0aee
                                        • Instruction ID: 9f994dcd91d586201ba69de92594fbfa9b1b146c7268cf15b68df0cc25dd58c9
                                        • Opcode Fuzzy Hash: a4d0c113f9fe12a6cb413b1852327415e414ada90dd3ebb970b18397d33f0aee
                                        • Instruction Fuzzy Hash: 254191716002019FDB18EF14CC95F6DBBA6BF80714F08845DF9429B3D2DBB6A948CB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadIconW.USER32(00000000,00007F03), ref: 006432C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconLoad
                                        • String ID: blank$info$question$stop$warning
                                        • API String ID: 2457776203-404129466
                                        • Opcode ID: b81995f0b2d779914770326bfe3d97770b724e020e639dc2657c1b7b6abb8232
                                        • Instruction ID: 77f2827c37175751caf55f5931eff1d7acd77123c78aac0bcf36a1afb0fbc6d4
                                        • Opcode Fuzzy Hash: b81995f0b2d779914770326bfe3d97770b724e020e639dc2657c1b7b6abb8232
                                        • Instruction Fuzzy Hash: CC11E731248366BAEB055B54EC43CABB7DEDF19370F20006AF900A63C1E7E69B4145E5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0064454E
                                        • LoadStringW.USER32(00000000), ref: 00644555
                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0064456B
                                        • LoadStringW.USER32(00000000), ref: 00644572
                                        • _wprintf.LIBCMT ref: 00644598
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006445B6
                                        Strings
                                        • %s (%d) : ==> %s: %s %s, xrefs: 00644593
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString$Message_wprintf
                                        • String ID: %s (%d) : ==> %s: %s %s
                                        • API String ID: 3648134473-3128320259
                                        • Opcode ID: be0968ef5c629a59371ab808c5cd13a9b2e39e9d58c3627db52d076529d63c7d
                                        • Instruction ID: fe797f5ef0d66730ca7d80708dd6617823df78d9e92b796991527bb3848ae9d6
                                        • Opcode Fuzzy Hash: be0968ef5c629a59371ab808c5cd13a9b2e39e9d58c3627db52d076529d63c7d
                                        • Instruction Fuzzy Hash: 6B0162F2904208BFE750EBA4ED89EF7776DEB08301F0005A5FB45E2151EAB49E858B74
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • GetSystemMetrics.USER32(0000000F), ref: 0066D78A
                                        • GetSystemMetrics.USER32(0000000F), ref: 0066D7AA
                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0066D9E5
                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0066DA03
                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0066DA24
                                        • ShowWindow.USER32(00000003,00000000), ref: 0066DA43
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0066DA68
                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 0066DA8B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                        • String ID:
                                        • API String ID: 1211466189-0
                                        • Opcode ID: bf18c14707bcbd82ef2e5a4f0871ed78da665ffb9fe59ff80eb7144cf6ad157e
                                        • Instruction ID: f87638275d36113a0511db743f846478a986d019ebb3ed0b63a271a664067fb4
                                        • Opcode Fuzzy Hash: bf18c14707bcbd82ef2e5a4f0871ed78da665ffb9fe59ff80eb7144cf6ad157e
                                        • Instruction Fuzzy Hash: 95B17971A04225EBDF14CF69C9857FD7BB2FF44701F088169EC489B295DB34A950CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0061C417,00000004,00000000,00000000,00000000), ref: 005E2ACF
                                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0061C417,00000004,00000000,00000000,00000000,000000FF), ref: 005E2B17
                                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0061C417,00000004,00000000,00000000,00000000), ref: 0061C46A
                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0061C417,00000004,00000000,00000000,00000000), ref: 0061C4D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ShowWindow
                                        • String ID:
                                        • API String ID: 1268545403-0
                                        • Opcode ID: 8c5ff4871a9b7b6093f71a5d6d5cc2f3a0e58ff0942ced1a7363f381b686f05e
                                        • Instruction ID: 1ab58ef4b8d32af07dbea011e6ff24e63fb8d4ced5bff9e65232edd40fd7f2db
                                        • Opcode Fuzzy Hash: 8c5ff4871a9b7b6093f71a5d6d5cc2f3a0e58ff0942ced1a7363f381b686f05e
                                        • Instruction Fuzzy Hash: 1A41E9312086C09AC73D9B2ADC987BE7F9BBB85310F1C883DE0D786565C6B5A8C1D711
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0064737F
                                          • Part of subcall function 00600FF6: std::exception::exception.LIBCMT ref: 0060102C
                                          • Part of subcall function 00600FF6: __CxxThrowException@8.LIBCMT ref: 00601041
                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006473B6
                                        • EnterCriticalSection.KERNEL32(?), ref: 006473D2
                                        • _memmove.LIBCMT ref: 00647420
                                        • _memmove.LIBCMT ref: 0064743D
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0064744C
                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00647461
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00647480
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                        • String ID:
                                        • API String ID: 256516436-0
                                        • Opcode ID: 89b6806805e596c8e3a4f0b95c83fccac85c5791e16ac9e26fc7aa60b01ba1bc
                                        • Instruction ID: 6f5f54d317dd33c567b7d64083ee1ce3dbe8a5a501f91cf31f4717190e57790a
                                        • Opcode Fuzzy Hash: 89b6806805e596c8e3a4f0b95c83fccac85c5791e16ac9e26fc7aa60b01ba1bc
                                        • Instruction Fuzzy Hash: 5F31CF31904205EBDF10DFA4DC85AAFBBBAFF45310F1440A9F904EB286DB709A14CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 0066645A
                                        • GetDC.USER32(00000000), ref: 00666462
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0066646D
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00666479
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 006664B5
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006664C6
                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00669299,?,?,000000FF,00000000,?,000000FF,?), ref: 00666500
                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00666520
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                        • String ID:
                                        • API String ID: 3864802216-0
                                        • Opcode ID: 58404c33c1f4d7a662bb2f15b86a5887371ccb2ea9b545921a4535f9bb10d758
                                        • Instruction ID: 27ea2ba059a7b585ebee1137f8a733b8e6baf144fa75b642089aa899dc3aa0cd
                                        • Opcode Fuzzy Hash: 58404c33c1f4d7a662bb2f15b86a5887371ccb2ea9b545921a4535f9bb10d758
                                        • Instruction Fuzzy Hash: AF316F72101214BFEB118F50EC4AFEA3FAAEF09765F045065FE09DA2A1D6B59841CBB4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID:
                                        • API String ID: 2931989736-0
                                        • Opcode ID: f7c46e0f1a2e1a312ac932c1badd6eb018476282c322eb99eb1b9b9aa728f209
                                        • Instruction ID: 9f9258d27b1caf012181f01a27e8eff2ffa9e5e00eaa26212450f730b33030c7
                                        • Opcode Fuzzy Hash: f7c46e0f1a2e1a312ac932c1badd6eb018476282c322eb99eb1b9b9aa728f209
                                        • Instruction Fuzzy Hash: 28219561640206B7D668A6218D62FBF239FAF213B4F044024FD09AA392EB53DD1193E9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                          • Part of subcall function 005FFEC6: _wcscpy.LIBCMT ref: 005FFEE9
                                        • _wcstok.LIBCMT ref: 0064EEFF
                                        • _wcscpy.LIBCMT ref: 0064EF8E
                                        • _memset.LIBCMT ref: 0064EFC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                        • String ID: X
                                        • API String ID: 774024439-3081909835
                                        • Opcode ID: 62edd7a10a32c8f6f82aabaf805fa9ea4d9698623081ed92835c8dd5e6c7992c
                                        • Instruction ID: 7809cfe4f829204e14c39811f9034d2a3be67933ac9bdbc5cba5392e2796ac57
                                        • Opcode Fuzzy Hash: 62edd7a10a32c8f6f82aabaf805fa9ea4d9698623081ed92835c8dd5e6c7992c
                                        • Instruction Fuzzy Hash: F6C171715083429FC768EF24C895A9ABBE5FF84310F10496DF8D9972A2DB70ED45CB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00656F14
                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00656F35
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656F48
                                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00656FFE
                                        • inet_ntoa.WSOCK32(?), ref: 00656FBB
                                          • Part of subcall function 0063AE14: _strlen.LIBCMT ref: 0063AE1E
                                          • Part of subcall function 0063AE14: _memmove.LIBCMT ref: 0063AE40
                                        • _strlen.LIBCMT ref: 00657058
                                        • _memmove.LIBCMT ref: 006570C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                        • String ID:
                                        • API String ID: 3619996494-0
                                        • Opcode ID: bd3c2f81463f408d28e68865b9087850069c424025e3753f63823d24f5d2934d
                                        • Instruction ID: 4da0ba1787f7e0543473168c9613de2c74fd0236c6d23b26c46bfde635698731
                                        • Opcode Fuzzy Hash: bd3c2f81463f408d28e68865b9087850069c424025e3753f63823d24f5d2934d
                                        • Instruction Fuzzy Hash: 74810171508301ABC714EF24DC86E6FBBEAAFC4714F10491CF9999B2D2DA70AD09C792
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72ceabd72ceea735b177bb1f7aaee80e5873ef0dc965e3bb00164bcfd4da3d6e
                                        • Instruction ID: acb29118509620e0418b7ed8c769c5e32b15fd9f95465dcf96ab6f7a25f119ed
                                        • Opcode Fuzzy Hash: 72ceabd72ceea735b177bb1f7aaee80e5873ef0dc965e3bb00164bcfd4da3d6e
                                        • Instruction Fuzzy Hash: C9717A30900549EFCF188F99CC48EAEBF79FF8A310F148549F955AA291D730AA51CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsWindow.USER32(013B6BE0), ref: 0066B6A5
                                        • IsWindowEnabled.USER32(013B6BE0), ref: 0066B6B1
                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0066B795
                                        • SendMessageW.USER32(013B6BE0,000000B0,?,?), ref: 0066B7CC
                                        • IsDlgButtonChecked.USER32(?,?), ref: 0066B809
                                        • GetWindowLongW.USER32(013B6BE0,000000EC), ref: 0066B82B
                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0066B843
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                        • String ID:
                                        • API String ID: 4072528602-0
                                        • Opcode ID: b3fb54e9e2a193c6a0bc26d3f717f2a5b1b481184e0bd06636693f9d11a792f8
                                        • Instruction ID: 21a463eb07e8f7d0c9b802ad9e2d8c8cc965d81ad0e4129446cfc681bdfaa509
                                        • Opcode Fuzzy Hash: b3fb54e9e2a193c6a0bc26d3f717f2a5b1b481184e0bd06636693f9d11a792f8
                                        • Instruction Fuzzy Hash: 93717D34604204EFDB249F64C894FEA7BABEB4A300F146069F956D73A1C771AD81CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0065F75C
                                        • _memset.LIBCMT ref: 0065F825
                                        • ShellExecuteExW.SHELL32(?), ref: 0065F86A
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                          • Part of subcall function 005FFEC6: _wcscpy.LIBCMT ref: 005FFEE9
                                        • GetProcessId.KERNEL32(00000000), ref: 0065F8E1
                                        • CloseHandle.KERNEL32(00000000), ref: 0065F910
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                        • String ID: @
                                        • API String ID: 3522835683-2766056989
                                        • Opcode ID: 86d732defd4a014991934d4f93dc80ee9987301d73159dd42ceba45ce1ef3f54
                                        • Instruction ID: d5863ee6c0d10ee02e286f63291e4ca153ce6d0fb99500a38c0e2e39d3868ce8
                                        • Opcode Fuzzy Hash: 86d732defd4a014991934d4f93dc80ee9987301d73159dd42ceba45ce1ef3f54
                                        • Instruction Fuzzy Hash: D5619F75A0065ADFCF18EF55C5849AEBBF6FF88310F148469E886AB351CB30AD45CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetParent.USER32(?), ref: 0064149C
                                        • GetKeyboardState.USER32(?), ref: 006414B1
                                        • SetKeyboardState.USER32(?), ref: 00641512
                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00641540
                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0064155F
                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 006415A5
                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006415C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: a53eb3582151f289331839a772b0854842d8aaf00fa0a90819a0cd6ec69f59b8
                                        • Instruction ID: a8515698ebf8d654b6951dac60c5bad135ccd47b70466027407ba2945ba77cf2
                                        • Opcode Fuzzy Hash: a53eb3582151f289331839a772b0854842d8aaf00fa0a90819a0cd6ec69f59b8
                                        • Instruction Fuzzy Hash: 3551C0A0A047D53EFB3647248C45BFA7FAB6B47304F088489E1D64A9C2D2D4EDD4D760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetParent.USER32(00000000), ref: 006412B5
                                        • GetKeyboardState.USER32(?), ref: 006412CA
                                        • SetKeyboardState.USER32(?), ref: 0064132B
                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00641357
                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00641374
                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006413B8
                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006413D9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: 6c8c131458f40f1ad0e55d6e89918fad8a45aa3e1c6f8210c8ef58b9094d4f2a
                                        • Instruction ID: 8c2b87ab6898c25ce29cf46d0d665d7ee7a9cd24aa6eaedecb3a0a2da5da009c
                                        • Opcode Fuzzy Hash: 6c8c131458f40f1ad0e55d6e89918fad8a45aa3e1c6f8210c8ef58b9094d4f2a
                                        • Instruction Fuzzy Hash: 1751D1A05046D57DFB338B248C55BBABFAB6B07300F088589E1D88E9C2D795ACD4D761
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcsncpy$LocalTime
                                        • String ID:
                                        • API String ID: 2945705084-0
                                        • Opcode ID: a374d038cb7d45d9c9b2b4e0db68a050f16779b897edd35a6a919ed487cf4997
                                        • Instruction ID: 8e474b69b003564db5323ce3ba41241f1a4d310be038a5554bb74c877797c210
                                        • Opcode Fuzzy Hash: a374d038cb7d45d9c9b2b4e0db68a050f16779b897edd35a6a919ed487cf4997
                                        • Instruction Fuzzy Hash: 1041B4A5C6012876CB54FBB4C88A9CF77AEAF04310F50885AF519E3262FA34D754C7AD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0063DAC5
                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0063DAFB
                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0063DB0C
                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0063DB8E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                        • String ID: ,,g$DllGetClassObject
                                        • API String ID: 753597075-3601260016
                                        • Opcode ID: 44bec7095bbd6f8d390735e909fbb62c1faf6a913b35ecd09c1babac861e6af0
                                        • Instruction ID: 0ec894414aa8f8a97f2a9cea73200ffe0c6ebafb6a453c2b925afe49020ba138
                                        • Opcode Fuzzy Hash: 44bec7095bbd6f8d390735e909fbb62c1faf6a913b35ecd09c1babac861e6af0
                                        • Instruction Fuzzy Hash: 4F4160B1600209EFDB15CF55D884A9ABBBAEF48350F1580ADED069F205D7B1DE44CBE0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006438D3,?), ref: 006448C7
                                          • Part of subcall function 006448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006438D3,?), ref: 006448E0
                                        • lstrcmpiW.KERNEL32(?,?), ref: 006438F3
                                        • _wcscmp.LIBCMT ref: 0064390F
                                        • MoveFileW.KERNEL32(?,?), ref: 00643927
                                        • _wcscat.LIBCMT ref: 0064396F
                                        • SHFileOperationW.SHELL32(?), ref: 006439DB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                        • String ID: \*.*
                                        • API String ID: 1377345388-1173974218
                                        • Opcode ID: 682fcbe1b100710ac8a3f6139da236b9d1eb028e6ad54ea0b2211e6cf38877df
                                        • Instruction ID: 91868a8c9aa1a3dcd509576c4b17c6a8fd017c5d4a63f04380ca393b8cd72443
                                        • Opcode Fuzzy Hash: 682fcbe1b100710ac8a3f6139da236b9d1eb028e6ad54ea0b2211e6cf38877df
                                        • Instruction Fuzzy Hash: 204191B240C3859EC755EF64C486AEFB7EDAF88340F14192EF489C3291EA74D688C756
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00667519
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006675C0
                                        • IsMenu.USER32(?), ref: 006675D8
