Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dup2patcher.dll

Overview

General Information

Sample name:dup2patcher.dll
Analysis ID:1411078
MD5:1e4c47cb43d537d50a60592b42345da9
SHA1:0433554c251dc75b8ba4251663aa1a3bce641306
SHA256:6f8650fa49a74fbbabb51f1cced99d11732c177ecb1049ec59ebc79b16daf1ed
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Generic Patcher
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
PE file has a writeable .text section
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
One or more processes crash
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Tries to load missing DLLs
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7460 cmdline: loaddll32.exe "C:\Users\user\Desktop\dup2patcher.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7512 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7536 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 7644 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7536 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7520 cmdline: rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,AddMsg MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7652 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 616 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7816 cmdline: rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7908 cmdline: rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping_readonly MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7936 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",AddMsg MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7244 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7936 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7944 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7952 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping_readonly MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7960 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",write_disk_file MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7256 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7968 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",load_patcher MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7980 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegString MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7992 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegDword MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8000 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SearchAndReplace MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8072 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",Reg_Delete_Value MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8108 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",LoadFileMapping MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8116 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegString MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8124 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegDword MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8140 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPluginDataMemory MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8156 cmdline: rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPatcherWindowHandle MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dup2patcher.dllJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: rundll32.exe PID: 7520JoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
      Process Memory Space: rundll32.exe PID: 7536JoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
        Process Memory Space: rundll32.exe PID: 7936JoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
          Process Memory Space: rundll32.exe PID: 7960JoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
            Process Memory Space: rundll32.exe PID: 7968JoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
              Click to see the 2 entries
              SourceRuleDescriptionAuthorStrings
              23.2.rundll32.exe.6cd70000.0.unpackJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
                16.2.rundll32.exe.6cd70000.1.unpackJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
                  15.2.rundll32.exe.6cd70000.0.unpackJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
                    12.2.rundll32.exe.6cd70000.0.unpackJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
                      4.2.rundll32.exe.6cd70000.0.unpackJoeSecurity_GenericPatcherYara detected Generic PatcherJoe Security
                        Click to see the 2 entries
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: dup2patcher.dllReversingLabs: Detection: 65%
                        Source: dup2patcher.dllJoe Sandbox ML: detected
                        Source: dup2patcher.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                        Source: dup2patcher.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD76CE0 FindFirstFileA,FindClose,3_2_6CD76CE0
                        Source: rundll32.exe, 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2061818750.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2084019877.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpString found in binary or memory: "Arte"Adobe Acrobat Pro DC 2022.002.20191 Patch - MrSzzS https://www.youtube.com/channel/UCcf3dtQFVb5zfy0jGYNpA0w equals www.youtube.com (Youtube)
                        Source: rundll32.exe, 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2061818750.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2084019877.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpString found in binary or memory: Adobe Acrobat Pro DC 2022.002.20191 Patch - MrSzzS https://www.youtube.com/channel/UCcf3dtQFVb5zfy0jGYNpA0w equals www.youtube.com (Youtube)
                        Source: rundll32.exe, 00000010.00000002.3502791204.000000000604F000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: vXKL|Adobe Acrobat Pro DC 2022.002.20191 Patch - MrSzzS https://www.youtube.com/channe equals www.youtube.com (Youtube)
                        Source: rundll32.exe, 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2061818750.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2084019877.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2081833980.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.3502957078.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1763564981.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1763068898.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, dup2patcher.dllString found in binary or memory: http://diablo2oo2.cjb.netPe
                        Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                        Source: rundll32.exe, 00000010.00000002.3502791204.000000000604F000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/channe
                        Source: dup2patcher.dllString found in binary or memory: https://www.youtube.com/channel/UCcf3dtQFVb5zfy0jGYNpA0w
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD771E0 lstrlenA,OpenClipboard,GlobalAlloc,GlobalLock,lstrcpyA,EmptyClipboard,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_6CD771E0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD771E0 lstrlenA,OpenClipboard,GlobalAlloc,GlobalLock,lstrcpyA,EmptyClipboard,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_6CD771E0

                        System Summary

                        barindex
                        Source: dup2patcher.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD79FA03_2_6CD79FA0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD777A93_2_6CD777A9
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD797623_2_6CD79762
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD7805E3_2_6CD7805E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10001B1716_2_10001B17
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10001AE416_2_10001AE4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100015E516_2_100015E5
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7536 -s 628
                        Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: dup2patcher.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                        Source: bassmod.dll.16.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: classification engineClassification label: mal68.evad.winDLL@44/19@0/0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD7149B FindResourceA,SizeofResource,LoadResource,3_2_6CD7149B
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7520