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00667620
                                        • DrawMenuBar.USER32 ref: 00667633
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                        • String ID: 0
                                        • API String ID: 3866635326-4108050209
                                        • Opcode ID: 5a73b4bf7922f03ecaa58a5d4d598625a94671d4c2dcd1904c6e095be9e51cce
                                        • Instruction ID: d055b2f5c22d44dc920aaed0a159d4a9a4be89c6c29041e795cef065c65ae124
                                        • Opcode Fuzzy Hash: 5a73b4bf7922f03ecaa58a5d4d598625a94671d4c2dcd1904c6e095be9e51cce
                                        • Instruction Fuzzy Hash: E8413875A04609AFDB10DF54D884EDABBFAFB05328F149069F91697390D730AD50CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0066125C
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00661286
                                        • FreeLibrary.KERNEL32(00000000), ref: 0066133D
                                          • Part of subcall function 0066122D: RegCloseKey.ADVAPI32(?), ref: 006612A3
                                          • Part of subcall function 0066122D: FreeLibrary.KERNEL32(?), ref: 006612F5
                                          • Part of subcall function 0066122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00661318
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 006612E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                        • String ID:
                                        • API String ID: 395352322-0
                                        • Opcode ID: cd84d39bee910fa33cca285a19f2615d0ed93b9644f847936f5b379660b53779
                                        • Instruction ID: 67132beb997b93aa73904bad68b4fc396f1d8e4ef04658e0e6a4eed6c4ccc29d
                                        • Opcode Fuzzy Hash: cd84d39bee910fa33cca285a19f2615d0ed93b9644f847936f5b379660b53779
                                        • Instruction Fuzzy Hash: 8D312D71901109BFDB14DBA0EC99AFEB7BDEF09340F04016AE502E6251DA749F859AA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0066655B
                                        • GetWindowLongW.USER32(013B6BE0,000000F0), ref: 0066658E
                                        • GetWindowLongW.USER32(013B6BE0,000000F0), ref: 006665C3
                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 006665F5
                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0066661F
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00666630
                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0066664A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LongWindow$MessageSend
                                        • String ID:
                                        • API String ID: 2178440468-0
                                        • Opcode ID: f19dc5df8489bfd64857cfd2a767b33ab73cc21ee1a3b0022b69536c76b68f44
                                        • Instruction ID: dea710bace3ee03df1b4e3800b80392fcfb272e525555430b5adedff83b9c130
                                        • Opcode Fuzzy Hash: f19dc5df8489bfd64857cfd2a767b33ab73cc21ee1a3b0022b69536c76b68f44
                                        • Instruction Fuzzy Hash: 2731E630604150AFDB21DF28EC86F953BE6FB4A714F1911A8F512CB2B6CB71AC40DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006580A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006580CB
                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006564D9
                                        • WSAGetLastError.WSOCK32(00000000), ref: 006564E8
                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00656521
                                        • connect.WSOCK32(00000000,?,00000010), ref: 0065652A
                                        • WSAGetLastError.WSOCK32 ref: 00656534
                                        • closesocket.WSOCK32(00000000), ref: 0065655D
                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00656576
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                        • String ID:
                                        • API String ID: 910771015-0
                                        • Opcode ID: 1f2bcbdb98ca091dec20e396873b3a54c8cc61d163950ba87aa95bd65dc89d5f
                                        • Instruction ID: 0beed4ba4ef5da887da61d24622e1c361f1f097b91b4510e12d1f345b5345ab8
                                        • Opcode Fuzzy Hash: 1f2bcbdb98ca091dec20e396873b3a54c8cc61d163950ba87aa95bd65dc89d5f
                                        • Instruction Fuzzy Hash: 1131B371600118AFDB10AF24DC85BBE7BBAEF44711F408069FD45A7291DBB0AD48CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0063E0FA
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0063E120
                                        • SysAllocString.OLEAUT32(00000000), ref: 0063E123
                                        • SysAllocString.OLEAUT32 ref: 0063E144
                                        • SysFreeString.OLEAUT32 ref: 0063E14D
                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 0063E167
                                        • SysAllocString.OLEAUT32(?), ref: 0063E175
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                        • String ID:
                                        • API String ID: 3761583154-0
                                        • Opcode ID: 10ccf53ea746b52dd1703889b83ccbb4ac27a225833385cca7a33f0dbf541e1d
                                        • Instruction ID: 37ac75c3c4be5771b129d489be6a61f4af40eac8b3b9c511803b3a1bf4e9cc74
                                        • Opcode Fuzzy Hash: 10ccf53ea746b52dd1703889b83ccbb4ac27a225833385cca7a33f0dbf541e1d
                                        • Instruction Fuzzy Hash: F1214135604108AFDB109FA8DC88DAB77EEEB09760F108125F955CB2A5DA71EC418BB4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                        • API String ID: 1038674560-2734436370
                                        • Opcode ID: acff837bc7f4cf5393b975f92de99fa4d10c4cbcdb3e41bd5bc852595af7ca4b
                                        • Instruction ID: 6216750d62e9471a743d3df7584ef520c69cbbadf74dd7c21ef110d0a755f821
                                        • Opcode Fuzzy Hash: acff837bc7f4cf5393b975f92de99fa4d10c4cbcdb3e41bd5bc852595af7ca4b
                                        • Instruction Fuzzy Hash: 2D217C72A80155A6D334E730DC12EE7B39FEF65300F10803AF88687281EB519D82C2E5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                          • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                          • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 006678A1
                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 006678AE
                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 006678B9
                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 006678C8
                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 006678D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$CreateObjectStockWindow
                                        • String ID: Msctls_Progress32
                                        • API String ID: 1025951953-3636473452
                                        • Opcode ID: a8a997126565c06f2df6ac4d5bdd39d93c884ac6aee6347b0ee86f0f967b428b
                                        • Instruction ID: 156d3af078a4283273da9eb3742f2839a7d9e2aebecef631e1c34e5e699d0c19
                                        • Opcode Fuzzy Hash: a8a997126565c06f2df6ac4d5bdd39d93c884ac6aee6347b0ee86f0f967b428b
                                        • Instruction Fuzzy Hash: D51190B2110219BFEF159F60CC85EE77F6EEF08758F014129FA04A61A0C772AC21DBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00604292,?), ref: 006041E3
                                        • GetProcAddress.KERNEL32(00000000), ref: 006041EA
                                        • EncodePointer.KERNEL32(00000000), ref: 006041F6
                                        • DecodePointer.KERNEL32(00000001,00604292,?), ref: 00604213
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoInitialize$combase.dll
                                        • API String ID: 3489934621-340411864
                                        • Opcode ID: 249e1d890b85b6ede9fc3a1920597279a90234f5235eeb15cd97abeccc8e8e09
                                        • Instruction ID: 7c9c1c0897cc98195dd75b974972f7fc858c6682b78350dd32fa73d3123bb056
                                        • Opcode Fuzzy Hash: 249e1d890b85b6ede9fc3a1920597279a90234f5235eeb15cd97abeccc8e8e09
                                        • Instruction Fuzzy Hash: 4EE01AB0690301AFEB206BB1FC19B653AE7FBA2B02F10A424F511E51E0DFF568958F00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006041B8), ref: 006042B8
                                        • GetProcAddress.KERNEL32(00000000), ref: 006042BF
                                        • EncodePointer.KERNEL32(00000000), ref: 006042CA
                                        • DecodePointer.KERNEL32(006041B8), ref: 006042E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoUninitialize$combase.dll
                                        • API String ID: 3489934621-2819208100
                                        • Opcode ID: 02a34fd9aff3194e16986f7d4dc9cb04d8ddd3fcdf7870520e4d0d40ac602485
                                        • Instruction ID: 353dd40cbe4538b0181c01b2ba150f19ac9792166939e793454e1231ddacc084
                                        • Opcode Fuzzy Hash: 02a34fd9aff3194e16986f7d4dc9cb04d8ddd3fcdf7870520e4d0d40ac602485
                                        • Instruction Fuzzy Hash: AFE0BF786813019FDB20AB61FD5EB653AA7BB56742F106024F111E15A0CFF45944CE14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove$__itow__swprintf
                                        • String ID:
                                        • API String ID: 3253778849-0
                                        • Opcode ID: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                                        • Instruction ID: 69673135681687e102afb7fb29946796dfc5c78d3cc8043087bae20328791d85
                                        • Opcode Fuzzy Hash: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                                        • Instruction Fuzzy Hash: C161CE3050069B9BDF19EF21CC85EFE3BAABF46308F044519F89A5B292DB709C45CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 006610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00660038,?,?), ref: 006610BC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00660548
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00660588
                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 006605AB
                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006605D4
                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00660617
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00660624
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                        • String ID:
                                        • API String ID: 4046560759-0
                                        • Opcode ID: 5d9416eb135ce5c4ad0a7ab9dd489989b9222427a90ac497a254ac69f12b35f0
                                        • Instruction ID: 72b12441b566fd676d3038d69a0768243f840dc7d5f4dc8248d1f0c741a9e6c2
                                        • Opcode Fuzzy Hash: 5d9416eb135ce5c4ad0a7ab9dd489989b9222427a90ac497a254ac69f12b35f0
                                        • Instruction Fuzzy Hash: 25516A31108241AFDB14EF64D885E6FBBEAFF89314F04492DF586872A2DB71E905CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetMenu.USER32(?), ref: 00665A82
                                        • GetMenuItemCount.USER32(00000000), ref: 00665AB9
                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00665AE1
                                        • GetMenuItemID.USER32(?,?), ref: 00665B50
                                        • GetSubMenu.USER32(?,?), ref: 00665B5E
                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00665BAF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountMessagePostString
                                        • String ID:
                                        • API String ID: 650687236-0
                                        • Opcode ID: 3429b9e0365e063fa2c5847e2fe9a061b416b5a2bccdd8f336a501fc385d315b
                                        • Instruction ID: 99bd1b10b0ebbd3b6e2cb95173cd0bcca67408d59cb43b7d9bc52b99d1d1a6f5
                                        • Opcode Fuzzy Hash: 3429b9e0365e063fa2c5847e2fe9a061b416b5a2bccdd8f336a501fc385d315b
                                        • Instruction Fuzzy Hash: C6517235A00616AFDF15EFA4C856AAEBBB6FF48310F104469E842B7351CB70AE41CB94
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 0063F3F7
                                        • VariantClear.OLEAUT32(00000013), ref: 0063F469
                                        • VariantClear.OLEAUT32(00000000), ref: 0063F4C4
                                        • _memmove.LIBCMT ref: 0063F4EE
                                        • VariantClear.OLEAUT32(?), ref: 0063F53B
                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0063F569
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$Clear$ChangeInitType_memmove
                                        • String ID:
                                        • API String ID: 1101466143-0
                                        • Opcode ID: 23945c31431220182b2c61ad06f98b66942acdb2c1f6a8912da7417e42ff9b0e
                                        • Instruction ID: 45acc68b801dea1b8f150c55c5ac084912d749bcfa626134f951d9d1465b4621
                                        • Opcode Fuzzy Hash: 23945c31431220182b2c61ad06f98b66942acdb2c1f6a8912da7417e42ff9b0e
                                        • Instruction Fuzzy Hash: B25146B5A00209AFCB14CF58D884AAAB7F9FF4C354F15856AE959DB311D730E912CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00642747
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00642792
                                        • IsMenu.USER32(00000000), ref: 006427B2
                                        • CreatePopupMenu.USER32 ref: 006427E6
                                        • GetMenuItemCount.USER32(000000FF), ref: 00642844
                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00642875
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                        • String ID:
                                        • API String ID: 3311875123-0
                                        • Opcode ID: e36fdbdeb869d3032c7ad80825fcece2bc85643e26c9bc71ad82a90f36a92101
                                        • Instruction ID: 1a751547841086af3c81631ae2355c1367a4ca8bb1228702b06bcb10e11f6235
                                        • Opcode Fuzzy Hash: e36fdbdeb869d3032c7ad80825fcece2bc85643e26c9bc71ad82a90f36a92101
                                        • Instruction Fuzzy Hash: EC519070A00207DFDF24CF68D8A8AEEBBF6AF54314F604169F4119B291D7709949CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 005E179A
                                        • GetWindowRect.USER32(?,?), ref: 005E17FE
                                        • ScreenToClient.USER32(?,?), ref: 005E181B
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005E182C
                                        • EndPaint.USER32(?,?), ref: 005E1876
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                        • String ID:
                                        • API String ID: 1827037458-0
                                        • Opcode ID: 960cd4eae478e10ec5585ea96f438ae3cbcee2023d98bc0f323ad5ee70df5bd0
                                        • Instruction ID: e90fe46be4d5ae715f53cade4adee69cbf8674f3bd6b0efa689d0e3874a62adb
                                        • Opcode Fuzzy Hash: 960cd4eae478e10ec5585ea96f438ae3cbcee2023d98bc0f323ad5ee70df5bd0
                                        • Instruction Fuzzy Hash: 3941BE70104741AFC710EF26DC84FBA7FEAFB4A724F080629F9A5862A1C771AC45DB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ShowWindow.USER32(006A67B0,00000000,013B6BE0,?,?,006A67B0,?,0066B862,?,?), ref: 0066B9CC
                                        • EnableWindow.USER32(00000000,00000000), ref: 0066B9F0
                                        • ShowWindow.USER32(006A67B0,00000000,013B6BE0,?,?,006A67B0,?,0066B862,?,?), ref: 0066BA50
                                        • ShowWindow.USER32(00000000,00000004,?,0066B862,?,?), ref: 0066BA62
                                        • EnableWindow.USER32(00000000,00000001), ref: 0066BA86
                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0066BAA9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$Show$Enable$MessageSend
                                        • String ID:
                                        • API String ID: 642888154-0
                                        • Opcode ID: 5081583299fe0110790adc93beb2cf2614afee63952a4bdaac1fd4ad0eadb7c6
                                        • Instruction ID: c13b29802c5a2d5a85b6ff442827b15556530e5dd19ff986291801f83228d666
                                        • Opcode Fuzzy Hash: 5081583299fe0110790adc93beb2cf2614afee63952a4bdaac1fd4ad0eadb7c6
                                        • Instruction Fuzzy Hash: 6B415C30600241EFDB26CF68D499BD57BE2FB46314F1852B9FA48CF2A2C771A885CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00655134,?,?,00000000,00000001), ref: 006573BF
                                          • Part of subcall function 00653C94: GetWindowRect.USER32(?,?), ref: 00653CA7
                                        • GetDesktopWindow.USER32 ref: 006573E9
                                        • GetWindowRect.USER32(00000000), ref: 006573F0
                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00657422
                                          • Part of subcall function 006454E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0064555E
                                        • GetCursorPos.USER32(?), ref: 0065744E
                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006574AC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                        • String ID:
                                        • API String ID: 4137160315-0
                                        • Opcode ID: bdd7f62ac257749a96ff16866ea05b257907b652bc9f8d8ff77bb230ca89d160
                                        • Instruction ID: d6fa975189c66d74bfde64a1f1b3f3452056fa2b8f213e2f98c0d589c2c21286
                                        • Opcode Fuzzy Hash: bdd7f62ac257749a96ff16866ea05b257907b652bc9f8d8ff77bb230ca89d160
                                        • Instruction Fuzzy Hash: 5131E472508306ABD720DF14E849F9BBBEAFF88314F000919F98997191CB70ED49CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 006385F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00638608
                                          • Part of subcall function 006385F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00638612
                                          • Part of subcall function 006385F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00638621
                                          • Part of subcall function 006385F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00638628
                                          • Part of subcall function 006385F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0063863E
                                        • GetLengthSid.ADVAPI32(?,00000000,00638977), ref: 00638DAC
                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00638DB8
                                        • HeapAlloc.KERNEL32(00000000), ref: 00638DBF
                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00638DD8
                                        • GetProcessHeap.KERNEL32(00000000,00000000,00638977), ref: 00638DEC
                                        • HeapFree.KERNEL32(00000000), ref: 00638DF3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                        • String ID:
                                        • API String ID: 3008561057-0
                                        • Opcode ID: d09e4553e137a46b931bf0e4c91a9805e67ee8905a585e077990caf9f980a97f
                                        • Instruction ID: a93103a58428f4184d0f426c9a8a7577c092dfa5168ef2e71575f61d0a548cbc
                                        • Opcode Fuzzy Hash: d09e4553e137a46b931bf0e4c91a9805e67ee8905a585e077990caf9f980a97f
                                        • Instruction Fuzzy Hash: E711A932600605FFDB109FA4EC09BEEBBAAFF55355F105029F84597250CB72AA04CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00638B2A
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00638B31
                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00638B40
                                        • CloseHandle.KERNEL32(00000004), ref: 00638B4B
                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00638B7A
                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00638B8E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                        • String ID:
                                        • API String ID: 1413079979-0
                                        • Opcode ID: e65c6e74b9259394d59f1f3134cf98921af6df92ecde11d5391f66eebdaed7dd
                                        • Instruction ID: e873851a4bf964b44881956833d94a67fa700ebcb69f8e535bb4a9550e329098
                                        • Opcode Fuzzy Hash: e65c6e74b9259394d59f1f3134cf98921af6df92ecde11d5391f66eebdaed7dd
                                        • Instruction Fuzzy Hash: 67112CB250124AEFDF018FA4ED49FDABBAAEF08304F145065FE05A2160C7759D619BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E134D
                                          • Part of subcall function 005E12F3: SelectObject.GDI32(?,00000000), ref: 005E135C
                                          • Part of subcall function 005E12F3: BeginPath.GDI32(?), ref: 005E1373
                                          • Part of subcall function 005E12F3: SelectObject.GDI32(?,00000000), ref: 005E139C
                                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0066C1C4
                                        • LineTo.GDI32(00000000,00000003,?), ref: 0066C1D8
                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0066C1E6
                                        • LineTo.GDI32(00000000,00000000,?), ref: 0066C1F6
                                        • EndPath.GDI32(00000000), ref: 0066C206
                                        • StrokePath.GDI32(00000000), ref: 0066C216
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                        • String ID:
                                        • API String ID: 43455801-0
                                        • Opcode ID: 8a202add66c32b5fe272c563ebe4399a3919dcf704710555c5b61ed4961bd45d
                                        • Instruction ID: 93b6fd104b1c4799aec52473eb98cdbbb4ba87c0a48730379eab883f71730987
                                        • Opcode Fuzzy Hash: 8a202add66c32b5fe272c563ebe4399a3919dcf704710555c5b61ed4961bd45d
                                        • Instruction Fuzzy Hash: A0113C7600010CBFDB019F95EC48EEA7FAEFB08390F048021FA0846161C7B19E54DBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006003D3
                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 006003DB
                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006003E6
                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006003F1
                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 006003F9
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00600401
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Virtual
                                        • String ID:
                                        • API String ID: 4278518827-0
                                        • Opcode ID: 0b0d99490c7ce82c2e514eb6db2fc30c38e66f73171b9ab06e8ef5dcbc5d4417
                                        • Instruction ID: ab469080b3293e9461cd8d5df578e56dc5db26a65a8109de4672565b06bb25d0
                                        • Opcode Fuzzy Hash: 0b0d99490c7ce82c2e514eb6db2fc30c38e66f73171b9ab06e8ef5dcbc5d4417
                                        • Instruction Fuzzy Hash: 3D016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BE15C87941C7F5A864CBE5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0064569B
                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006456B1
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 006456C0
                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006456CF
                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006456D9
                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006456E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                        • String ID:
                                        • API String ID: 839392675-0
                                        • Opcode ID: b29690a017e44ac83fde016bd394babb8550273d09ab153fff785db6212c5ef4
                                        • Instruction ID: 91c113dd9a2d56d655f82e862837c6f1527e25d4a68324fb59fd16dbe8ccc98b
                                        • Opcode Fuzzy Hash: b29690a017e44ac83fde016bd394babb8550273d09ab153fff785db6212c5ef4
                                        • Instruction Fuzzy Hash: B0F06732241158BBE3205BA2EC0EEEB7A7DEBCAB11F001169FA00D10A09AE01A0186B5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InterlockedExchange.KERNEL32(?,?), ref: 006474E5
                                        • EnterCriticalSection.KERNEL32(?,?,005F1044,?,?), ref: 006474F6
                                        • TerminateThread.KERNEL32(00000000,000001F6,?,005F1044,?,?), ref: 00647503
                                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,005F1044,?,?), ref: 00647510
                                          • Part of subcall function 00646ED7: CloseHandle.KERNEL32(00000000,?,0064751D,?,005F1044,?,?), ref: 00646EE1
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00647523
                                        • LeaveCriticalSection.KERNEL32(?,?,005F1044,?,?), ref: 0064752A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                        • String ID:
                                        • API String ID: 3495660284-0
                                        • Opcode ID: f3fd1b8f7a90ce91eed5de94e5599832f149090cd0828d6693fe56d4e758f5f7
                                        • Instruction ID: 8c06b13d5c11d65fbea96e0780effe140a8ac54773d59b4e351a3dc9598c0d1c
                                        • Opcode Fuzzy Hash: f3fd1b8f7a90ce91eed5de94e5599832f149090cd0828d6693fe56d4e758f5f7
                                        • Instruction Fuzzy Hash: 8AF05E3A144612EBDB112BA4FC9C9EB772FFF45302B001531F202954B0CBB56A01CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00638E7F
                                        • UnloadUserProfile.USERENV(?,?), ref: 00638E8B
                                        • CloseHandle.KERNEL32(?), ref: 00638E94
                                        • CloseHandle.KERNEL32(?), ref: 00638E9C
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00638EA5
                                        • HeapFree.KERNEL32(00000000), ref: 00638EAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                        • String ID:
                                        • API String ID: 146765662-0
                                        • Opcode ID: 73c1a5371a6d288cd984929919681fd3b776469ef1b4f05bb3bae1c5b447dad3
                                        • Instruction ID: 662daae840f83f0ce40ca7614098ba1a08c7784e034b28c49252e3e1a747238c
                                        • Opcode Fuzzy Hash: 73c1a5371a6d288cd984929919681fd3b776469ef1b4f05bb3bae1c5b447dad3
                                        • Instruction Fuzzy Hash: 84E0C236004001FBDB011FE2FC0C90AFF6AFB8A362B109230F21981170CBB2A420DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00672C7C,?), ref: 00637C32
                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00672C7C,?), ref: 00637C4A
                                        • CLSIDFromProgID.OLE32(?,?,00000000,0066FB80,000000FF,?,00000000,00000800,00000000,?,00672C7C,?), ref: 00637C6F
                                        • _memcmp.LIBCMT ref: 00637C90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FromProg$FreeTask_memcmp
                                        • String ID: ,,g
                                        • API String ID: 314563124-619837891
                                        • Opcode ID: 4b3d9d5ff7793b802038627598ad082d1a7106558c5837a8f535df401d28cfa1
                                        • Instruction ID: 3bb5479573c7a0ac569edc423c36b561371b1f6019ddad7ee1de841e1312dfdd
                                        • Opcode Fuzzy Hash: 4b3d9d5ff7793b802038627598ad082d1a7106558c5837a8f535df401d28cfa1
                                        • Instruction Fuzzy Hash: 7B811D75A00109EFCB14DF94C984DEEB7BAFF89315F204198F516AB250DB71AE05CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 00658928
                                        • CharUpperBuffW.USER32(?,?), ref: 00658A37
                                        • VariantClear.OLEAUT32(?), ref: 00658BAF
                                          • Part of subcall function 00647804: VariantInit.OLEAUT32(00000000), ref: 00647844
                                          • Part of subcall function 00647804: VariantCopy.OLEAUT32(00000000,?), ref: 0064784D
                                          • Part of subcall function 00647804: VariantClear.OLEAUT32(00000000), ref: 00647859
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                        • API String ID: 4237274167-1221869570
                                        • Opcode ID: 349a002f4e80e3966bbbe856588e58c7b9d870446f409870830aa580ce078519
                                        • Instruction ID: 74147e603788f0513a218eb9d195a5f9cabd911af3db7fe97673438b25b9b19e
                                        • Opcode Fuzzy Hash: 349a002f4e80e3966bbbe856588e58c7b9d870446f409870830aa580ce078519
                                        • Instruction Fuzzy Hash: D69180706043429FC704DF29C48496ABBE9FFC8315F04496EF8969B361DB30E909CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005FFEC6: _wcscpy.LIBCMT ref: 005FFEE9
                                        • _memset.LIBCMT ref: 00643077
                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006430A6
                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00643159
                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00643187
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                        • String ID: 0
                                        • API String ID: 4152858687-4108050209
                                        • Opcode ID: 83f49fda7950f26ef34bdadceeb17f0e848d47ce11869d1671d9bdb449c6199b
                                        • Instruction ID: 27d102d255811645ad37bc2d84d9d32b79bc1f6b052234d1b76d4c5dc9d9d3ee
                                        • Opcode Fuzzy Hash: 83f49fda7950f26ef34bdadceeb17f0e848d47ce11869d1671d9bdb449c6199b
                                        • Instruction Fuzzy Hash: 3351F5316083219BD715AF28D845AABBBEAEF95720F040A2DF895D73D1DB70CE44CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00642CAF
                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00642CCB
                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00642D11
                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006A6890,00000000), ref: 00642D5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$InfoItem_memset
                                        • String ID: 0
                                        • API String ID: 1173514356-4108050209
                                        • Opcode ID: 2e21d18d1d5a96a4c1d8137c008c3961451dece79e0221dc3a88de7ecd07cbd5
                                        • Instruction ID: 83f14c84ba89f100289f75deb6efdfa783a63a0176b91fb6d814a59069b55932
                                        • Opcode Fuzzy Hash: 2e21d18d1d5a96a4c1d8137c008c3961451dece79e0221dc3a88de7ecd07cbd5
                                        • Instruction Fuzzy Hash: 5A41AE306043029FD724DF24C895B5ABBAAFF85320F644A6EF96697291D770E904CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0065DAD9
                                          • Part of subcall function 005E79AB: _memmove.LIBCMT ref: 005E79F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharLower_memmove
                                        • String ID: cdecl$none$stdcall$winapi
                                        • API String ID: 3425801089-567219261
                                        • Opcode ID: fa8c8713311c30db9ec2938f545ecd2fc6dd803d4bbecd116da716c7cabba98f
                                        • Instruction ID: 0e45916aff6dfea82012cbb4d5adc5ad8506c7c2e36cc120ce3b56cbaa38cd2b
                                        • Opcode Fuzzy Hash: fa8c8713311c30db9ec2938f545ecd2fc6dd803d4bbecd116da716c7cabba98f
                                        • Instruction Fuzzy Hash: 7731C1B090461AABCF14EF54CC819EEB7B6FF55310F008629E865977D1DB71A909CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006393F6
                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00639409
                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00639439
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$_memmove$ClassName
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 365058703-1403004172
                                        • Opcode ID: e1c0e7af47473e71c0bc662c7f57bd51dd989d67ddacb667f08f61ef8970c92c
                                        • Instruction ID: 81ef83c4a8de161beef2fcdac9ce3611147617817447149615305a8e77b55ec0
                                        • Opcode Fuzzy Hash: e1c0e7af47473e71c0bc662c7f57bd51dd989d67ddacb667f08f61ef8970c92c
                                        • Instruction Fuzzy Hash: 4F210471900108BADB18AB74DC898FFBBBEEF45350F104129F962972E1DB74090ADA70
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00651B40
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00651B66
                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00651B96
                                        • InternetCloseHandle.WININET(00000000), ref: 00651BDD
                                          • Part of subcall function 00652777: GetLastError.KERNEL32(?,?,00651B0B,00000000,00000000,00000001), ref: 0065278C
                                          • Part of subcall function 00652777: SetEvent.KERNEL32(?,?,00651B0B,00000000,00000000,00000001), ref: 006527A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                        • String ID:
                                        • API String ID: 3113390036-3916222277
                                        • Opcode ID: 1ce489861e3fb89d8642582c63e584c2c0d8d680701b22d0d5678c4e03f46dc6
                                        • Instruction ID: 06a2eed349f55848a1c4fc1fc8096dfd1f038f54e61d7258a242330ef1f090a1
                                        • Opcode Fuzzy Hash: 1ce489861e3fb89d8642582c63e584c2c0d8d680701b22d0d5678c4e03f46dc6
                                        • Instruction Fuzzy Hash: 732192B1500209BFEB119F60DC85FBF77EEEB4A74AF10412EF905AA240EB609D099765
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                          • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                          • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 006666D0
                                        • LoadLibraryW.KERNEL32(?), ref: 006666D7
                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 006666EC
                                        • DestroyWindow.USER32(?), ref: 006666F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                        • String ID: SysAnimate32
                                        • API String ID: 4146253029-1011021900
                                        • Opcode ID: 390eddc4324abb5ea33b0624e65b445b212cff8186c0d6ecd0900509c4213f52
                                        • Instruction ID: 53784ffb9d63746b140512e9336a6a1cdb20c28e81a03c1b0a31934bd3f77c72
                                        • Opcode Fuzzy Hash: 390eddc4324abb5ea33b0624e65b445b212cff8186c0d6ecd0900509c4213f52
                                        • Instruction Fuzzy Hash: 82215EB1100206BBEF104F64FC80EAB77AFEB59368F105629F951D22A0D7B2DC5197A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetStdHandle.KERNEL32(0000000C), ref: 0064705E
                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00647091
                                        • GetStdHandle.KERNEL32(0000000C), ref: 006470A3
                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006470DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateHandle$FilePipe
                                        • String ID: nul
                                        • API String ID: 4209266947-2873401336
                                        • Opcode ID: 2367ffadd96338fb6f369141fec33d975c86e567691f0ff7fca01f7de5a6bb33
                                        • Instruction ID: 80834d6d24be504c65ea58a837f2fbd5bb8409c037e0e176fdfa25173286f8d4
                                        • Opcode Fuzzy Hash: 2367ffadd96338fb6f369141fec33d975c86e567691f0ff7fca01f7de5a6bb33
                                        • Instruction Fuzzy Hash: 9F2190B4505209ABDF209F79DC05A9A77FABF45B20F204A19FCA0D73D0E7B09940CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 0064712B
                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0064715D
                                        • GetStdHandle.KERNEL32(000000F6), ref: 0064716E
                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006471A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateHandle$FilePipe
                                        • String ID: nul