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7960
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7936
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7536
                        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b10a86f5-b518-41d3-adee-bdbc9e27f919Jump to behavior
                        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,AddMsg
                        Source: dup2patcher.dllReversingLabs: Detection: 65%
                        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\dup2patcher.dll"
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,AddMsg
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7536 -s 628
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 616
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping_readonly
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",AddMsg
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping_readonly
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",write_disk_file
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",load_patcher
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegString
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegDword
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SearchAndReplace
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",Reg_Delete_Value
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",LoadFileMapping
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegString
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegDword
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPluginDataMemory
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPatcherWindowHandle
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7936 -s 624
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 624
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,AddMsgJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMappingJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping_readonlyJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",AddMsgJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMappingJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping_readonlyJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",write_disk_fileJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",load_patcherJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegStringJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegDwordJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SearchAndReplaceJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",Reg_Delete_ValueJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",LoadFileMappingJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegStringJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegDwordJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPluginDataMemoryJump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPatcherWindowHandleJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1Jump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: dup2patcher.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD75AFE GetTempPathA,lstrcatA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6CD75AFE
                        Source: dup2patcher.dllStatic PE information: real checksum: 0x19917 should be: 0xdb0e1
                        Source: bassmod.dll.16.drStatic PE information: real checksum: 0x0 should be: 0xd5d3
                        Source: bassmod.dll.16.drStatic PE information: section name: .text entropy: 6.891621988635923
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\bassmod.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\SysWOW64\rundll32.exeStalling execution: Execution stalls by calling Sleepgraph_16-808
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD768D3 rdtsc 3_2_6CD768D3
                        Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 2533Jump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bassmod.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.5 %
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                        Source: C:\Windows\SysWOW64\rundll32.exeThread sleep count: Count: 2533 delay: -5Jump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD76CE0 FindFirstFileA,FindClose,3_2_6CD76CE0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD74616 GetSystemInfo,CreateFileA,GetFileSize,CreateFileMappingA,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,3_2_6CD74616
                        Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                        Source: Amcache.hve.8.drBinary or memory string: VMware
                        Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                        Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD768D3 rdtsc 3_2_6CD768D3
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD75AFE GetTempPathA,lstrcatA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6CD75AFE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD767DE push dword ptr fs:[00000030h]3_2_6CD767DE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD767F8 push dword ptr fs:[00000030h]3_2_6CD767F8

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: dup2patcher.dll, type: SAMPLE
                        Source: Yara matchFile source: 23.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.2.rundll32.exe.6cd70000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cd70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7520, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7536, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7960, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7968, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 8108, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 8140, type: MEMORYSTR
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1Jump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CD76FA0 GetVersionExA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,3_2_6CD76FA0
                        Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        11
                        Process Injection
                        21
                        Virtualization/Sandbox Evasion
                        OS Credential Dumping31
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        11
                        Process Injection
                        LSASS Memory21
                        Virtualization/Sandbox Evasion
                        Remote Desktop Protocol2
                        Clipboard Data
                        Junk DataExfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                        Obfuscated Files or Information
                        Security Account Manager1
                        Application Window Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Rundll32
                        NTDS1
                        File and Directory Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                        Software Packing
                        LSA Secrets3
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1411078 Sample: dup2patcher.dll Startdate: 18/03/2024 Architecture: WINDOWS Score: 68 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Generic Patcher 2->34 36 Machine Learning detection for sample 2->36 38 PE file has a writeable .text section 2->38 8 loaddll32.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 2 8->15         started        18 16 other processes 8->18 file5 40 Found stalling execution ending in API Sleep call 10->40 20 WerFault.exe 20 16 10->20         started        22 rundll32.exe 13->22         started        30 C:\Users\user\AppData\Local\...\bassmod.dll, PE32 15->30 dropped 24 WerFault.exe 18->24         started        26 WerFault.exe 18->26         started        signatures6 process7 process8 28 WerFault.exe 2 17 22->28         started       

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        dup2patcher.dll65%ReversingLabsWin32.Trojan.Generic
                        dup2patcher.dll100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\bassmod.dll0%ReversingLabs
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://diablo2oo2.cjb.netPe0%Avira URL Cloudsafe
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://upx.sf.netAmcache.hve.8.drfalse
                          high
                          https://www.youtube.com/channerundll32.exe, 00000010.00000002.3502791204.000000000604F000.00000004.00000010.00020000.00000000.sdmpfalse
                            high