                                        • API String ID: 4209266947-2873401336
                                        • Opcode ID: 4fbbf1cdf3611e5d7ca909bf27a09e293e13a5b29c880ecc3bc79eb354f7636e
                                        • Instruction ID: 5daf4159bed76f6e8333f4549f107ec1c9ca08c20edfef8aec2b1130b3f6b0ab
                                        • Opcode Fuzzy Hash: 4fbbf1cdf3611e5d7ca909bf27a09e293e13a5b29c880ecc3bc79eb354f7636e
                                        • Instruction Fuzzy Hash: 6621C5755043059BDF209F68DC04A9AB7EAAF55730F240A19FCB0D33D0D770A941CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0064AEBF
                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0064AF13
                                        • __swprintf.LIBCMT ref: 0064AF2C
                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,0066F910), ref: 0064AF6A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume__swprintf
                                        • String ID: %lu
                                        • API String ID: 3164766367-685833217
                                        • Opcode ID: 4a060de99205bcc37ab850fc0b03e9675739c066ec87056fa571fc48ade851d3
                                        • Instruction ID: 3dab0f9530a2ff940d2b1056809b76625fe273b62cc96c4c50a4492cd903f0ea
                                        • Opcode Fuzzy Hash: 4a060de99205bcc37ab850fc0b03e9675739c066ec87056fa571fc48ade851d3
                                        • Instruction Fuzzy Hash: AB217130A00149AFCB10DFA5DD85DEEBBB9FF89704B0040A9F909EB251DB71EA45CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                          • Part of subcall function 0063A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0063A399
                                          • Part of subcall function 0063A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0063A3AC
                                          • Part of subcall function 0063A37C: GetCurrentThreadId.KERNEL32 ref: 0063A3B3
                                          • Part of subcall function 0063A37C: AttachThreadInput.USER32(00000000), ref: 0063A3BA
                                        • GetFocus.USER32 ref: 0063A554
                                          • Part of subcall function 0063A3C5: GetParent.USER32(?), ref: 0063A3D3
                                        • GetClassNameW.USER32(?,?,00000100), ref: 0063A59D
                                        • EnumChildWindows.USER32(?,0063A615), ref: 0063A5C5
                                        • __swprintf.LIBCMT ref: 0063A5DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                        • String ID: %s%d
                                        • API String ID: 1941087503-1110647743
                                        • Opcode ID: 5e602fa64ac9ffbe59d63e06a88d8908d54b90ce83b1cf0f6e9430b77a754d1f
                                        • Instruction ID: 0d2a7234199b9fff25c311241fec0ea3bafe24eb9c98d65c58b7111482c76df0
                                        • Opcode Fuzzy Hash: 5e602fa64ac9ffbe59d63e06a88d8908d54b90ce83b1cf0f6e9430b77a754d1f
                                        • Instruction Fuzzy Hash: 81110671204209BBDF10BFB0EC8AFEA377EAF89300F004079FD48AA152CA7159459BB5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 00642048
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharUpper
                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                        • API String ID: 3964851224-769500911
                                        • Opcode ID: 45d11958e15dced4f1b37dfda664b0f9796e40764745ea57a7cfd5ae3059da2c
                                        • Instruction ID: d07bb12af767dd0756a573955986ea3b69c30bb570fa47e38fa6d015d584d10c
                                        • Opcode Fuzzy Hash: 45d11958e15dced4f1b37dfda664b0f9796e40764745ea57a7cfd5ae3059da2c
                                        • Instruction Fuzzy Hash: 2111393094010ACFCF04EFA4D8515EEBBF6BF25304F608569E855A7392EB326D1ACB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0065EF1B
                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0065EF4B
                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0065F07E
                                        • CloseHandle.KERNEL32(?), ref: 0065F0FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                        • String ID:
                                        • API String ID: 2364364464-0
                                        • Opcode ID: a8ca0a5fc4381657f108b598c31462dab59018f21319067550c7b71012971c4a
                                        • Instruction ID: 67e0f863bcd506c1fda2048bd40249b265f2b47c49efc04aae201acd51b014ba
                                        • Opcode Fuzzy Hash: a8ca0a5fc4381657f108b598c31462dab59018f21319067550c7b71012971c4a
                                        • Instruction Fuzzy Hash: 5D8194B16003019FD724DF25C846F6ABBE6BF88710F14886DF999D7392DBB1AC448B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 006610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00660038,?,?), ref: 006610BC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00660388
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006603C7
                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0066040E
                                        • RegCloseKey.ADVAPI32(?,?), ref: 0066043A
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00660447
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                        • String ID:
                                        • API String ID: 3440857362-0
                                        • Opcode ID: 4fc4e29fe94f772eaf8424526ff4f2558713b9fb634d9903850d434d26dd0096
                                        • Instruction ID: 2059c93dd980a66eedd92595be848236aeba72e891b04a37bdbf91d7ab8100aa
                                        • Opcode Fuzzy Hash: 4fc4e29fe94f772eaf8424526ff4f2558713b9fb634d9903850d434d26dd0096
                                        • Instruction Fuzzy Hash: 3D517A31208245AFD704EF65D885EAFBBE9FF88304F04892DF595972A2DB31E905CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0064E88A
                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0064E8B3
                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0064E8F2
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0064E917
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0064E91F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                        • String ID:
                                        • API String ID: 1389676194-0
                                        • Opcode ID: 19224863c3a243680debbff2c0620b5ccaf2484f03fd04b15a84ecaf45ca889c
                                        • Instruction ID: fd3f55a4a07bfbbfe30730ce3dc52854141a18603192601ec32355266e4e9d81
                                        • Opcode Fuzzy Hash: 19224863c3a243680debbff2c0620b5ccaf2484f03fd04b15a84ecaf45ca889c
                                        • Instruction Fuzzy Hash: 05512B35A00206EFCF05EF65C9859AEBBF5FF48310B1480A9E849AB362CB31ED51DB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d9980f733770dc131eabac931e5049007133477c59012447c350e910fe6ece75
                                        • Instruction ID: ff1daefe3b45c7871bdd7c21aee3ffff552be9be3d6bfc23b90e4f985307e533
                                        • Opcode Fuzzy Hash: d9980f733770dc131eabac931e5049007133477c59012447c350e910fe6ece75
                                        • Instruction Fuzzy Hash: 8A41AF35900214ABD720DFA8DC48BE9BBAAEB09310F184165F866F73E1DB70AD519E61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCursorPos.USER32(?), ref: 005E2357
                                        • ScreenToClient.USER32(006A67B0,?), ref: 005E2374
                                        • GetAsyncKeyState.USER32(00000001), ref: 005E2399
                                        • GetAsyncKeyState.USER32(00000002), ref: 005E23A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AsyncState$ClientCursorScreen
                                        • String ID:
                                        • API String ID: 4210589936-0
                                        • Opcode ID: 0cba29e732c72be6c558315164ef3f5294783f216557c6ae8f578c1e63bf4fbb
                                        • Instruction ID: 6be88388ec74a9dbffb76ba2ea686e047da465d48532185cc6925a4ab623cb93
                                        • Opcode Fuzzy Hash: 0cba29e732c72be6c558315164ef3f5294783f216557c6ae8f578c1e63bf4fbb
                                        • Instruction Fuzzy Hash: 3C41C231504159FBCF198F69D844AEDBB7AFB09330F20431AF869A2294C7706E90DF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0063695D
                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 006369A9
                                        • TranslateMessage.USER32(?), ref: 006369D2
                                        • DispatchMessageW.USER32(?), ref: 006369DC
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006369EB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                                        • String ID:
                                        • API String ID: 2108273632-0
                                        • Opcode ID: fddc5f90c9c0246d4967462090ed396e5728039cab9b2109547273bf01fc20e8
                                        • Instruction ID: b96ecb4706a7b47311fb24b3ba7d5c9d9587c17a1c6c904788d77c49a4e436d9
                                        • Opcode Fuzzy Hash: fddc5f90c9c0246d4967462090ed396e5728039cab9b2109547273bf01fc20e8
                                        • Instruction Fuzzy Hash: D031BE31904247BADB21DF74DC44BF67BABAB12304F189169F422D72A1D674A886DBE0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00638F12
                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00638FBC
                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00638FC4
                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00638FD2
                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00638FDA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessagePostSleep$RectWindow
                                        • String ID:
                                        • API String ID: 3382505437-0
                                        • Opcode ID: 388d28b0b84ee7832d39370015dbc273e092af1356a4f6c1b8d31d9798db75c9
                                        • Instruction ID: c5dc5b2f1bfc2d1115b5d25b2781126f1c394a72e6a03a48a2ede7c7d34fd78f
                                        • Opcode Fuzzy Hash: 388d28b0b84ee7832d39370015dbc273e092af1356a4f6c1b8d31d9798db75c9
                                        • Instruction Fuzzy Hash: 8431BA71500219EFDB14CFA8E948AEE7BB7EB45365F104229F925EB2D0CBB09914DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 0063B6C7
                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0063B6E4
                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0063B71C
                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0063B742
                                        • _wcsstr.LIBCMT ref: 0063B74C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                        • String ID:
                                        • API String ID: 3902887630-0
                                        • Opcode ID: 303a8a3b16d4a63e2628f7b3ffdaefece8782632fb1c7b0186f34448d1cc67f3
                                        • Instruction ID: 63e6fc7018c6eb2cc02a41af2569b91af588939e3a25b11ab4154b9a8d7b8747
                                        • Opcode Fuzzy Hash: 303a8a3b16d4a63e2628f7b3ffdaefece8782632fb1c7b0186f34448d1cc67f3
                                        • Instruction Fuzzy Hash: 7F21D731644204BAEB255B39EC4AE7B7BAEDF86750F10502DFD05CA2A1EFA1DC4197A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0066B44C
                                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0066B471
                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0066B489
                                        • GetSystemMetrics.USER32(00000004), ref: 0066B4B2
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00651184,00000000), ref: 0066B4D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$Long$MetricsSystem
                                        • String ID:
                                        • API String ID: 2294984445-0
                                        • Opcode ID: bd51dd1c5b05337aa2eb2add10769411e1c2ca6e785d0f849e388f7334408e00
                                        • Instruction ID: ae330c5fa8d5e5ad3425d2bda7934aaecfe1db5d34627d1e848dfff696d1be1d
                                        • Opcode Fuzzy Hash: bd51dd1c5b05337aa2eb2add10769411e1c2ca6e785d0f849e388f7334408e00
                                        • Instruction Fuzzy Hash: 6D219131514255EFCB109F38DC04AAA3BE6FB05720F146738F926C22E6EB309C91DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00639802
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00639834
                                        • __itow.LIBCMT ref: 0063984C
                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00639874
                                        • __itow.LIBCMT ref: 00639885
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$__itow$_memmove
                                        • String ID:
                                        • API String ID: 2983881199-0
                                        • Opcode ID: baaf230e573d9561476333af1d8adbf65fd7dabc269f0e148689595159df9bc4
                                        • Instruction ID: ae8613929e885c47e20169065369113aa17fcd80333e53026b22a8e49ee23ad0
                                        • Opcode Fuzzy Hash: baaf230e573d9561476333af1d8adbf65fd7dabc269f0e148689595159df9bc4
                                        • Instruction Fuzzy Hash: B921B631600248BBDB149B659C8AEEE7BBEEF8A710F040029F904DB291D6B08D418BE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E134D
                                        • SelectObject.GDI32(?,00000000), ref: 005E135C
                                        • BeginPath.GDI32(?), ref: 005E1373
                                        • SelectObject.GDI32(?,00000000), ref: 005E139C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ObjectSelect$BeginCreatePath
                                        • String ID:
                                        • API String ID: 3225163088-0
                                        • Opcode ID: 5b62a3680c8a64886c3feb8f320fd090d074e1f8a14ff8d5b92b9c06116e09d1
                                        • Instruction ID: 2874ff56981e781934926e863706c4826dcaae93b599740b8c6cd93ecb84880c
                                        • Opcode Fuzzy Hash: 5b62a3680c8a64886c3feb8f320fd090d074e1f8a14ff8d5b92b9c06116e09d1
                                        • Instruction Fuzzy Hash: 7C21B070900748EFDB10AF26EC047A97FBEFB05721F189626F850961E0D7B5A891CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID:
                                        • API String ID: 2931989736-0
                                        • Opcode ID: c7ba9e06323a7a6aebb222ec66ef6c2af772cc9aec4cbc4e7ec9d889d974f947
                                        • Instruction ID: ccd7e9ab2a7e11e9610e78b35222d06871213fe65951d67e558e075847610237
                                        • Opcode Fuzzy Hash: c7ba9e06323a7a6aebb222ec66ef6c2af772cc9aec4cbc4e7ec9d889d974f947
                                        • Instruction Fuzzy Hash: B501DDB26442067BD614A5205C52FBB735F9F213B4F048015FD04B7383EB51DE11A3E4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00644D5C
                                        • __beginthreadex.LIBCMT ref: 00644D7A
                                        • MessageBoxW.USER32(?,?,?,?), ref: 00644D8F
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00644DA5
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00644DAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                        • String ID:
                                        • API String ID: 3824534824-0
                                        • Opcode ID: 69f91271a37fa07ecdafda19cf0ceabcdbe54a22bf3728e99ff4069fc92600fa
                                        • Instruction ID: 7f0405879d3efd3633b742dfe3a9ad135db080198732267480fd6f54778599b5
                                        • Opcode Fuzzy Hash: 69f91271a37fa07ecdafda19cf0ceabcdbe54a22bf3728e99ff4069fc92600fa
                                        • Instruction Fuzzy Hash: 4911C8B6D04244BBC7119FA8EC05BDB7FAEEB46320F144265F914D3351DAB59D448BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00638766
                                        • GetLastError.KERNEL32(?,0063822A,?,?,?), ref: 00638770
                                        • GetProcessHeap.KERNEL32(00000008,?,?,0063822A,?,?,?), ref: 0063877F
                                        • HeapAlloc.KERNEL32(00000000,?,0063822A,?,?,?), ref: 00638786
                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0063879D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 842720411-0
                                        • Opcode ID: ed090fbb520d5003d9e0bd8ed397ce9d876eb3393ec2b6225c0aab42728c14b4
                                        • Instruction ID: 740ae8a440cd975e1cce3364617eed880d53e3343cf518e9385ccf432d4912bb
                                        • Opcode Fuzzy Hash: ed090fbb520d5003d9e0bd8ed397ce9d876eb3393ec2b6225c0aab42728c14b4
                                        • Instruction Fuzzy Hash: CC01FF71601244EFDB104FA5EC48DAB7B7EFF86755B201569F849C3360DA71DD10CAA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00645502
                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00645510
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00645518
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00645522
                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0064555E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                        • String ID:
                                        • API String ID: 2833360925-0
                                        • Opcode ID: f5e0872521899d35ff9d68945e0dfc4002418c3a573994ebae95b8b186957f54
                                        • Instruction ID: 0225bcefa5a3befa6850adb18b24f1920c18ea54cd6d0091f45c2982c86ca8aa
                                        • Opcode Fuzzy Hash: f5e0872521899d35ff9d68945e0dfc4002418c3a573994ebae95b8b186957f54
                                        • Instruction Fuzzy Hash: 8F011B36D00A1DDBCF04DFE8E8885EDBB7ABB09711F041596E906B2241DB705A54C7A1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?,?,0063799D), ref: 0063766F
                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?), ref: 0063768A
                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?), ref: 00637698
                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?), ref: 006376A8
                                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0063758C,80070057,?,?), ref: 006376B4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                        • String ID:
                                        • API String ID: 3897988419-0
                                        • Opcode ID: 823dc02fb38cbfad0b07639c4f9bc44aa6a1cac70d0beb1a427d86983470b4dd
                                        • Instruction ID: 1fb079d8256798572dc1755c90222f09a2bd2b43b0b9cb7aa94997242e913b0d
                                        • Opcode Fuzzy Hash: 823dc02fb38cbfad0b07639c4f9bc44aa6a1cac70d0beb1a427d86983470b4dd
                                        • Instruction Fuzzy Hash: 1E01B1B2604604ABDB204F59EC05AAA7BFEEB45751F100068FD04D3211E771DE0087E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00638608
                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00638612
                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00638621
                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00638628
                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0063863E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 44706859-0
                                        • Opcode ID: 790fae2f946daf712fdd7cce1d41972a8f4bfd3c32289d273aea2077fe7c4489
                                        • Instruction ID: d0844fc377ed0a073a24fcd2013965d126690c2d55b1d6efac4fc59c883e8c70
                                        • Opcode Fuzzy Hash: 790fae2f946daf712fdd7cce1d41972a8f4bfd3c32289d273aea2077fe7c4489
                                        • Instruction Fuzzy Hash: E2F04F31201304AFEB100FA5EC9AEAB3BAEEF8B754F001429F945C7250CBA19C41DAA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00638669
                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00638673
                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00638682
                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00638689
                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0063869F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 44706859-0
                                        • Opcode ID: 43492354fc98dd7345eaf79d2098bbdf43c9f85e5f3f698831cfc528578f0255
                                        • Instruction ID: eae6178ab0d57f9db34853a67e272273f6c28f6ffadf81f66e8916aca5642fb9
                                        • Opcode Fuzzy Hash: 43492354fc98dd7345eaf79d2098bbdf43c9f85e5f3f698831cfc528578f0255
                                        • Instruction Fuzzy Hash: 20F04FB1200314AFEB111FA5EC89EA73BAEEF8A754F101025F945C7250CAA5D941DAA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetDlgItem.USER32(?,000003E9), ref: 0063C6BA
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 0063C6D1
                                        • MessageBeep.USER32(00000000), ref: 0063C6E9
                                        • KillTimer.USER32(?,0000040A), ref: 0063C705
                                        • EndDialog.USER32(?,00000001), ref: 0063C71F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                        • String ID:
                                        • API String ID: 3741023627-0
                                        • Opcode ID: 6256e717e0b63d6e7cd8861b045820ca709e1965a3d4cb9d49b656443c39f526
                                        • Instruction ID: 910c7003307a6fbca352bc25c3643d9e13bb0b5eb38e4c77b9a1ce04c08b44cf
                                        • Opcode Fuzzy Hash: 6256e717e0b63d6e7cd8861b045820ca709e1965a3d4cb9d49b656443c39f526
                                        • Instruction Fuzzy Hash: 5401A230400304ABEB20AB24ED4EF967BBAFF00745F001669F582F10E0DBE1A9548FD0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EndPath.GDI32(?), ref: 005E13BF
                                        • StrokeAndFillPath.GDI32(?,?,0061BAD8,00000000,?), ref: 005E13DB
                                        • SelectObject.GDI32(?,00000000), ref: 005E13EE
                                        • DeleteObject.GDI32 ref: 005E1401
                                        • StrokePath.GDI32(?), ref: 005E141C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                        • String ID:
                                        • API String ID: 2625713937-0
                                        • Opcode ID: ff79020cb9b2a78ec5f4e972f6e546c4b1a6325e645a5aa9eb3dfdfd630b0754
                                        • Instruction ID: 7e1d613fe9c27ad80a1995ec33f9cd6679bd235d3ec6e6115876fcb99aebeaf5
                                        • Opcode Fuzzy Hash: ff79020cb9b2a78ec5f4e972f6e546c4b1a6325e645a5aa9eb3dfdfd630b0754
                                        • Instruction Fuzzy Hash: A8F04934014748EBDB156F26EC0C7583FAABB02326F08E224F46A841F1C7799995DF34
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00600FF6: std::exception::exception.LIBCMT ref: 0060102C
                                          • Part of subcall function 00600FF6: __CxxThrowException@8.LIBCMT ref: 00601041
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 005E7BB1: _memmove.LIBCMT ref: 005E7C0B
                                        • __swprintf.LIBCMT ref: 005F302D
                                        Strings
                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 005F2EC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                        • API String ID: 1943609520-557222456
                                        • Opcode ID: fe6f75e6e3485155f2f3c110065aea08303d02f94d316956e57c6b628c62a461
                                        • Instruction ID: 64205206448252cb4ba665aed37cab4e26f6764d3352f8d851eb1103547ec41a
                                        • Opcode Fuzzy Hash: fe6f75e6e3485155f2f3c110065aea08303d02f94d316956e57c6b628c62a461
                                        • Instruction Fuzzy Hash: 5C91B0311086569FDB18EF24D989C7FBBA9FF85740F00491EF582972A1EE24EE44CB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OleSetContainedObject.OLE32(?,00000001), ref: 0063B981
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ContainedObject
                                        • String ID: AutoIt3GUI$Container$%g
                                        • API String ID: 3565006973-565656749
                                        • Opcode ID: 99399ed36de1a2cb1306080833fb90730ec3b354f84b91852a4d502e377f02ba
                                        • Instruction ID: 919f883ae2368e471282d048ebd12b2cafa4fcccdf8e2182eac4eddefdc92d94
                                        • Opcode Fuzzy Hash: 99399ed36de1a2cb1306080833fb90730ec3b354f84b91852a4d502e377f02ba
                                        • Instruction Fuzzy Hash: 0A913B706006019FDB64DF68C884B6ABBEAFF49710F14956DFA49CB791DB70E841CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __startOneArgErrorHandling.LIBCMT ref: 006052DD
                                          • Part of subcall function 00610340: __87except.LIBCMT ref: 0061037B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorHandling__87except__start
                                        • String ID: pow
                                        • API String ID: 2905807303-2276729525
                                        • Opcode ID: 1ec0970598be06515edbc6e8bf5f81b0f2f9cea384bddde111b56ac68d425de4
                                        • Instruction ID: fba1956c4651bdf2b6189fb07ef5545451449336e3a80131561dd76b826577de
                                        • Opcode Fuzzy Hash: 1ec0970598be06515edbc6e8bf5f81b0f2f9cea384bddde111b56ac68d425de4
                                        • Instruction Fuzzy Hash: 86513921A49602C6EF1DB724C9813EB2BD79F00750F284D59E09A863E5EFB48DD49E86
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #$+
                                        • API String ID: 0-2552117581
                                        • Opcode ID: 11e60077c1486993198dac0f43f2207933d88049a2648e45665dedcc7edf1a3c
                                        • Instruction ID: 51b6d0e3fe1b17be601856f887196560ceec31ff004b611f932d6b014bda8734
                                        • Opcode Fuzzy Hash: 11e60077c1486993198dac0f43f2207933d88049a2648e45665dedcc7edf1a3c
                                        • Instruction Fuzzy Hash: F65121755046469FDF1A9F28C8886FA7BAAFF59310F144055EC929B3E0D7309D42CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove$_free
                                        • String ID: Oa_
                                        • API String ID: 2620147621-62195052
                                        • Opcode ID: 3e6325fac4bd7c0163935e358aefc03340332acc2f7fae16026fa9d1ba591c21
                                        • Instruction ID: 79fb7900ce30b41bcb52f9231e4009f12d49c52f91b7d38822e000994da5ef32
                                        • Opcode Fuzzy Hash: 3e6325fac4bd7c0163935e358aefc03340332acc2f7fae16026fa9d1ba591c21
                                        • Instruction Fuzzy Hash: 08515AB16093469FEB24CF28C481B6BBBE5BF85310F04492DEA89C7351DB35E901CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memset$_memmove
                                        • String ID: ERCP
                                        • API String ID: 2532777613-1384759551
                                        • Opcode ID: fa917746c7d0bd384fe383afa2d0452659b967d83de74d89b60806158cfc373e
                                        • Instruction ID: b0fcdfaf4ec97c750b94287b0cf2d16b58e1ef7f2429dbbcacc449c14b1c1e9c
                                        • Opcode Fuzzy Hash: fa917746c7d0bd384fe383afa2d0452659b967d83de74d89b60806158cfc373e
                                        • Instruction Fuzzy Hash: 1E518E719003099BDB24DF65C8857AABFF9FF04714F20856EEA4ACB281E7759984CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 006676D0
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 006676E4
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00667708
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window
                                        • String ID: SysMonthCal32
                                        • API String ID: 2326795674-1439706946
                                        • Opcode ID: d954b371cd50fb1c9d9216c6c6d81a9b7e82b67d6442687b0b2d643b5f93545b
                                        • Instruction ID: 69824b3782aff703172736809201e1553eae0417b7defaba17158060135c9616
                                        • Opcode Fuzzy Hash: d954b371cd50fb1c9d9216c6c6d81a9b7e82b67d6442687b0b2d643b5f93545b
                                        • Instruction Fuzzy Hash: E221B232504219BBDF15CFA4DC46FEA3B7AFF48718F110214FE15AB1D1DAB1A8518BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00666FAA
                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00666FBA
                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00666FDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend$MoveWindow
                                        • String ID: Listbox
                                        • API String ID: 3315199576-2633736733
                                        • Opcode ID: 0d4696bac9f6ab19cfc056be6b910905eb347d361a82f11859d9123a4598a7ff
                                        • Instruction ID: e286b81f7e7126d53c866fba15fb33153769aafea19e8de4d48777d383a9d8a3
                                        • Opcode Fuzzy Hash: 0d4696bac9f6ab19cfc056be6b910905eb347d361a82f11859d9123a4598a7ff
                                        • Instruction Fuzzy Hash: 5E21A432610118BFDF118F54EC85FEB3BABEF89754F018124F9159B290C6B1AC51CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 006679E1
                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 006679F6
                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00667A03
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: msctls_trackbar32
                                        • API String ID: 3850602802-1010561917
                                        • Opcode ID: 8f8c7d745303bf1da4853720cc48e3f1dde340ffa53721aa091ebec21a4d412b
                                        • Instruction ID: 8bada7ddd665d6eaa7a808b8217ddc6ffedeeb3e2104cc8dfdb1c0d63bc9005b
                                        • Opcode Fuzzy Hash: 8f8c7d745303bf1da4853720cc48e3f1dde340ffa53721aa091ebec21a4d412b
                                        • Instruction Fuzzy Hash: 2911E772244208BBDF149F70CC05FEB37AAEF89768F110619F641A6191D271D851CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4C2E), ref: 005E4CA3
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005E4CB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                        • API String ID: 2574300362-192647395
                                        • Opcode ID: 469b8bb417d89a05643369045cd8d466d8f6d63db02e260aafe07ee2ac19037a
                                        • Instruction ID: 3311e4055f25f925a1405abd212832019da0d65ea865c4e9c6421d2dbd874f0d
                                        • Opcode Fuzzy Hash: 469b8bb417d89a05643369045cd8d466d8f6d63db02e260aafe07ee2ac19037a
                                        • Instruction Fuzzy Hash: 06D01730510723CFD7209F32EA18606BAE7BF06791B229C3AD8CAD6150EAB0D880CA50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4D2E,?,005E4F4F,?,006A62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 005E4D6F
                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E4D81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-3689287502
                                        • Opcode ID: 429b15e1f1676afc80a9dfc9186a306ebaeca273c5e64a5be3ea90897f8d4197
                                        • Instruction ID: dffe56f400fa97ca655f4bdae94a734535a750b86027aee37da8768e7e6cc201
                                        • Opcode Fuzzy Hash: 429b15e1f1676afc80a9dfc9186a306ebaeca273c5e64a5be3ea90897f8d4197
                                        • Instruction Fuzzy Hash: 8BD01270510753CFD7209F31ED08656B6D9BF15391B119879D4C6D6650D6B0D480CE50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,005E4CE1,?), ref: 005E4DA2
                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E4DB4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-1355242751
                                        • Opcode ID: 4d07309ed37bbd3ed505f4ab911ca435e2d64d8910e8b5b3ed21fb6789e9ea71
                                        • Instruction ID: f211ee98c226f088d74485f64553aa7519142b307da084c0d0db4c7db682be3d
                                        • Opcode Fuzzy Hash: 4d07309ed37bbd3ed505f4ab911ca435e2d64d8910e8b5b3ed21fb6789e9ea71
                                        • Instruction Fuzzy Hash: 3AD05E71550713CFDB209F32ED08B86BAEABF06395B12D83ED8C6D6550EBB0D880CA50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,006612C1), ref: 00661080
                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00661092
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                        • API String ID: 2574300362-4033151799
                                        • Opcode ID: b1fdd3d325066bc13dcaa9274a8d3d71c2ab114ee2714fa35c67a9ffd91e6233
                                        • Instruction ID: 48ebf6bad1b7713ecd1314f472e796374809cd77d60cb8fe5f5b08bb4dcf8fd2
                                        • Opcode Fuzzy Hash: b1fdd3d325066bc13dcaa9274a8d3d71c2ab114ee2714fa35c67a9ffd91e6233
                                        • Instruction Fuzzy Hash: FBD01230510712CFDB205F35E928566B6EAEF06791B15EC39E485DA650DBB0C4C0C650
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00659009,?,0066F910), ref: 00659403
                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00659415
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetModuleHandleExW$kernel32.dll
                                        • API String ID: 2574300362-199464113
                                        • Opcode ID: 9ea66f6b6e60c53b3ffd53677361a47db282bcdaf6681fa50882d13871428b9b
                                        • Instruction ID: 13af7bd90ad6df140a8fffd4a655da3b35a71689bdba7dbe0614221d198f60b0
                                        • Opcode Fuzzy Hash: 9ea66f6b6e60c53b3ffd53677361a47db282bcdaf6681fa50882d13871428b9b
                                        • Instruction Fuzzy Hash: 12D05B34514713CFD7209F71E908547B6D7AF06392F11D83DD885D6650D7B0C884D760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LocalTime__swprintf
                                        • String ID: %.3d$WIN_XPe
                                        • API String ID: 2070861257-2409531811
                                        • Opcode ID: 7419f3b20fead062e264dc4fcc4a0fd139e6186127d74b4a4045fe974f73d000
                                        • Instruction ID: 80dbc105fbf58a210ba17d749335e11d5d4fc2b5019456fa0b08d9be12ff6c89
                                        • Opcode Fuzzy Hash: 7419f3b20fead062e264dc4fcc4a0fd139e6186127d74b4a4045fe974f73d000
                                        • Instruction Fuzzy Hash: 59D01271C0C56CEACB489B90AC548FA777EAB25303F1045D2F90299440F2749B869F25
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2288092cf3532fc00a03c446cded5f8ed2eeb344e9be968d3b01ea3148ae462a
                                        • Instruction ID: f7d6d19793a752c4ab23051e4ed960d5a221cd7d3ae984990d2e2661a25448e2
                                        • Opcode Fuzzy Hash: 2288092cf3532fc00a03c446cded5f8ed2eeb344e9be968d3b01ea3148ae462a
                                        • Instruction Fuzzy Hash: D5C13CB5A0421AEFCB24CF94C884AAEB7B6FF48714F158599E805EB351D730ED81DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CharLowerBuffW.USER32(?,?), ref: 0065E3D2
                                        • CharLowerBuffW.USER32(?,?), ref: 0065E415
                                          • Part of subcall function 0065DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0065DAD9
                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0065E615
                                        • _memmove.LIBCMT ref: 0065E628
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                        • String ID:
                                        • API String ID: 3659485706-0
                                        • Opcode ID: d4b11024557279fdc4cfaa48cd83d1933e318a8e36ed2cc2e5e2602ade8ffcab
                                        • Instruction ID: 7c3a265a9a96de13c7f731f1cd28f85d3aabafe98b10f003dde3194d34c0dca3
                                        • Opcode Fuzzy Hash: d4b11024557279fdc4cfaa48cd83d1933e318a8e36ed2cc2e5e2602ade8ffcab
                                        • Instruction Fuzzy Hash: 21C16D716083419FCB18DF28C48095ABBE5FF88314F14896DF899DB351E731EA4ACB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 006583D8
                                        • CoUninitialize.OLE32 ref: 006583E3
                                          • Part of subcall function 0063DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0063DAC5
                                        • VariantInit.OLEAUT32(?), ref: 006583EE
                                        • VariantClear.OLEAUT32(?), ref: 006586BF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                        • String ID:
                                        • API String ID: 780911581-0
                                        • Opcode ID: b5572c4b9443b0cb8219503fe40b585052c473a56bff15ac16dd61dc83667821