                            http://diablo2oo2.cjb.netPerundll32.exe, 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2061818750.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2084019877.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2081833980.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.3502957078.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1763564981.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1763068898.000000006CDC9000.00000080.00000001.01000000.00000003.sdmp, dup2patcher.dllfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.youtube.com/channel/UCcf3dtQFVb5zfy0jGYNpA0wdup2patcher.dllfalse
                              high
                              No contacted IP infos
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1411078
                              Start date and time:2024-03-18 15:39:26 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 23s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Run name:Run with higher sleep bypass
                              Number of analysed new started processes analysed:36
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:dup2patcher.dll
                              Detection:MAL
                              Classification:mal68.evad.winDLL@44/19@0/0
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 6
                              • Number of non-executed functions: 66
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 52.182.143.212
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target rundll32.exe, PID 7960 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • VT rate limit hit for: dup2patcher.dll
                              TimeTypeDescription
                              15:41:13API Interceptor307645x Sleep call for process: rundll32.exe modified
                              No context
                              No context
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Temp\bassmod.dll(x64bit.)_patch.exeGet hashmaliciousUnknownBrowse
                                (x64bit.)_patch.exeGet hashmaliciousUnknownBrowse
                                  wb31oyhUxK.exeGet hashmaliciousUnknownBrowse
                                    wb31oyhUxK.exeGet hashmaliciousUnknownBrowse
                                      ABLETON PATCHER.exeGet hashmaliciousUnknownBrowse
                                        Patch.exeGet hashmaliciousUnknownBrowse
                                          y3EXL3p857.exeGet hashmaliciousUnknownBrowse
                                            adobe.cs6.all.products.activator.exeGet hashmaliciousUnknownBrowse
                                              (x64bit.)_patch.exeGet hashmaliciousUnknownBrowse
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8634090815005683
                                                Encrypted:false
                                                SSDEEP:192:4vPiieO6KK0BU/wjeTzDzuiFJZ24IO8dci2:QPiifvRBU/wjejzuiFJY4IO8dci
                                                MD5:4805E6C7F695BD02215C85857080E26F
                                                SHA1:5E324E3C7212287BE07E666959F85BBF654AFB7C
                                                SHA-256:3B37C27439867E4DB9B5DCC95F4CDB603A77FDC589C1F35F7DAA19A4ECA82715
                                                SHA-512:08B3223218CD93A3CF60E4443C73341D253D716C6880438FF1B92A5F04473928E2995FCACF403380F4698FB5A24702F4574E001BCAD670C7C9BCD0DB617CD841
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.6.4.2.6.1.9.9.9.0.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.6.4.2.7.0.9.2.8.1.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.c.4.7.9.9.e.-.a.0.1.f.-.4.f.8.f.-.8.7.0.0.-.e.d.7.8.3.e.5.e.0.5.5.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.7.6.2.6.b.5.-.3.2.0.c.-.4.b.c.9.-.b.3.a.c.-.0.2.1.4.c.c.0.5.e.e.b.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.1.8.-.0.0.0.1.-.0.0.1.4.-.e.f.3.4.-.6.0.3.6.4.2.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8633748343734353
                                                Encrypted:false
                                                SSDEEP:192:M9/2i5ObN0BU/wjeTzDzuiFJZ24IO8dci:S2iQbOBU/wjejzuiFJY4IO8dci
                                                MD5:C5BC27AF25418B43C10A04523AD371CC
                                                SHA1:F603098DEEE7DC48C78AAC501B913671139DA477
                                                SHA-256:350575B82AB66A6DEEA1BBC336B4F0B364474F2631869C17CF84B0226F5F42EB
                                                SHA-512:A5E911A8271C776C0A88DB77640BD9A02AEA06BD54F8A09FEB4971D704EEA485C348AE8CE0F27468EC61A7CF57B9504D45A214DE33C36B59445CE7B11342F529
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.6.4.1.6.4.0.5.8.9.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.6.4.1.7.4.6.8.4.2.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.3.c.3.c.8.b.8.-.f.4.9.5.-.4.3.6.e.-.b.0.6.7.-.5.9.6.1.b.7.a.8.7.7.f.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.3.0.7.c.4.5.b.-.f.8.d.e.-.4.0.1.f.-.a.2.4.6.-.f.4.0.3.1.f.3.8.c.5.6.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.0.-.0.0.0.1.-.0.0.1.4.-.7.a.9.c.-.e.7.3.0.4.2.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8627133963712349
                                                Encrypted:false
                                                SSDEEP:96:EeFD6iEhVyCLsj94sh7efoQXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNl4E5:DYiEOAN0BU/wjeTzDzuiFJZ24IO8dci
                                                MD5:D6708028BCD34EBA70FA25ECDB43F536
                                                SHA1:F3ED8BB7CCF88847CBAA3414E9B9EDA9189F04E9
                                                SHA-256:89D8836FE3C7F4F8B65F535D0B20073A7707BD65C60C4442E15383E27918FF7A
                                                SHA-512:F178E5CA3A1C2B9594A404C7069F7C3DCC9256124E7DF179510AC725773F8B0BC641A6CA9BE3F94F3D82261476B89B33F003CC21C373ED0062B9E82E5382F270
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.6.4.1.6.3.9.1.5.1.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.6.4.1.7.4.6.9.6.6.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.9.1.1.a.b.3.a.-.3.6.d.a.-.4.f.f.f.-.b.d.d.c.-.3.1.5.2.b.c.9.c.d.c.d.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.3.3.7.d.a.3.-.4.3.9.6.-.4.f.c.9.-.b.1.0.7.-.a.a.2.c.9.d.c.4.e.4.0.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.0.-.0.0.0.1.-.0.0.1.4.-.9.2.3.f.-.e.a.3.0.4.2.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8628110966767798
                                                Encrypted:false
                                                SSDEEP:192:pYitOAN0BU/wjeTzDzuiFJZ24IO8dciY:iikAOBU/wjejzuiFJY4IO8dciY
                                                MD5:23E8D0F7A8C2DEB922DAC2CB693F7138
                                                SHA1:FE739D1FB52133CA566E51AFDC1B8B3548FC31A7
                                                SHA-256:7BDC781AEF31D1304CB898A0C061418A5AC52A3BD1263CF893012088C7E24243
                                                SHA-512:F59B047A09981122BCF12A796027AD064C898332BB42421BF3BC3374A75E6EF0B8F8F14F1FA58751D2B43F669881A61258CCC3B0D65BF352C8494DBC6F4F5340
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.6.4.2.6.2.0.8.0.7.7.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.6.4.2.7.2.3.6.1.3.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.9.2.e.9.e.5.3.-.3.0.9.1.-.4.5.c.3.-.a.6.b.1.-.e.2.0.1.d.e.4.1.f.2.9.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.7.b.a.4.d.a.-.f.7.2.e.-.4.6.b.1.-.8.d.0.8.-.6.0.5.e.e.0.4.e.0.6.5.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.0.0.-.0.0.0.1.-.0.0.1.4.-.9.1.3.a.-.5.7.3.6.4.2.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 14:40:16 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):44482
                                                Entropy (8bit):1.9136058928091428
                                                Encrypted:false
                                                SSDEEP:192:fkpI0QBUYA6eO5H46HTJSh2gegTGK03AeI2x+Qn5:M7QBUwZ5HNHcegKTAeWQn
                                                MD5:F4FAAB0C7E77F91FE1F390FE90B6D76F
                                                SHA1:6B1B032010A7B80E4E80C042EA6B04E6712A06AE
                                                SHA-256:44EA82163F45229BE3B6C9845EF18681536687BD09D2374513D45DE34114200E
                                                SHA-512:73F13DF4BDE786DF24E4EF1828986C9EB66FA9F646AB3C2FCEFA64CA7094CA624FF37510369D6D651922122C5709A3E7E6165D366CF1BCDBCAADAAE38F3A4F9E
                                                Malicious:false
                                                Preview:MDMP..a..... .......PR.e........................4...............|(..........T.......8...........T......................................................................................................................eJ......T.......GenuineIntel............T.......p...OR.e.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 14:40:16 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):41606
                                                Entropy (8bit):2.003216266983777
                                                Encrypted:false
                                                SSDEEP:192:fkF2QBUPA6OO5H4+m3aVmycg57fXUPhL5zEZI:MF2QBUbJ5Hrmycq78PhkI
                                                MD5:79B6839E11D07F254C8A2487D7491FD3
                                                SHA1:E97255B78C6B7FD2E43D034FFE4C2A455187DC6E
                                                SHA-256:EA98C5FEFF74D49760E3100FB624488E63A1BE2A5A0DF4D4493101825574BB3F
                                                SHA-512:3413FC0281E6012A1889701EA1C8BB7209391797E1198ACAAAD1CA06C5C15551C31FEF76889B9B3693BF375B26853E2C3FEDFF65599A1BB6B9F0E3AC8536C285
                                                Malicious:false
                                                Preview:MDMP..a..... .......PR.e........................4...............|(..........T.......8...........T......................................................................................................................eJ......T.......GenuineIntel............T.......`...OR.e.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8270
                                                Entropy (8bit):3.691434301913823
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJljh6IQl6YHr6igmfT73Dprt89bq9sfSHOm:R6lXJZh6IQl6YL6igmfT73kq2fq
                                                MD5:63626F3A7E52DC6C511CF7CF5A4D7426
                                                SHA1:D9F3C0D4B61CCCE3180EED58CD0A6A1F6A21FCC6
                                                SHA-256:A8222E7D07F6F429EA135CE28D4885AB171FF2434AF0C00025D599D874EE6F5A
                                                SHA-512:D31D1372CCADCFC49F2FA361BB71714C0CD02DC32A9E3371FF0EF74D5603BE36503A5770F542AF6033DE9CF4B98E16DEECCC461D227894DC10127F5D474F135A
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.0.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8262
                                                Entropy (8bit):3.6916520780216944
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJCjk6IQo6YKQ6CgmfT73DprY89bqjsfxOm:R6lXJ0k6IQo6YN6CgmfT737qIfB
                                                MD5:EF1E3EFFCBC4F3638F60363363CBB5B8
                                                SHA1:312944955CDEE480ECB70D15CFED27DC3A0FB8B1
                                                SHA-256:E30A46FD02B0AB8E5B21E9278477D70D702F9C30B209793F03C0AFED9AB8C10A
                                                SHA-512:D4E3E8BE3D3D7648F9FDD876D2ABA91C6AFAD4AD13F4BF59B4884F912BB912A4CFEDBEEF88E5AF65F3D9A2D9EC11656E1CE2658FE5BD075E4396FAA45BC5CB7F
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.3.6.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4652
                                                Entropy (8bit):4.45524215086991
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsFiJg77aI9Z+WpW8VYVYm8M4JCdPsFl+q8/CSGScSrd:uIjfyI7j/7VhJRGJ3rd
                                                MD5:8D65CCE7A076BB1DAA1ADEB1AE64ADCB
                                                SHA1:99D7613860590CE04E4DD01E450FAC6C1D8291F7
                                                SHA-256:F834CC990339053F718773C4970E57F551ABCB2A589A072A4CC9E8CB74964502
                                                SHA-512:C429A1E1041C20CD83BCBDBA9CED3BE03BB9A19A75636AAEB7D5F27BEBBABBC912C89CA3244EACB1625C2833FA6B9DFFFC8071E7D68E78B287758893D3643BEE
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240822" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4652
                                                Entropy (8bit):4.4571387114883905
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsFiJg77aI9Z+WpW8VYFYm8M4JCdPsFi+q8/CzGScSgd:uIjfyI7j/7VZJWPJ3gd
                                                MD5:906BA3F1352C02A744D631B2A924B0F4
                                                SHA1:E9ACDEA73E91948ED6BB96B65B7DA9F52381AD44
                                                SHA-256:DBE916F396941DF344ABDD9576FA5900F46A939CDDA4CCDC197F18752353A278
                                                SHA-512:6A5612945C39BB117ED0A3493E740DE06844453801FE5B6BA8A12C1064D887273DEDD77343BE6A363600C515D3B4CD3C27418DCEE2A2E391B62BBE1C89E87E03
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240822" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 14:40:26 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):41446
                                                Entropy (8bit):2.0152169867690217
                                                Encrypted:false
                                                SSDEEP:192:VkJwQBU+A6lXO5H4WHDHt+3ZHSIQwrS9CMIeAAS9R:eJwQBUSg5HPBIHRQkS9+dAS
                                                MD5:EA563DF2337F511E12182C45ED58E2B8
                                                SHA1:2CA83AA6742ABDB879ECC48523318E21AEC621A2
                                                SHA-256:9EF59072F0048F84D37DBD907B5F7C868C743B36113408FEC18378A45D63CFF1
                                                SHA-512:96A41EB0E285421D1E40340BA7BE8E062E5459090981A9CF1675DC1715D57263489A58AD5D755067E2979BA4511A2EE935692AB153A72D9BAC27E8FBC6D03FE4
                                                Malicious:false
                                                Preview:MDMP..a..... .......ZR.e........................4...............|(..........T.......8...........T...............N.......................................................................................................eJ......T.......GenuineIntel............T...........XR.e.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 14:40:26 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):44070
                                                Entropy (8bit):1.9084622428371156
                                                Encrypted:false
                                                SSDEEP:192:VkfdQBUeA6XEXO5H4LFsIyUKg0g+Vvxw/:efdQBUy55H4GUKp5w/
                                                MD5:C67885E656764EBDC4FE68F8E1CC7CE7
                                                SHA1:4D74C5193F81EE8304A5B0305DE65938E31627FF
                                                SHA-256:10C898E3F1D312E4956CFFBD66D4C3070471A69782BCAB39F105C1E84C259103
                                                SHA-512:D93027BBE31076D0300D196E9D71FB72C6AD1385CF8DAA902FF4DB2E16E4E898FD1A11F5F243DE29A8992907AB215EA760193596826CD2B38D47503F0739E4BE
                                                Malicious:false
                                                Preview:MDMP..a..... .......ZR.e........................4...............|(..........T.......8...........T.......................................................................................................................eJ......T.......GenuineIntel............T...........XR.e.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8288
                                                Entropy (8bit):3.6915361991192523
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJd06IQrS7t6YHa6f8gmfTRJTG3Dpra89bZFsf81Tm:R6lXJe6IQe7t6Y66EgmfTRJi3NZef8s
                                                MD5:33DEB296812A89AD79C72ECE1DAEF644
                                                SHA1:A47E029E3FD7DF7EC76D0896DD4F0A18F45DE973
                                                SHA-256:3003954DB92E9858B7A702BC7E14A2BE98A527AB9B3155D1E316772E58473ABB
                                                SHA-512:CA645FF6584559DDD73729D2B7695148E069D26562305F0755302A7CDA1CA6A307D1D61B1056D774B3ECC72A3D16048C9AE135B4B70F158E166F1FF9DA7746F2
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.6.0.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4656
                                                Entropy (8bit):4.459350849309811
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsjJg77aI9Z+WpW8VYdYm8M4JCdPPFo+q8/ahJGScSwd:uIjf9I7j/7VpJzJJJ3wd
                                                MD5:5C3B958AFFA2FDE0DF4A6F53A86520BD
                                                SHA1:C8B79791A09324F90DA502D2986D2358EEB8E3A2