                                        • Instruction ID: 357762ae721e7dd08fdca4115909cf41dbdf189fd8ef248ad40fc7f12304a397
                                        • Opcode Fuzzy Hash: b5572c4b9443b0cb8219503fe40b585052c473a56bff15ac16dd61dc83667821
                                        • Instruction Fuzzy Hash: 27A17B752047429FCB14DF15C485B6ABBE6BF88314F14445CF99AAB7A2CB30ED04CB86
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Variant$AllocClearCopyInitString
                                        • String ID:
                                        • API String ID: 2808897238-0
                                        • Opcode ID: 6168ae1fcb1aa48f9b3d8ad14b0837de5e229f78c58662250c910f7a8e04f511
                                        • Instruction ID: a734f255387fe20cb0dd410bbc0b1e48e4acea32069b181f6a5cb6a22a4e6d10
                                        • Opcode Fuzzy Hash: 6168ae1fcb1aa48f9b3d8ad14b0837de5e229f78c58662250c910f7a8e04f511
                                        • Instruction Fuzzy Hash: A8510DB4608302AADB74AF65D885A7EB7E7AF44310F20C81FF596DB291DF709840DB85
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E5045: _fseek.LIBCMT ref: 005E505D
                                          • Part of subcall function 006499BE: _wcscmp.LIBCMT ref: 00649AAE
                                          • Part of subcall function 006499BE: _wcscmp.LIBCMT ref: 00649AC1
                                        • _free.LIBCMT ref: 0064992C
                                        • _free.LIBCMT ref: 00649933
                                        • _free.LIBCMT ref: 0064999E
                                          • Part of subcall function 00602F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00609C64), ref: 00602FA9
                                          • Part of subcall function 00602F95: GetLastError.KERNEL32(00000000,?,00609C64), ref: 00602FBB
                                        • _free.LIBCMT ref: 006499A6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                        • String ID:
                                        • API String ID: 1552873950-0
                                        • Opcode ID: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                                        • Instruction ID: 410e88ae3a86e06a8d8a3e069951ac6adbbe9f275e4cc800684625206226b65f
                                        • Opcode Fuzzy Hash: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                                        • Instruction Fuzzy Hash: C3515FB1D44259AFDF289F65CC45A9EBBBAFF48300F0404AEB249A7241DB715E90CF58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowRect.USER32(013BF690,?), ref: 00669AD2
                                        • ScreenToClient.USER32(00000002,00000002), ref: 00669B05
                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00669B72
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$ClientMoveRectScreen
                                        • String ID:
                                        • API String ID: 3880355969-0
                                        • Opcode ID: b66682101cd9361fce791708a20fc6551ffbf9d860a0f6a5886eb1d8bdcbb42e
                                        • Instruction ID: a9523e8c74780170752ee69bd797d290b5d8ad7e813c157d80ac67958d724e68
                                        • Opcode Fuzzy Hash: b66682101cd9361fce791708a20fc6551ffbf9d860a0f6a5886eb1d8bdcbb42e
                                        • Instruction Fuzzy Hash: 66510A34A00249EFCF14DF68E9819EE7BBAFB55360F148169F8259B390D770AD41CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00656CE4
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656CF4
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00656D58
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00656D64
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ErrorLast$__itow__swprintfsocket
                                        • String ID:
                                        • API String ID: 2214342067-0
                                        • Opcode ID: 6410c773306b79ff94c5bdb25f3f354aa7d565235a7b9057e94eb063309f037d
                                        • Instruction ID: ed1f1c3740646b8bf03b8d1cd012f81524add12eab7eaf71f01dd7e8baf6797b
                                        • Opcode Fuzzy Hash: 6410c773306b79ff94c5bdb25f3f354aa7d565235a7b9057e94eb063309f037d
                                        • Instruction Fuzzy Hash: A441B774740201AFEB14AF25DC8AF7A7BE9AF84B10F44845CFA599B3D2DA709C008791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0066F910), ref: 006567BA
                                        • _strlen.LIBCMT ref: 006567EC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _strlen
                                        • String ID:
                                        • API String ID: 4218353326-0
                                        • Opcode ID: b89fce1b3c1913836724ad076d6817349b1938c1d41a51d2ab42beb3776b1e98
                                        • Instruction ID: c30cf66b19e7583ab4f6180c91bffab6dbcd6e153da6944c296221ecec1a1498
                                        • Opcode Fuzzy Hash: b89fce1b3c1913836724ad076d6817349b1938c1d41a51d2ab42beb3776b1e98
                                        • Instruction Fuzzy Hash: 3441C631A00105AFCB18EB65DCC5FAEB7AABF48315F548169FC1997292DB70AD08C7A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0064BB09
                                        • GetLastError.KERNEL32(?,00000000), ref: 0064BB2F
                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0064BB54
                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0064BB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                        • String ID:
                                        • API String ID: 3321077145-0
                                        • Opcode ID: 95c5a5906d6355acc2957d21ce27a003216abb92f6b0cabc884ec2477fddf6d6
                                        • Instruction ID: e2953dc9b65a1d862ec6247baba43cc2ab59fcf298cec7412cb4cb3c56f93941
                                        • Opcode Fuzzy Hash: 95c5a5906d6355acc2957d21ce27a003216abb92f6b0cabc884ec2477fddf6d6
                                        • Instruction Fuzzy Hash: 55413A39200652DFCB14EF15C589A5DBBE2FF89310B199498EC8A9B362CB34FD41CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00668B4D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InvalidateRect
                                        • String ID:
                                        • API String ID: 634782764-0
                                        • Opcode ID: 81bbff2787a3aafd6beac0991b5e96dfc187d1d965716b60dd8816b54c8ea1ce
                                        • Instruction ID: 4da24ed77dfb28367ab1ec47ed63acf1cd4a4de258db29d49f8c6720f24dc146
                                        • Opcode Fuzzy Hash: 81bbff2787a3aafd6beac0991b5e96dfc187d1d965716b60dd8816b54c8ea1ce
                                        • Instruction Fuzzy Hash: A931AFB4600244BEEF249F78DC99FE937A7EB0A310F248716FA51D73A1CE70A9409B51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ClientToScreen.USER32(?,?), ref: 0066AE1A
                                        • GetWindowRect.USER32(?,?), ref: 0066AE90
                                        • PtInRect.USER32(?,?,0066C304), ref: 0066AEA0
                                        • MessageBeep.USER32(00000000), ref: 0066AF11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Rect$BeepClientMessageScreenWindow
                                        • String ID:
                                        • API String ID: 1352109105-0
                                        • Opcode ID: e1f0d03c6b91d5a9e8caf6d1adfb012450aea8d1d8b8f38523ec0fdcc37e0ef3
                                        • Instruction ID: 111ab848e82a09357445883f89e7228b385ed3822757ede668b23ac67b94f72c
                                        • Opcode Fuzzy Hash: e1f0d03c6b91d5a9e8caf6d1adfb012450aea8d1d8b8f38523ec0fdcc37e0ef3
                                        • Instruction Fuzzy Hash: 05418070600115DFCB11DF98D884AA9BBF7FF89740F1881A9E415EB351D731A802DFA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00641037
                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00641053
                                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006410B9
                                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0064110B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: KeyboardState$InputMessagePostSend
                                        • String ID:
                                        • API String ID: 432972143-0
                                        • Opcode ID: 458c1a7c18a3e47c85fefa20ca58afbf53070b2e4bf9796c4de56c47d9543ba2
                                        • Instruction ID: a584e4bb3beb8033df53020b1bda7c973f8f07b76f72dc018f9529ba32df33fb
                                        • Opcode Fuzzy Hash: 458c1a7c18a3e47c85fefa20ca58afbf53070b2e4bf9796c4de56c47d9543ba2
                                        • Instruction Fuzzy Hash: DD318C30E40698AEFF348B65CC05BF9BBABAB56710F04431AF5819A2D1CB748DC18765
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00641176
                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00641192
                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 006411F1
                                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00641243
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: KeyboardState$InputMessagePostSend
                                        • String ID:
                                        • API String ID: 432972143-0
                                        • Opcode ID: d8da46b7b9c2bf7f4641a8fc244597ab88adc8e98726df735373a0946fc30c00
                                        • Instruction ID: 56de2364c301de8f7e385c5d5c9940ef45a0d89b16d07b0af97bf64d62de4a0e
                                        • Opcode Fuzzy Hash: d8da46b7b9c2bf7f4641a8fc244597ab88adc8e98726df735373a0946fc30c00
                                        • Instruction Fuzzy Hash: 13312830A407189AFF208B65CC087FA7BABAB4A310F04431EE691DB6D1C3754AD59755
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0061644B
                                        • __isleadbyte_l.LIBCMT ref: 00616479
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006164A7
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006164DD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: 2b3ea7509026c48acd43b8369b792ad79f9c58c7297daeded03144d1766a7294
                                        • Instruction ID: 4e34f99e167a8f23d30af0a09963d93a6e007c1db18123b22e1428eab65ef9b1
                                        • Opcode Fuzzy Hash: 2b3ea7509026c48acd43b8369b792ad79f9c58c7297daeded03144d1766a7294
                                        • Instruction Fuzzy Hash: 7431DE35600256AFDB25CF69C844BFA7BEBFF41310F198069F864872A0EB31D891DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetForegroundWindow.USER32 ref: 00665189
                                          • Part of subcall function 0064387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00643897
                                          • Part of subcall function 0064387D: GetCurrentThreadId.KERNEL32 ref: 0064389E
                                          • Part of subcall function 0064387D: AttachThreadInput.USER32(00000000,?,006452A7), ref: 006438A5
                                        • GetCaretPos.USER32(?), ref: 0066519A
                                        • ClientToScreen.USER32(00000000,?), ref: 006651D5
                                        • GetForegroundWindow.USER32 ref: 006651DB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                        • String ID:
                                        • API String ID: 2759813231-0
                                        • Opcode ID: adf2ef0e3483c70bdcdb8e1a19581964ca292583e7c5452af2e91d160bdf8a3d
                                        • Instruction ID: 57c1c3abc3397f08ccedb33fca511962ad900ee627ca887ef4cf6b52a34b6e36
                                        • Opcode Fuzzy Hash: adf2ef0e3483c70bdcdb8e1a19581964ca292583e7c5452af2e91d160bdf8a3d
                                        • Instruction Fuzzy Hash: 49312FB1900149AFDB04EFA5CC459EFFBFAEF98300F10506AE455E7241EA759E45CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • GetCursorPos.USER32(?), ref: 0066C7C2
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0061BBFB,?,?,?,?,?), ref: 0066C7D7
                                        • GetCursorPos.USER32(?), ref: 0066C824
                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0061BBFB,?,?,?), ref: 0066C85E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                        • String ID:
                                        • API String ID: 2864067406-0
                                        • Opcode ID: 5124016d2f94a89890a137e31f67d5db23136d8b4b8f4f65aeb2460b7b792e68
                                        • Instruction ID: e077af05a15b7035885ce509a07faa557cafb2ce7fc0d339499eda1bb5c27bbd
                                        • Opcode Fuzzy Hash: 5124016d2f94a89890a137e31f67d5db23136d8b4b8f4f65aeb2460b7b792e68
                                        • Instruction Fuzzy Hash: A8319E35600418AFCB25DF59C898EFA7FBBEB49720F0480A9F9458B261C731AD50DFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __setmode.LIBCMT ref: 00600BF2
                                          • Part of subcall function 005E5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00647B20,?,?,00000000), ref: 005E5B8C
                                          • Part of subcall function 005E5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00647B20,?,?,00000000,?,?), ref: 005E5BB0
                                        • _fprintf.LIBCMT ref: 00600C29
                                        • OutputDebugStringW.KERNEL32(?), ref: 00636331
                                          • Part of subcall function 00604CDA: _flsall.LIBCMT ref: 00604CF3
                                        • __setmode.LIBCMT ref: 00600C5E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                        • String ID:
                                        • API String ID: 521402451-0
                                        • Opcode ID: 65f845aa160a967af89f2c9565bc9238974134e927b0b80e304707524fd07797
                                        • Instruction ID: 6f52d8e85c161286bd0164303aacaa8dcc690e71417f77837b76be06f8ea21ce
                                        • Opcode Fuzzy Hash: 65f845aa160a967af89f2c9565bc9238974134e927b0b80e304707524fd07797
                                        • Instruction Fuzzy Hash: A91135729442047AEB1CB3B49C46ABF7B6BAF81320F14011EF204971D2EF311D424799
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00638652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00638669
                                          • Part of subcall function 00638652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00638673
                                          • Part of subcall function 00638652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00638682
                                          • Part of subcall function 00638652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00638689
                                          • Part of subcall function 00638652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0063869F
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00638BEB
                                        • _memcmp.LIBCMT ref: 00638C0E
                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00638C44
                                        • HeapFree.KERNEL32(00000000), ref: 00638C4B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                        • String ID:
                                        • API String ID: 1592001646-0
                                        • Opcode ID: fe685e436cc68e149341b902c61134f5d3a9522d859852ff009ca1ac81c0d6c4
                                        • Instruction ID: 212c76266444e8329d097739380c284727cb5e3f46273b5235d9f03bf566ca02
                                        • Opcode Fuzzy Hash: fe685e436cc68e149341b902c61134f5d3a9522d859852ff009ca1ac81c0d6c4
                                        • Instruction Fuzzy Hash: 6C21AC71E01209EFCB00CFA4C955BEEB7BAEF40340F044099E454AB240DB75AE06CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00651A97
                                          • Part of subcall function 00651B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00651B40
                                          • Part of subcall function 00651B21: InternetCloseHandle.WININET(00000000), ref: 00651BDD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Internet$CloseConnectHandleOpen
                                        • String ID:
                                        • API String ID: 1463438336-0
                                        • Opcode ID: c9d3a2aa5a2b27473c7e2d138daaadd933de0652bfa8b392ad7a2332bd8f1de7
                                        • Instruction ID: fb7197ec04296a77ca1188835ace49dcc14657ccf634ec5c6d37038f9fe3946b
                                        • Opcode Fuzzy Hash: c9d3a2aa5a2b27473c7e2d138daaadd933de0652bfa8b392ad7a2332bd8f1de7
                                        • Instruction Fuzzy Hash: 4D21A135200605BFDB129F60DC01FBABBAFFF4A702F14001AFE119A650EB71D8199BA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0063F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0063E1C4,?,?,?,0063EFB7,00000000,000000EF,00000119,?,?), ref: 0063F5BC
                                          • Part of subcall function 0063F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0063F5E2
                                          • Part of subcall function 0063F5AD: lstrcmpiW.KERNEL32(00000000,?,0063E1C4,?,?,?,0063EFB7,00000000,000000EF,00000119,?,?), ref: 0063F613
                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0063EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0063E1DD
                                        • lstrcpyW.KERNEL32(00000000,?), ref: 0063E203
                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,0063EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0063E237
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: lstrcmpilstrcpylstrlen
                                        • String ID: cdecl
                                        • API String ID: 4031866154-3896280584
                                        • Opcode ID: a111305f20b75607040e32de0068bbb50e4c8e021aacabd5e4cba2a3f6d76785
                                        • Instruction ID: dffbc08e43ff05cc7d6545f9ff838d064a3a4fa878a38e68dfdbb5cc568a6b5f
                                        • Opcode Fuzzy Hash: a111305f20b75607040e32de0068bbb50e4c8e021aacabd5e4cba2a3f6d76785
                                        • Instruction Fuzzy Hash: 78118E36200345EFDB25AF64D845ABB77AAFF85350F40402AF806CB3A4EB729951D7E4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _free.LIBCMT ref: 00615351
                                          • Part of subcall function 0060594C: __FF_MSGBANNER.LIBCMT ref: 00605963
                                          • Part of subcall function 0060594C: __NMSG_WRITE.LIBCMT ref: 0060596A
                                          • Part of subcall function 0060594C: RtlAllocateHeap.NTDLL(013A0000,00000000,00000001,00000000,?,?,?,00601013,?), ref: 0060598F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: AllocateHeap_free
                                        • String ID:
                                        • API String ID: 614378929-0
                                        • Opcode ID: 6aa52b16dfff66fbf5b776ab8d030ba1ae461f98171d8265d91cb2c2f8fec9a5
                                        • Instruction ID: 0ed49c5bf1abf281af3c60c4d19d848d09d76887edde9eee6615402b4ff44046
                                        • Opcode Fuzzy Hash: 6aa52b16dfff66fbf5b776ab8d030ba1ae461f98171d8265d91cb2c2f8fec9a5
                                        • Instruction Fuzzy Hash: 9D11C432544A15EECB292F70AC046DB779B9F903A0B28052EF956972E0FFB189819694
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 005E4560
                                          • Part of subcall function 005E410D: _memset.LIBCMT ref: 005E418D
                                          • Part of subcall function 005E410D: _wcscpy.LIBCMT ref: 005E41E1
                                          • Part of subcall function 005E410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005E41F1
                                        • KillTimer.USER32(?,00000001,?,?), ref: 005E45B5
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005E45C4
                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0061D6CE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                        • String ID:
                                        • API String ID: 1378193009-0
                                        • Opcode ID: de8eaabdc0f609337626c4e91d3f54802842f257f7ec6f93ba87e539452c062c
                                        • Instruction ID: 2cf6112bcc72b74332404a7fb57cc4803c76a6a0f41c3edf729cfc8af6fdf904
                                        • Opcode Fuzzy Hash: de8eaabdc0f609337626c4e91d3f54802842f257f7ec6f93ba87e539452c062c
                                        • Instruction Fuzzy Hash: A421C8705047949FEB328B24D855BE7BFEEAF02304F04009EE6DE56281C7B45A858F91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006440D1
                                        • _memset.LIBCMT ref: 006440F2
                                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00644144
                                        • CloseHandle.KERNEL32(00000000), ref: 0064414D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CloseControlCreateDeviceFileHandle_memset
                                        • String ID:
                                        • API String ID: 1157408455-0
                                        • Opcode ID: 9e8046495005f4dee731b5675d282f1279c3afe02cfc4f82a2ff6d34af3466f1
                                        • Instruction ID: 55fdd94838b1cb2f6ae65914fc68fd1ec1709592483ddeeeb750e37c711e8ae3
                                        • Opcode Fuzzy Hash: 9e8046495005f4dee731b5675d282f1279c3afe02cfc4f82a2ff6d34af3466f1
                                        • Instruction Fuzzy Hash: 0711CD759012287AD7305BA5AC4DFEBBB7DEF45760F10419AF908D7280D6744F80CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00647B20,?,?,00000000), ref: 005E5B8C
                                          • Part of subcall function 005E5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00647B20,?,?,00000000,?,?), ref: 005E5BB0
                                        • gethostbyname.WSOCK32(?,?,?), ref: 006566AC
                                        • WSAGetLastError.WSOCK32(00000000), ref: 006566B7
                                        • _memmove.LIBCMT ref: 006566E4
                                        • inet_ntoa.WSOCK32(?), ref: 006566EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                        • String ID:
                                        • API String ID: 1504782959-0
                                        • Opcode ID: 3b9d3dbd4a3d47900177219c9961997d7687d043977a00b6e7b4af14447a67ed
                                        • Instruction ID: 9669f9127b03fe985a3f73670d66b56aafa391bda4721124a9548ce05c67a06c
                                        • Opcode Fuzzy Hash: 3b9d3dbd4a3d47900177219c9961997d7687d043977a00b6e7b4af14447a67ed
                                        • Instruction Fuzzy Hash: C3119335500106AFCB04EBA1DD8ADEE7BB9BF44311B144069F546A7161EF709E04CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00639043
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00639055
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0063906B
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00639086
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a9650a32bf6b191a5727e6d0eac76b87fdec9164d89a40a908a3051c5326a21b
                                        • Instruction ID: bc871b683f2695b9fac1beb429f7b90d2fc0b4521d5511a70dec94bb054c1ce1
                                        • Opcode Fuzzy Hash: a9650a32bf6b191a5727e6d0eac76b87fdec9164d89a40a908a3051c5326a21b
                                        • Instruction Fuzzy Hash: EE114C79900218FFDB10DFA5C884E9DBB75FB48310F204095E904B7250D7716E10DBE4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E2612: GetWindowLongW.USER32(?,000000EB), ref: 005E2623
                                        • DefDlgProcW.USER32(?,00000020,?), ref: 005E12D8
                                        • GetClientRect.USER32(?,?), ref: 0061B84B
                                        • GetCursorPos.USER32(?), ref: 0061B855
                                        • ScreenToClient.USER32(?,?), ref: 0061B860
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Client$CursorLongProcRectScreenWindow
                                        • String ID:
                                        • API String ID: 4127811313-0
                                        • Opcode ID: 4a58363e2dfdda768b22383941da13e5b2467b599b29f655217bbd2024c1956e
                                        • Instruction ID: f43fee49bcdd86825ae066a204c79273a3b0ca1d9ca1b852f27c02acc5d27fba
                                        • Opcode Fuzzy Hash: 4a58363e2dfdda768b22383941da13e5b2467b599b29f655217bbd2024c1956e
                                        • Instruction Fuzzy Hash: 74113A3990045AAFCB04EF96DC899FE7BB9FB45300F000455FA51E7251C770BA518BA9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006401FD,?,00641250,?,00008000), ref: 0064166F
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006401FD,?,00641250,?,00008000), ref: 00641694
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006401FD,?,00641250,?,00008000), ref: 0064169E
                                        • Sleep.KERNEL32(?,?,?,?,?,?,?,006401FD,?,00641250,?,00008000), ref: 006416D1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CounterPerformanceQuerySleep
                                        • String ID:
                                        • API String ID: 2875609808-0
                                        • Opcode ID: 133b1ae453c880a5445e130475822b2e1983429d3389d5aecb0485a60429f698
                                        • Instruction ID: c5c37a0cdfcf60b396c1a3bbbd8d46708c106d17b76ab273063241b8120e807e
                                        • Opcode Fuzzy Hash: 133b1ae453c880a5445e130475822b2e1983429d3389d5aecb0485a60429f698
                                        • Instruction Fuzzy Hash: 46115E31C0151DD7CF009FA5E948AEEBB7AFF0A751F164059E940BA240CB7095A08B96
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                        • String ID:
                                        • API String ID: 3016257755-0
                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                        • Instruction ID: 25060d06297efc1d672fcd6e8db22c89fa4b4b793c7207820e5e56575ba6e56b
                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                        • Instruction Fuzzy Hash: D0018C3204814ABBCF525E84DC018EE3F73BF29350B188615FA1858131C237CAB2AB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 0066B59E
                                        • ScreenToClient.USER32(?,?), ref: 0066B5B6
                                        • ScreenToClient.USER32(?,?), ref: 0066B5DA
                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0066B5F5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClientRectScreen$InvalidateWindow
                                        • String ID:
                                        • API String ID: 357397906-0
                                        • Opcode ID: 66740dc8be85a3e8eab87a4110a56a15cb6ccf1c15cd26afb5e1e6560e48c724
                                        • Instruction ID: 678fdebc43410ca0fe374297d578ad13856de714df7b1e16c704038ff48a95d9
                                        • Opcode Fuzzy Hash: 66740dc8be85a3e8eab87a4110a56a15cb6ccf1c15cd26afb5e1e6560e48c724
                                        • Instruction Fuzzy Hash: B11143B9D00209EFDB41DFA9D8849EEFBB9FB08310F109166E915E3220D775AA558F90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 0066B8FE
                                        • _memset.LIBCMT ref: 0066B90D
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006A7F20,006A7F64), ref: 0066B93C
                                        • CloseHandle.KERNEL32 ref: 0066B94E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memset$CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3277943733-0
                                        • Opcode ID: 22e7f7601893dbd04a2094f039e0845994eb4dccb5cb08971b7d18d9698556b2
                                        • Instruction ID: ebb293253367020d97db7e78dccb28e7167f9034e14f76a850504a923cae1277
                                        • Opcode Fuzzy Hash: 22e7f7601893dbd04a2094f039e0845994eb4dccb5cb08971b7d18d9698556b2
                                        • Instruction Fuzzy Hash: 6FF05EB2544350BFE3103B61AC05FBB3A5EEB0A355F006060FA08E5292E7715E108BA8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 00646E88
                                          • Part of subcall function 0064794E: _memset.LIBCMT ref: 00647983
                                        • _memmove.LIBCMT ref: 00646EAB
                                        • _memset.LIBCMT ref: 00646EB8
                                        • LeaveCriticalSection.KERNEL32(?), ref: 00646EC8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CriticalSection_memset$EnterLeave_memmove
                                        • String ID:
                                        • API String ID: 48991266-0
                                        • Opcode ID: f11d1e198191bb4eebfc2d80f258549d296f1a569c444b7504acb30743d6674b
                                        • Instruction ID: ac8ddbe1955136e83153a05b04976607fc13e75ecfe243f79d89047b9afc4009
                                        • Opcode Fuzzy Hash: f11d1e198191bb4eebfc2d80f258549d296f1a569c444b7504acb30743d6674b
                                        • Instruction Fuzzy Hash: 63F0543A104210ABCF416F55EC85A4ABB2BEF45320B048065FE095F256C771A911DBB4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005E134D
                                          • Part of subcall function 005E12F3: SelectObject.GDI32(?,00000000), ref: 005E135C
                                          • Part of subcall function 005E12F3: BeginPath.GDI32(?), ref: 005E1373
                                          • Part of subcall function 005E12F3: SelectObject.GDI32(?,00000000), ref: 005E139C
                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0066C030
                                        • LineTo.GDI32(00000000,?,?), ref: 0066C03D
                                        • EndPath.GDI32(00000000), ref: 0066C04D
                                        • StrokePath.GDI32(00000000), ref: 0066C05B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                        • String ID:
                                        • API String ID: 1539411459-0
                                        • Opcode ID: bc279857105831b4f775041886a7090638ec5396a5e0c8f206594f0abdb4cdef
                                        • Instruction ID: 913726a9fa0af10645a1288e9b4d4518429bfa298d6313fd045399d81c572237
                                        • Opcode Fuzzy Hash: bc279857105831b4f775041886a7090638ec5396a5e0c8f206594f0abdb4cdef
                                        • Instruction Fuzzy Hash: 5BF05E35005659BBDB126F56EC0DFDE3F5AAF06321F145000FA11611E287B95561CFE9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0063A399
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0063A3AC
                                        • GetCurrentThreadId.KERNEL32 ref: 0063A3B3
                                        • AttachThreadInput.USER32(00000000), ref: 0063A3BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                        • String ID:
                                        • API String ID: 2710830443-0
                                        • Opcode ID: 7258dfb9ebe5c53f8d5e70d8bb3f9d7cbe8c67f012f4e8b34ebc91fd535fbf4f
                                        • Instruction ID: b0057aab2b2844c34dbfd42fc77e97b214a328039b6500f4a1b77a9115c60b3b
                                        • Opcode Fuzzy Hash: 7258dfb9ebe5c53f8d5e70d8bb3f9d7cbe8c67f012f4e8b34ebc91fd535fbf4f
                                        • Instruction Fuzzy Hash: 76E0C931545228BAEB205BA2EC0DED77F5EEF167A1F009025F549D5060C6B19541DBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetSysColor.USER32(00000008), ref: 005E2231
                                        • SetTextColor.GDI32(?,000000FF), ref: 005E223B
                                        • SetBkMode.GDI32(?,00000001), ref: 005E2250
                                        • GetStockObject.GDI32(00000005), ref: 005E2258
                                        • GetWindowDC.USER32(?,00000000), ref: 0061C0D3
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0061C0E0
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0061C0F9
                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0061C112
                                        • GetPixel.GDI32(00000000,?,?), ref: 0061C132
                                        • ReleaseDC.USER32(?,00000000), ref: 0061C13D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                        • String ID:
                                        • API String ID: 1946975507-0
                                        • Opcode ID: eeaeb9e3af8de5c9d5ac62247664e3bc6f0a554849cffca23d21fec061ada0ad
                                        • Instruction ID: 0d76303d4dd98e00c879c7fc468fbc85efbe4dd302eff939f3b02ab45e032d7e
                                        • Opcode Fuzzy Hash: eeaeb9e3af8de5c9d5ac62247664e3bc6f0a554849cffca23d21fec061ada0ad
                                        • Instruction Fuzzy Hash: E9E06D32544244EBDB215FA4FC0D7D87B16EB16336F048366FAA9880E187B249C0DB12
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentThread.KERNEL32 ref: 00638C63
                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,0063882E), ref: 00638C6A
                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0063882E), ref: 00638C77
                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,0063882E), ref: 00638C7E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CurrentOpenProcessThreadToken
                                        • String ID:
                                        • API String ID: 3974789173-0
                                        • Opcode ID: fa789c148387cbdf1de34d6058d1c80403d9163fe933fb98635e6a00f1a3ab45
                                        • Instruction ID: b84b1e75814a59ba41d31cd8ea47a4e422f91b71a759ba00c52f1cb14d040c20
                                        • Opcode Fuzzy Hash: fa789c148387cbdf1de34d6058d1c80403d9163fe933fb98635e6a00f1a3ab45
                                        • Instruction Fuzzy Hash: F2E04F36646311ABD7205FB17D0CB963BAEAF50792F146828F245DA040DA7488418BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00622187
                                        • GetDC.USER32(00000000), ref: 00622191
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006221B1
                                        • ReleaseDC.USER32(?), ref: 006221D2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 28c27e25fbb37db6c643501b132c9e350264a187c482002b239355315631cb54
                                        • Instruction ID: 335ce23b3733270369c4a2ef6dfc9e3d08edae6592418987a1e4c52424dc8057
                                        • Opcode Fuzzy Hash: 28c27e25fbb37db6c643501b132c9e350264a187c482002b239355315631cb54
                                        • Instruction Fuzzy Hash: F8E0E5B5800615EFDB019F61E808A9D7FB2FB4C351F109429F95AD7220CBB981429F40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetDesktopWindow.USER32 ref: 0062219B
                                        • GetDC.USER32(00000000), ref: 006221A5
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006221B1
                                        • ReleaseDC.USER32(?), ref: 006221D2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: c310718b44ccaa7e0a598674d39024917325c8a82ffe6767f6ed394faef372a6
                                        • Instruction ID: 70eea43578f9f551b14f38b629f9d917e89ba131b03be96d67283b2d9be14e81
                                        • Opcode Fuzzy Hash: c310718b44ccaa7e0a598674d39024917325c8a82ffe6767f6ed394faef372a6
                                        • Instruction Fuzzy Hash: 6DE012B5800204AFCB019FB1E80869DBFF2FF4C351F109429F99AE7220CBB991429F40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %g
                                        • API String ID: 0-3742675072
                                        • Opcode ID: 9c272ddf093b7358ec2606bacaafa7b76c78f8db18744e299eb40dc7d61eff2f
                                        • Instruction ID: 2eec6eaa970b9849daa678b8df1578cc44da05f970c8b6940f3a6d65c8be83f4
                                        • Opcode Fuzzy Hash: 9c272ddf093b7358ec2606bacaafa7b76c78f8db18744e299eb40dc7d61eff2f
                                        • Instruction Fuzzy Hash: 83B1D171D0428A9BCF18EF96C4859EDBFB5FF643C0F544026E992A7191EB309E82CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __itow_s
                                        • String ID: xrj$xrj
                                        • API String ID: 3653519197-308220071
                                        • Opcode ID: 9c1a435f923c201cf83c9ade8c64cdadef79c1d180241f9bbbec6f92ec4d5e10
                                        • Instruction ID: cda8f94264d4dd6e2deda1fd2ef3dae935d16650d431424be3f854f25b8b0119
                                        • Opcode Fuzzy Hash: 9c1a435f923c201cf83c9ade8c64cdadef79c1d180241f9bbbec6f92ec4d5e10
                                        • Instruction Fuzzy Hash: 4CB18F70A00109AFCB24DF55C884EFABBBAFF58301F149459FD459B292EB30EA45CB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005FFEC6: _wcscpy.LIBCMT ref: 005FFEE9
                                          • Part of subcall function 005E9997: __itow.LIBCMT ref: 005E99C2