                                                SHA-256:410A18C1D00122862B553A6D57241B498F173CFE1FEB1443CADFC307F84570C2
                                                SHA-512:1C713DAFB875CFDFF62884A9BE642E915D80327673C714BBD43A56033E34221FF3C391F5F1D0AE725423634A580407169243CFDAACB6E2B1ACFBAA4864E4E254
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240823" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8284
                                                Entropy (8bit):3.689632985672657
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJ+V6IQw6YHj6f8gmfT73Dpr189bZcsf06Tm:R6lXJc6IQw6YD6EgmfT73MZvfK
                                                MD5:D0B4C5E0819F651EC1723EDD484E48AE
                                                SHA1:82A15AB0E5A736130C9D49E287B41C422E62E1ED
                                                SHA-256:4D1CDC06F57B6306B003390765E73AE3C9979FB6FED6FF35378C2221751B00A8
                                                SHA-512:372133F4979E8316D4E0329767A2A8AA7444AB38A639C31F682397BB12BE5CF291361A03F16358ED8E0617A17D04BE4241D54934377819F450CC17D944562ECF
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.3.6.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4652
                                                Entropy (8bit):4.455520517610147
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsjJg77aI9Z+WpW8VY9Ym8M4JCdPsFL+q8/CPGScS4d:uIjf9I7j/7VBJPDJ34d
                                                MD5:CEFD9F87E167400C8E55339EF205030B
                                                SHA1:4F21027128201F904DC96C5BD7C203C6800478FB
                                                SHA-256:E376499F8046B9DE87D7998E471F69C87C29BE7528DFF527E66540B94DB3356A
                                                SHA-512:5E1F5D3C86C7E116E77A3A3EA01CE45635EF839F95268D081066650F433B50445EB13C4D4A6AE0BB49DC3AF50179D0E205083391A4606802F8F6197CBC9FD2EF
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240823" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):9728
                                                Entropy (8bit):6.1880911690664036
                                                Encrypted:false
                                                SSDEEP:192:Yjtr1Et860Vu6tAo2j+feMnkqtDXuulsa7k0yRlm7/Pdl:AtU8Zu6K+feJCuwsL00la/Pd
                                                MD5:780D14604D49E3C634200C523DEF8351
                                                SHA1:E208EF6F421D2260070A9222F1F918F1DE0A8EEB
                                                SHA-256:844EB66A10B848D3A71A8C63C35F0A01550A46D2FF8503E2CA8947978B03B4D2
                                                SHA-512:A49C030F11DA8F0CDC4205C86BEC00653EC2F8899983CAD9D7195FD23255439291AAEC5A7E128E1A103EFD93B8566E86F15AF89EBA4EFEBF9DEBCE14A7A5564B
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: (x64bit.)_patch.exe, Detection: malicious, Browse
                                                • Filename: (x64bit.)_patch.exe, Detection: malicious, Browse
                                                • Filename: wb31oyhUxK.exe, Detection: malicious, Browse
                                                • Filename: wb31oyhUxK.exe, Detection: malicious, Browse
                                                • Filename: ABLETON PATCHER.exe, Detection: malicious, Browse
                                                • Filename: Patch.exe, Detection: malicious, Browse
                                                • Filename: y3EXL3p857.exe, Detection: malicious, Browse
                                                • Filename: adobe.cs6.all.products.activator.exe, Detection: malicious, Browse
                                                • Filename: (x64bit.)_patch.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Qn....t...t...t...t...t../f...t...g...t.Rich..t.........................PE..L...<..G...........!.........,...............0......................................................................p2......`0..<............................p.......................................................0..\............................text...|........................... ..`.rdata..+....0......................@..@.data...n"...@......................@....reloc.......p......."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.466236487843889
                                                Encrypted:false
                                                SSDEEP:6144:yIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:3XD94+WlLZMM6YFHT+G
                                                MD5:8B0263C086B522580FE9611E6E6DB8E2
                                                SHA1:608A72174F3FDF77E6522C20304523194273DD75
                                                SHA-256:EE43FAE69F704EC8FDD1EE50A35DFA818577BC7872D57E13257D858977BB82E3
                                                SHA-512:C45F6ACA51C49574CB7ADBA842D88ADB999E71F5609E1833C95C80842688317715922BB8B365644B0FA4EB11A0C88C1FC9AD935CAF3DB76CAD52D3AC4688F75D
                                                Malicious:false
                                                Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Q1By..............................................................................................................................................................................................................................................................................................................................................b.G.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):43
                                                Entropy (8bit):2.873975431849053
                                                Encrypted:false
                                                SSDEEP:3:NNAb/Xs6Iu9v:fj6Iu9v
                                                MD5:0DFC49F33913C29D911693F804AA4B7B
                                                SHA1:4231F9731BA16E024959470640151B69AA58DF6E
                                                SHA-256:187FEF245C6F38EF8899AF96C28C1F6227AC0F86288B651B0CF938CB09A15A77
                                                SHA-512:82A090D26D81F44A5B2356BA1EFCA91A9623772F2CB8688A59AF4C4221C3D626B5E63B952377F9ECA49A04E81AB754BF369C42F23CA587DEF0646BAE5C967852
                                                Malicious:false
                                                Preview:.. /help : show help menu..
                                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):5.978636454243838
                                                TrID:
                                                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                • Generic Win/DOS Executable (2004/3) 0.20%
                                                • DOS Executable Generic (2002/1) 0.20%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:dup2patcher.dll
                                                File size:845'312 bytes
                                                MD5:1e4c47cb43d537d50a60592b42345da9
                                                SHA1:0433554c251dc75b8ba4251663aa1a3bce641306
                                                SHA256:6f8650fa49a74fbbabb51f1cced99d11732c177ecb1049ec59ebc79b16daf1ed
                                                SHA512:d6e316cf0a45f479d84ba74917407220ba9421f9edd656835487fb6ccb79f7bbf78a44e885d1f9c440cb5ac4387f3f9b943b505148efc34fd73db22f83b03288
                                                SSDEEP:12288:dc2ldltF9jWPSOF94sd0WLOpK2AAYuoUwwZS9ss:oXF94sdzLOA2quFZSe
                                                TLSH:F6050A1A2E45795FE25840310EFC8A385164BEA54E7A27B33408BD7DE7F3DE22E95B04
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........bd..............! .....n#.......u.......................u.......u.......u.......u......Rich............................PE..L..
                                                Icon Hash:3a4d4e4b4d4dc524
                                                Entrypoint:0x100020e0
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x10000000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x50D4CDC6 [Fri Dec 21 20:59:50 2012 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:83020f15ee2bf91778ac579a3da17a47
                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                add esp, FFFFFC00h
                                                cmp dword ptr [ebp+0Ch], 01h
                                                jne 00007FB49C889D7Dh
                                                push dword ptr [ebp+08h]
                                                pop dword ptr [1000D8A2h]