                                          • Part of subcall function 005E9997: __swprintf.LIBCMT ref: 005E9A0C
                                        • __wcsnicmp.LIBCMT ref: 0064B298
                                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0064B361
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                        • String ID: LPT
                                        • API String ID: 3222508074-1350329615
                                        • Opcode ID: 45f8b5d752492ef8968fe6489cd931a615c9f18099f87b2d9cf3c12d9e679b91
                                        • Instruction ID: 33a9849f802f1d5c5beddd1320d872cd2b8fd6a4936ed9fe020731add264df3c
                                        • Opcode Fuzzy Hash: 45f8b5d752492ef8968fe6489cd931a615c9f18099f87b2d9cf3c12d9e679b91
                                        • Instruction Fuzzy Hash: EC618275A00215AFCB19DF95C885EEEB7B9BF48310F115059F546AB391DB70EE40CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: Oa_
                                        • API String ID: 4104443479-62195052
                                        • Opcode ID: 0e8fb625b6ddc45725cf2f38ff0b390372a353e6651bb6cb606adee44998cab3
                                        • Instruction ID: f16cc7ae040252c35fa232e10d36c3b6e6c33c71d1f33c7a55ea8d2626f58cff
                                        • Opcode Fuzzy Hash: 0e8fb625b6ddc45725cf2f38ff0b390372a353e6651bb6cb606adee44998cab3
                                        • Instruction Fuzzy Hash: D0515E70A01A19DFCF24CF68D880AAEBBB2FF44305F14852AE85AD7340EB31A955CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 005F2AC8
                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 005F2AE1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: GlobalMemorySleepStatus
                                        • String ID: @
                                        • API String ID: 2783356886-2766056989
                                        • Opcode ID: 9080fbe9f3723da0b5758dc5c4645e4f98ea2be44fdedd38bedfd10d50ed81e8
                                        • Instruction ID: 4ef58ac80e2837c2503aa2a344bbc966a05590d2003b7fc9e2d40a9b1e880125
                                        • Opcode Fuzzy Hash: 9080fbe9f3723da0b5758dc5c4645e4f98ea2be44fdedd38bedfd10d50ed81e8
                                        • Instruction Fuzzy Hash: 065149B14187869BD320AF11DC8ABAFBBE8FFC4310F82485DF1D9411A1DB708969CB16
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E506B: __fread_nolock.LIBCMT ref: 005E5089
                                        • _wcscmp.LIBCMT ref: 00649AAE
                                        • _wcscmp.LIBCMT ref: 00649AC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: _wcscmp$__fread_nolock
                                        • String ID: FILE
                                        • API String ID: 4029003684-3121273764
                                        • Opcode ID: bcad7dad895cdeb3396bab60aa2b8cb738e86150283fdaa89386df5f23165251
                                        • Instruction ID: ce6b3cf41e050e8c4f44d0d62b1980bcbbc10e11a3456ea897235c0c17f216ef
                                        • Opcode Fuzzy Hash: bcad7dad895cdeb3396bab60aa2b8cb738e86150283fdaa89386df5f23165251
                                        • Instruction Fuzzy Hash: A4410971A4061ABADF259FA1CC49FEFBBBEEF45714F000069F900A7281DA759A0487B5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID: Dtj$Dtj
                                        • API String ID: 1473721057-3505293294
                                        • Opcode ID: f7a7d6efa8a96829872264f980fba5ea8764817c01b2c4ac2460908af388cc71
                                        • Instruction ID: fa98af46786bda82adadbc32a1e4e0c1567859cb153e5ec1a595f8a089ce1e50
                                        • Opcode Fuzzy Hash: f7a7d6efa8a96829872264f980fba5ea8764817c01b2c4ac2460908af388cc71
                                        • Instruction Fuzzy Hash: 1D51B4786083828FD758DF2AC484A1ABFE2BB99354F54585DF9858B361D731EC81CF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00652892
                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006528C8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CrackInternet_memset
                                        • String ID: |
                                        • API String ID: 1413715105-2343686810
                                        • Opcode ID: a7d300561aa57a0d1d906fd37532f500e3b6771ab75187d89ec4d3c379d0364c
                                        • Instruction ID: b549e9d3091b45431c1c076974e16fd8cc08b01d895657ef72f21fe99f7edd63
                                        • Opcode Fuzzy Hash: a7d300561aa57a0d1d906fd37532f500e3b6771ab75187d89ec4d3c379d0364c
                                        • Instruction Fuzzy Hash: 86313A71C0011AAFCF459FA1CC99EEEBFB9FF19300F100069F815A6265DA315A16DBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DestroyWindow.USER32(?,?,?,?), ref: 00666D86
                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00666DC2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$DestroyMove
                                        • String ID: static
                                        • API String ID: 2139405536-2160076837
                                        • Opcode ID: 7de578cd5c762bc481f697b775fa54c73875e7eb81460ad8fc8c63d9092066f4
                                        • Instruction ID: 534bb26a0d496f87b8368491e711973cedde63a1ba2764d082e901fa3a8ad70c
                                        • Opcode Fuzzy Hash: 7de578cd5c762bc481f697b775fa54c73875e7eb81460ad8fc8c63d9092066f4
                                        • Instruction Fuzzy Hash: 7131AF71200604AEDB109F64DC80AFB77BAFF88720F10961DF8A6C7290CA71AC91CB64
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00642E00
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00642E3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu_memset
                                        • String ID: 0
                                        • API String ID: 2223754486-4108050209
                                        • Opcode ID: cbfecaf9aa26164c3142971f093cfd8f48d856cad6d0b6c3b5256d79b02eff54
                                        • Instruction ID: 1ff0fd81d9d487fea60f7f8d67eb6389e0ab8a5738d1ce251248252bed786e51
                                        • Opcode Fuzzy Hash: cbfecaf9aa26164c3142971f093cfd8f48d856cad6d0b6c3b5256d79b02eff54
                                        • Instruction Fuzzy Hash: 3A31E331A0030AEBEB249F48C885BEEBBBBEF05340F64006DF985972A0E7709940CB14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 006669D0
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006669DB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Combobox
                                        • API String ID: 3850602802-2096851135
                                        • Opcode ID: 7e695c7fb50605d99ac00380f301d54bc67f0d7fe5f5a8194a683357f11a97ef
                                        • Instruction ID: 03349e9c01779b8daf1b10b6725ff4cf2471e25aa7afd1fa82250d11b0348eb1
                                        • Opcode Fuzzy Hash: 7e695c7fb50605d99ac00380f301d54bc67f0d7fe5f5a8194a683357f11a97ef
                                        • Instruction Fuzzy Hash: 5A11B67160020A7FEF159F24EC80EEB3B6BEB853A4F110228FD5897391D6719C518BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005E1D73
                                          • Part of subcall function 005E1D35: GetStockObject.GDI32(00000011), ref: 005E1D87
                                          • Part of subcall function 005E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 005E1D91
                                        • GetWindowRect.USER32(00000000,?), ref: 00666EE0
                                        • GetSysColor.USER32(00000012), ref: 00666EFA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                        • String ID: static
                                        • API String ID: 1983116058-2160076837
                                        • Opcode ID: 939c479ad96ba58c3c13f1122e233b9f92b4745f2098523b369fbd87ef1d1ac9
                                        • Instruction ID: 280f80bb0b46f36befe0e7a2517c9615d541e4e7f8e233b536704bd37d4f2b36
                                        • Opcode Fuzzy Hash: 939c479ad96ba58c3c13f1122e233b9f92b4745f2098523b369fbd87ef1d1ac9
                                        • Instruction Fuzzy Hash: D921677261020AAFDB04DFA8ED45AFA7BBAFB08314F005628FD55D3250E775E861DB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowTextLengthW.USER32(00000000), ref: 00666C11
                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00666C20
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: LengthMessageSendTextWindow
                                        • String ID: edit
                                        • API String ID: 2978978980-2167791130
                                        • Opcode ID: 2ae881729d3b7f434a3180ea638035497fb6eaa64c909ffa82768de04cadd167
                                        • Instruction ID: 6375ed6a6f329099e1ea1540e96fa4cb137424c3ca2731325084e0af7937d7e1
                                        • Opcode Fuzzy Hash: 2ae881729d3b7f434a3180ea638035497fb6eaa64c909ffa82768de04cadd167
                                        • Instruction Fuzzy Hash: 3F118C71500208ABEB109F64EC45AEB3B6BEB15378F204724F961D72E0C775ECA19B60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00642F11
                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00642F30
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu_memset
                                        • String ID: 0
                                        • API String ID: 2223754486-4108050209
                                        • Opcode ID: fd43670f335cdefe9cd7741bf559e32d1204abce6bc4e156e62922488772e342
                                        • Instruction ID: 9298c4e3db0fe7a7c953927c24772a135f9f1bc94efe9ae9edd029595e225e65
                                        • Opcode Fuzzy Hash: fd43670f335cdefe9cd7741bf559e32d1204abce6bc4e156e62922488772e342
                                        • Instruction Fuzzy Hash: AA110831941116ABCB60EF98DD14BD977BBEB11314FA800B5F855A73A0DBB0ED08CB95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00652520
                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00652549
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Internet$OpenOption
                                        • String ID: <local>
                                        • API String ID: 942729171-4266983199
                                        • Opcode ID: 2f70f5fab7eaead67c3b7e7c0286a31c8b60a60c0b55c56c02e29bac3da70240
                                        • Instruction ID: 86f38921d2a2b93be230f2d3f08b022509ca722db4946e71716e7342562e6878
                                        • Opcode Fuzzy Hash: 2f70f5fab7eaead67c3b7e7c0286a31c8b60a60c0b55c56c02e29bac3da70240
                                        • Instruction Fuzzy Hash: D911E370100226BADB248F51CCA4EFBFFAEFB07352F10812AFD4542140E2705989D6E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0065830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,006580C8,?,00000000,?,?), ref: 00658322
                                        • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006580CB
                                        • htons.WSOCK32(00000000,?,00000000), ref: 00658108
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWidehtonsinet_addr
                                        • String ID: 255.255.255.255
                                        • API String ID: 2496851823-2422070025
                                        • Opcode ID: b825ae6e2bec331903d89a028348bce3fdf09cdae304bca5944c28c5abe255ad
                                        • Instruction ID: b3c8cd9027f9635a8a94b2fa9ddc13087bf6e6482c93d031949d4558369d5262
                                        • Opcode Fuzzy Hash: b825ae6e2bec331903d89a028348bce3fdf09cdae304bca5944c28c5abe255ad
                                        • Instruction Fuzzy Hash: 3D11CE34200246ABDB20AFA4DC86BFDB766FF14321F10852AED11A7691DA72A8098795
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005E3C26,006A62F8,?,?,?), ref: 005F0ACE
                                          • Part of subcall function 005E7D2C: _memmove.LIBCMT ref: 005E7D66
                                        • _wcscat.LIBCMT ref: 006250E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: FullNamePath_memmove_wcscat
                                        • String ID: cj
                                        • API String ID: 257928180-126231742
                                        • Opcode ID: 00da8c508cd8c4ef650dcaa6fd359b635ba85422a0d89950fe553a29aebfecde
                                        • Instruction ID: 5679d8921baa55d020071e7f89f4aeab3f493a185df4721a368447e5731f0a7a
                                        • Opcode Fuzzy Hash: 00da8c508cd8c4ef650dcaa6fd359b635ba85422a0d89950fe553a29aebfecde
                                        • Instruction Fuzzy Hash: BB11083090420D9BCB41FBA0DD05EED7BF9FF48340B0424A5BA89D7281EA74EB888B10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00639355
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: dd256262b58a7ee2f74917a4364012ee760a57efd8a9678670476b3dc2f8a5ec
                                        • Instruction ID: ba6b38149dd24ef61c82e83bfa401663a003b2d0691ec0fc2b6deca86941560b
                                        • Opcode Fuzzy Hash: dd256262b58a7ee2f74917a4364012ee760a57efd8a9678670476b3dc2f8a5ec
                                        • Instruction Fuzzy Hash: 4901D271A05219AB9B08EB64CC958FE776ABF46320B100619F972572D1EB71580CCAA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 0063924D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: 9246c5377df76799076684875efc45aca3680adf950622b78cee1a6b2a4cd19b
                                        • Instruction ID: 96b58bb03f3ee309bde7ccb3854ca0cfd1f2a217ff2baa9ef0d13bb907e9247a
                                        • Opcode Fuzzy Hash: 9246c5377df76799076684875efc45aca3680adf950622b78cee1a6b2a4cd19b
                                        • Instruction Fuzzy Hash: D601A771E411097BCF08EBA4C996DFF77AEAF45300F15002DB95267291EB515F0C96B1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 005E7F41: _memmove.LIBCMT ref: 005E7F82
                                          • Part of subcall function 0063B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0063B0E7
                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 006392D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: 6bf6d6a01c16bbb87dd319026e7099c6ef157eb580162e4c251dee8200d25567
                                        • Instruction ID: 217f7af0e68ff829702d1f4f5b9c7c150ee45ef465365deddc96b4de97d310e0
                                        • Opcode Fuzzy Hash: 6bf6d6a01c16bbb87dd319026e7099c6ef157eb580162e4c251dee8200d25567
                                        • Instruction Fuzzy Hash: 0701F971E4110977CF08EBA4C986EFF77AEAF15300F250129B962672C2EB615F0C96B5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: __calloc_crt
                                        • String ID: @Rj
                                        • API String ID: 3494438863-2855396162
                                        • Opcode ID: 8e8580b8cccdf3e6b383cb88e1af9d5eeb343bce18671ac6c612e09bbff1e502
                                        • Instruction ID: 525aeaa3c3c0b83028f579fab3be2e2d515c1f147a14d39eb7f90e3a689dcacf
                                        • Opcode Fuzzy Hash: 8e8580b8cccdf3e6b383cb88e1af9d5eeb343bce18671ac6c612e09bbff1e502
                                        • Instruction Fuzzy Hash: 6FF04F717887169BFB6CEF18FD157A3279BEB42730B14042AF105CB6D0EBB099918A84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: ClassName_wcscmp
                                        • String ID: #32770
                                        • API String ID: 2292705959-463685578
                                        • Opcode ID: 9848e385a284f5127ff074e422a9c3e272434819fa1d3ab0884330cadd05033c
                                        • Instruction ID: 3775d124f3f8089a3044a9bfbfbe5b059222e7eb5fada60a0d5afa9e7d6a24f1
                                        • Opcode Fuzzy Hash: 9848e385a284f5127ff074e422a9c3e272434819fa1d3ab0884330cadd05033c
                                        • Instruction Fuzzy Hash: 3AE0613290422C27D710AB95AC05F97F7EDEB41731F00005BFD10D3140D5A09A048BE0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006381CA
                                          • Part of subcall function 00603598: _doexit.LIBCMT ref: 006035A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: Message_doexit
                                        • String ID: AutoIt$Error allocating memory.
                                        • API String ID: 1993061046-4017498283
                                        • Opcode ID: 0a0f9bf4269d1e6d6ca8269abd70175ea478963e78aa5acc824dbc1343e2bc75
                                        • Instruction ID: 64bd65e373e59a5fcbaca6a0f9649e6c44b70ea783a123aed3f35e3158048b17
                                        • Opcode Fuzzy Hash: 0a0f9bf4269d1e6d6ca8269abd70175ea478963e78aa5acc824dbc1343e2bc75
                                        • Instruction Fuzzy Hash: 9AD02B323C431932D21933F96C0BFC63A8E4B06F12F00402AFB48995D38DD154C142EC
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0061B564: _memset.LIBCMT ref: 0061B571
                                          • Part of subcall function 00600B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0061B540,?,?,?,005E100A), ref: 00600B89
                                        • IsDebuggerPresent.KERNEL32(?,?,?,005E100A), ref: 0061B544
                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,005E100A), ref: 0061B553
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0061B54E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2025573097.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                        • Associated: 00000000.00000002.2025559566.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.000000000066F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025611656.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025645464.000000000069F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2025659657.00000000006A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5e0000_file4232024.jbxd
                                        Similarity
                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 3158253471-631824599
                                        • Opcode ID: 4752193b6f14a1264df5bce909dae5f374d6b8c7740a87ec8b2d1eb481268330
                                        • Instruction ID: b2d9d5f7c1ea833cafd113b7946554369f5251a1bf4504f7f5ac814d991bda33
                                        • Opcode Fuzzy Hash: 4752193b6f14a1264df5bce909dae5f374d6b8c7740a87ec8b2d1eb481268330
                                        • Instruction Fuzzy Hash: 98E06DB02003528BD360EF68E4083827BE7AB04704F089A2CE486C2750E7F4E584CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%