                                                jmp 00007FB49C889D78h
                                                cmp dword ptr [ebp+0Ch], 00000000h
                                                jne 00007FB49C889D72h
                                                mov eax, 00000001h
                                                leave
                                                retn 000Ch
                                                call 00007FB49C88BD8Dh
                                                ret
                                                mov eax, dword ptr [1000D8A6h]
                                                ret
                                                lea esp, dword ptr [esp+00000000h]
                                                lea esp, dword ptr [esp+00h]
                                                push ebp
                                                mov ebp, esp
                                                add esp, FFFFFFF0h
                                                push esi
                                                push edi
                                                push ebx
                                                lea edi, dword ptr [ebp-10h]
                                                push edi
                                                push dword ptr [ebp+08h]
                                                call 00007FB49C889DC0h
                                                xor ebx, ebx
                                                jmp 00007FB49C889D95h
                                                jmp 00007FB49C889DA2h
                                                cmp byte ptr [esi], 00000018h
                                                jne 00007FB49C889D8Eh
                                                push 00000010h
                                                lea eax, dword ptr [esi+01h]
                                                push eax
                                                push edi
                                                call 00007FB49C889DF9h
                                                or eax, eax
                                                je 00007FB49C889D7Eh
                                                mov eax, esi
                                                add eax, 11h
                                                pop ebx
                                                pop edi
                                                pop esi
                                                leave
                                                retn 0004h
                                                inc ebx
                                                push ebx
                                                push dword ptr [1000D8A2h]
                                                call 00007FB49C8890A7h
                                                mov esi, eax
                                                or esi, esi
                                                jne 00007FB49C889D3Eh
                                                xor eax, eax
                                                pop ebx
                                                pop edi
                                                pop esi
                                                leave
                                                retn 0004h
                                                lea esp, dword ptr [esp+00000000h]
                                                nop
                                                push ebp
                                                mov ebp, esp
                                                push esi
                                                push edi
                                                push ebx
                                                push dword ptr [ebp+08h]
                                                call 00007FB49C88E877h
                                                mov ebx, eax
                                                cmp ebx, 00000000h
                                                jbe 00007FB49C889D9Eh
                                                call 00007FB49C892153h
                                                push ebx
                                                push dword ptr [ebp+08h]
                                                call 00007FB49C89218Ah
                                                call 00007FB49C8921E5h
                                                Programming Language:
                                                • [IMP] VS2010 build 30319
                                                • [ASM] VS2010 build 30319
                                                • [EXP] VS2010 build 30319
                                                • [RES] VS2010 build 30319
                                                • [LNK] VS2010 build 30319
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0xbe700x1a2.rdata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb2500x8c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xc2008.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000x848.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0xb0000x244.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x984a0x9a00630036cb54e7f57d038ff4e758d19300False0.4360541801948052data6.469679413749833IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rdata0xb0000x10120x12009d9e0caf081d12bd2054b1f9f8747760False0.4123263888888889data4.894290260501196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xd0000x157b80xa0080e4d51bc569aa91cd637e3c92bafcc8False0.37890625data4.928521806064837IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x230000xc20080xc2200e4d2f23758b25ecefe459da9623fc9f1False0.26892883733097234data5.88629001180517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .reloc0xe60000x95a0xa00229327a048e1470575c5f96c41498a2aFalse0.731640625data6.124819387518312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_CURSOR0x23ac00x134data0.37012987012987014
                                                RT_BITMAP0x23bf40x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.6151385927505331
                                                RT_BITMAP0x23fa00x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.6876332622601279
                                                RT_BITMAP0x2434c0x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.6780383795309168
                                                RT_BITMAP0x246f80x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.6631130063965884
                                                RT_BITMAP0x24aa40x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.6257995735607675
                                                RT_BITMAP0x24e500x3aaDevice independent bitmap graphic, 18 x 16 x 24, image size 898, resolution 11808 x 11808 px/m0.5895522388059702
                                                RT_BITMAP0x251fc0x2226Device independent bitmap graphic, 99 x 29 x 24, image size 8702, resolution 11808 x 11808 px/m0.44623655913978494
                                                RT_BITMAP0x274240x2226Device independent bitmap graphic, 99 x 29 x 24, image size 8702, resolution 11808 x 11808 px/m0.5518188057652711
                                                RT_BITMAP0x2964c0x2226Device independent bitmap graphic, 99 x 29 x 24, image size 8702, resolution 11808 x 11808 px/m0.2981011210249371
                                                RT_BITMAP0x2b8740x2576Device independent bitmap graphic, 102 x 31 x 24, image size 9550, resolution 11808 x 11808 px/m0.49290928050052135
                                                RT_BITMAP0x2ddec0x2576Device independent bitmap graphic, 102 x 31 x 24, image size 9550, resolution 11808 x 11808 px/m0.4760166840458811
                                                RT_BITMAP0x303640x2576Device independent bitmap graphic, 102 x 31 x 24, image size 9550, resolution 11808 x 11808 px/m0.5982273201251304
                                                RT_BITMAP0x328dc0x2576Device independent bitmap graphic, 102 x 31 x 24, image size 9550, resolution 11808 x 11808 px/m0.34254431699687177
                                                RT_BITMAP0x34e540x10aaDevice independent bitmap graphic, 64 x 22 x 24, image size 4226, resolution 3779 x 3779 px/m0.28504453820909514
                                                RT_BITMAP0x35f000x10aaDevice independent bitmap graphic, 64 x 22 x 24, image size 4226, resolution 3779 x 3779 px/m0.3295827473042663
                                                RT_BITMAP0x36fac0x10aaDevice independent bitmap graphic, 64 x 22 x 24, image size 4226, resolution 3779 x 3779 px/m0.2222222222222222
                                                RT_BITMAP0x380580x1fed6Device independent bitmap graphic, 270 x 161 x 24, image size 130734, resolution 2834 x 2834 px/m0.0772018902840014
                                                RT_BITMAP0x57f300x7ec1cDevice independent bitmap graphic, 395 x 437 x 24, image size 0, resolution 2835 x 2835 px/m0.27483647793896715
                                                RT_ICON0xd6b4c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.21265560165975103
                                                RT_DIALOG0xd90f40x2acdata0.5014619883040936
                                                RT_DIALOG0xd93a00xd8dBase III DBT, next free block index 42949017610.5879629629629629
                                                RT_DIALOG0xd94780xbcdata0.7606382978723404
                                                RT_STRING0xd95340x204data0.4903100775193798
                                                RT_STRING0xd97380x290data0.44359756097560976
                                                RT_STRING0xd99c80x2fcdata0.38089005235602097
                                                RT_STRING0xd9cc40xc4data0.4387755102040816
                                                RT_RCDATA0xd9d880x1d0data0.6745689655172413
                                                RT_RCDATA0xd9f580x490data0.10702054794520548
                                                RT_RCDATA0xda3e80x100data0.46484375
                                                RT_RCDATA0xda4e80x220data0.34191176470588236
                                                RT_RCDATA0xda7080xa0data0.575
                                                RT_RCDATA0xda7a80xc0data0.84375
                                                RT_RCDATA0xda8680x750data0.18856837606837606
                                                RT_RCDATA0xdafb80x7927data0.4366274383362889
                                                RT_RCDATA0xe28e00x2605data0.657864995376554
                                                RT_RCDATA0xe4ee80x30data0.3333333333333333
                                                RT_RCDATA0xe4f180x8ISO-8859 text, with no line terminators1.5
                                                RT_RCDATA0xe4f200x20data0.65625
                                                RT_RCDATA0xe4f400xa0data0.10625
                                                RT_GROUP_CURSOR0xe4fe00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                RT_GROUP_ICON0xe4ff40x14data1.15
                                                DLLImport
                                                user32.dllShowWindow, SetWindowTextA, SetWindowRgn, SetWindowPos, TrackPopupMenu, SetTimer, SetFocus, SetDlgItemTextA, SetClassLongA, UpdateWindow, SetWindowLongA, SetCapture, SendMessageA, ReleaseCapture, RegisterClassExA, RedrawWindow, PtInRect, OffsetRect, MessageBoxA, LoadStringA, LoadIconA, LoadCursorA, LoadBitmapA, IsDlgButtonChecked, InvalidateRect, IntersectRect, GetWindowRect, GetWindowLongA, GetSystemMetrics, CloseClipboard, EmptyClipboard, OpenClipboard, SetClipboardData, GetClientRect, MoveWindow, GetSysColor, GetParent, GetKeyState, GetDlgItemTextA, GetDlgItem, GetDlgCtrlID, GetDC, GetCursorPos, GetCapture, GetActiveWindow, EndDialog, EnableWindow, DrawTextA, DialogBoxParamA, DefWindowProcA, CreateWindowExA, CreatePopupMenu, CheckDlgButton, CallWindowProcA, AppendMenuA
                                                kernel32.dllFindFirstFileA, GetStdHandle, WriteFile, FlushFileBuffers, CompareStringA, CreateDirectoryA, GlobalAlloc, GlobalLock, GlobalUnlock, FindClose, lstrlenW, lstrlenA, lstrcpyA, lstrcmpiA, lstrcmpA, lstrcatA, WideCharToMultiByte, WaitForSingleObject, VirtualFree, VirtualAlloc, UnmapViewOfFile, CloseHandle, CopyFileA, CreateFileA, CreateFileMappingA, CreateProcessA, CreateThread, DeleteFileA, ExpandEnvironmentStringsA, FindResourceA, FreeLibrary, GetCommandLineA, GetCurrentDirectoryA, GetFileAttributesA, GetFileSize, GetFileTime, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetSystemInfo, GetTempPathA, GetVersionExA, LoadLibraryA, LoadResource, MapViewOfFile, MoveFileA, MultiByteToWideChar, RtlMoveMemory, RtlZeroMemory, SetCurrentDirectoryA, SetEndOfFile, SetEnvironmentVariableA, SetFileAttributesA, SetFilePointer, SetFileTime, SizeofResource, Sleep
                                                shell32.dllShellExecuteA, ShellExecuteExA
                                                gdi32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, CreateFontIndirectA, CreateSolidBrush, ExtCreateRegion, GetStockObject, GetTextExtentPointA, AddFontResourceA, TextOutA, SetTextColor, SetBkMode, SetBkColor, SelectObject, RoundRect, RemoveFontResourceA
                                                advapi32.dllRegSetValueExA, RegDeleteValueA, RegCreateKeyExA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
                                                comdlg32.dllGetOpenFileNameA, GetSaveFileNameA
                                                NameOrdinalAddress
                                                AddMsg10x100022c0
                                                CloseFileMapping20x100028d8
                                                CloseFileMapping_readonly30x100029c2
                                                GetPatcherWindowHandle40x1000210f
                                                GetPluginDataMemory50x10002120
                                                GetRegDword60x10006fa0
                                                GetRegString70x10006f00
                                                LoadFileMapping80x10002463
                                                Reg_Delete_Value90x1000a6f0
                                                SearchAndReplace100x10006740
                                                SetRegDword110x1000a740
                                                SetRegString120x1000a7a0
                                                load_patcher130x10002109
                                                write_disk_file140x10006d4c
                                                No network behavior found

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:15:40:15
                                                Start date:18/03/2024
                                                Path:C:\Windows\System32\loaddll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:loaddll32.exe "C:\Users\user\Desktop\dup2patcher.dll"
                                                Imagebase:0xae0000
                                                File size:126'464 bytes
                                                MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:1
                                                Start time:15:40:15
                                                Start date:18/03/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:2
                                                Start time:15:40:15
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:15:40:15
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,AddMsg
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:15:40:15
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",#1
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:15:40:16
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7536 -s 628
                                                Imagebase:0xf70000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:15:40:16
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 616
                                                Imagebase:0xf70000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:15:40:18
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:11
                                                Start time:15:40:21
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\dup2patcher.dll,CloseFileMapping_readonly
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:12
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",AddMsg
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:13
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:14
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",CloseFileMapping_readonly
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:15
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",write_disk_file
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:16
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",load_patcher
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:17
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegString
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:18
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SetRegDword
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:19
                                                Start time:15:40:24
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",SearchAndReplace
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:22
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",Reg_Delete_Value
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:23
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",LoadFileMapping
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:24
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegString
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:25
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetRegDword
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:26
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPluginDataMemory
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:27
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe "C:\Users\user\Desktop\dup2patcher.dll",GetPatcherWindowHandle
                                                Imagebase:0x150000
                                                File size:61'440 bytes
                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:30
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7936 -s 624
                                                Imagebase:0xf70000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:31
                                                Start time:15:40:25
                                                Start date:18/03/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 624
                                                Imagebase:0xf70000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:0.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:3.1%
                                                  Total number of Nodes:1274
                                                  Total number of Limit Nodes:1
                                                  execution_graph 3801 6cd74817 3802 6cd74920 3801->3802 3803 6cd728d8 22 API calls 3802->3803 3804 6cd7492b 3803->3804 3805 6cd74953 LoadStringA 3804->3805 3806 6cd74931 LoadStringA 3804->3806 3807 6cd7496f 3805->3807 3806->3807 3808 6cd722c0 5 API calls 3807->3808 3810 6cd74975 3808->3810 3809 6cd74983 3810->3809 3811 6cd740fa 7 API calls 3810->3811 3811->3809 3812 6cd72115 3813 6cd72120 3812->3813 3814 6cd7149b 3 API calls 3813->3814 3815 6cd7216f 3813->3815 3814->3813 2718 6cd72dd0 2719 6cd72dea GetDlgItem GetDlgItem 2718->2719 2720 6cd73298 2718->2720 2861 6cd72ad8 LoadCursorA 2719->2861 2721 6cd7329f 2720->2721 2724 6cd732b6 2720->2724 2725 6cd73372 2720->2725 2728 6cd732bf 2724->2728 2729 6cd732c9 2724->2729 2726 6cd73377 2725->2726 2727 6cd733af 2725->2727 2726->2721 2732 6cd73386 TrackPopupMenu 2726->2732 2733 6cd733c8 GetDlgCtrlID 2727->2733 2746 6cd73556 2727->2746 2734 6cd71460 3 API calls 2728->2734 2780 6cd7366b 2728->2780 2730 6cd73320 2729->2730 2731 6cd732cf 2729->2731 2738 6cd73326 2730->2738 2739 6cd73330 2730->2739 2731->2721 2735 6cd732dc DialogBoxParamA 2731->2735 2732->2721 2740 6cd733d6 SendMessageA 2733->2740 2741 6cd733ec 2733->2741 2773 6cd73604 2734->2773 2735->2721 2742 6cd732fb 2735->2742 2736 6cd72e6e lstrcpyA CreateFontIndirectA SendMessageA 2737 6cd72eab LoadIconA SendMessageA 2736->2737 2864 6cd71460 2737->2864 2942 6cd762cd 2738->2942 2748 6cd73336 2739->2748 2749 6cd73340 2739->2749 2747 6cd73543 2740->2747 2741->2747 2750 6cd733f9 GetDlgCtrlID 2741->2750 2763 6cd73308 MessageBoxA 2742->2763 2743 6cd72e47 2743->2736 2743->2737 2751 6cd73584 2746->2751 2752 6cd7355d 2746->2752 2974 6cd73d1a 2748->2974 2749->2721 2758 6cd73353 ShowWindow ShowWindow 2749->2758 2756 6cd73407 2750->2756 2757 6cd73419 SetTextColor 2750->2757 2764 6cd735a0 2751->2764 2765 6cd73589 2751->2765 2761 6cd73566 CreateSolidBrush 2752->2761 2762 6cd73573 2752->2762 2753 6cd7362e 2994 6cd720bd 2753->2994 2754 6cd72ed9 2767 6cd72f68 CheckDlgButton 2754->2767 2778 6cd72ef6 SetWindowTextA 2754->2778 2756->2757 2772 6cd73464 2756->2772 2759 6cd73446 SetBkColor CreateSolidBrush 2757->2759 2760 6cd73430 SetBkMode GetStockObject 2757->2760 2758->2721 2759->2747 2760->2747 2761->2762 2763->2721 2770 6cd735a7 2764->2770 2771 6cd735cd 2764->2771 2983 6cd73c60 2765->2983 2870 6cd72afb GetDlgItem GetWindowRect GetDlgItem GetWindowRect IntersectRect 2767->2870 2770->2721 2776 6cd735b1 SendMessageA 2770->2776 2771->2728 2779 6cd735d4 2771->2779 2781 6cd734b5 2772->2781 2782 6cd7346a SetTextColor 2772->2782 2773->2753 2989 6cd73b6f GetModuleHandleA GetProcAddress 2773->2989 2776->2721 2868 6cd72a53 2778->2868 2779->2721 2787 6cd735e1 ShowWindow 2779->2787 2790 6cd73500 SetTextColor 2781->2790 2791 6cd734bb SetTextColor 2781->2791 2788 6cd73497 SetBkColor CreateSolidBrush 2782->2788 2789 6cd73481 SetBkMode GetStockObject 2782->2789 2787->2721 2788->2747 2789->2747 2799 6cd73517 SetBkMode GetStockObject 2790->2799 2800 6cd7352a SetBkColor CreateSolidBrush 2790->2800 2797 6cd734e5 SetBkColor CreateSolidBrush 2791->2797 2798 6cd734d2 SetBkMode GetStockObject 2791->2798 2794 6cd72f97 2795 6cd72fa0 ShowWindow 2794->2795 2796 6cd72fad 2794->2796 2795->2796 2804 6cd71460 3 API calls 2796->2804 2797->2747 2798->2747 2799->2747 2800->2747 2802 6cd72a53 2803 6cd72f16 SetDlgItemTextA 2802->2803 2806 6cd72a53 2803->2806 2805 6cd72fbc 2804->2805 2808 6cd72fd2 2805->2808 2871 6cd72a7d 2805->2871 2807 6cd72f27 SetDlgItemTextA 2806->2807 2811 6cd72a53 2807->2811 2882 6cd75afe 2808->2882 2812 6cd72f3d SetDlgItemTextA 2811->2812 2816 6cd72a53 2812->2816 2815 6cd71460 3 API calls 2824 6cd72fe6 2815->2824 2817 6cd72f4e SetDlgItemTextA 2816->2817 2820 6cd72a53 2817->2820 2819 6cd73081 GetDlgItem SetWindowLongA 2821 6cd730b3 GetDlgItem SetWindowLongA 2819->2821 2822 6cd730cf 2819->2822 2823 6cd72f5f SetDlgItemTextA 2820->2823 2821->2822 2825 6cd730f4 2822->2825 2826 6cd730d8 GetDlgItem SetWindowLongA 2822->2826 2823->2767 2824->2819 2890 6cd73c34 GetDlgItem SendMessageA 2824->2890 2893 6cd716e0 LoadBitmapA 2825->2893 2826->2825 2829 6cd73067 2891 6cd73c34 GetDlgItem SendMessageA 2829->2891 2832 6cd716e0 30 API calls 2834 6cd73137 2832->2834 2833 6cd73074 2892 6cd73c34 GetDlgItem SendMessageA 2833->2892 2836 6cd716e0 30 API calls 2834->2836 2837 6cd73156 2836->2837 2838 6cd71460 3 API calls 2837->2838 2839 6cd73165 2838->2839 2840 6cd7316f 2839->2840 2904 6cd72294 2839->2904 2842 6cd72ad8 2 API calls 2840->2842 2843 6cd7317a 6 API calls 2842->2843 2844 6cd7320f 2843->2844 2845 6cd731eb SetClassLongA GetDlgItem SetClassLongA 2843->2845 2846 6cd71460 3 API calls 2844->2846 2845->2844 2847 6cd73225 2846->2847 2848 6cd73256 2847->2848 2849 6cd73229 2847->2849 2852 6cd71460 3 API calls 2848->2852 2850 6cd73230 SetTimer 2849->2850 2851 6cd73249 2849->2851 2850->2851 2907 6cd72244 CreateThread CloseHandle 2851->2907 2853 6cd73265 2852->2853 2855 6cd73254 2853->2855 2908 6cd73ae0 2853->2908 2912 6cd76089 GetTempPathA GetCurrentDirectoryA SetCurrentDirectoryA 2855->2912 2858 6cd73277 2921 6cd738cc GetDlgItem 2858->2921 2862 6cd72af7 LoadStringA 2861->2862 2863 6cd72aec SetClassLongA 2861->2863 2862->2743 2863->2862 2865 6cd71470 2864->2865 2867 6cd7147d 2865->2867 3007 6cd7149b 2865->3007 2867->2754 2869 6cd72a6a SetDlgItemTextA 2868->2869 2869->2802 2870->2794 2872 6cd71460 3 API calls 2871->2872 2873 6cd72a97 2872->2873 2874 6cd72a9b GetTempPathA lstrcatA 2873->2874 2876 6cd72acd 2873->2876 3011 6cd76d4c CreateFileA 2874->3011 2876->2808 2877 6cd71fe3 GetTempPathA lstrcatA LoadLibraryA 2876->2877 2878 6cd72076 2877->2878 2881 6cd72029 2877->2881 2878->2808 2879 6cd7203a GetProcAddress 2880 6cd7205a FreeLibrary 2879->2880 2879->2881 2880->2878 2881->2878 2881->2879 2883 6cd7149b 3 API calls 2882->2883 2884 6cd75b0f 2883->2884 2885 6cd75b17 GetTempPathA lstrcatA 2884->2885 2886 6cd72fd7 2884->2886 2887 6cd76d4c 4 API calls 2885->2887 2886->2815 2888 6cd75b48 LoadLibraryA 2887->2888 2888->2886 2889 6cd75b56 GetProcAddress GetProcAddress GetProcAddress 2888->2889 2889->2886 2890->2829 2891->2833 2892->2819 2894 6cd7189f 2893->2894 2895 6cd716fd LoadBitmapA 2893->2895 2894->2832 2896 6cd71710 LoadBitmapA 2895->2896 2897 6cd7170d 2895->2897 2898 6cd71723 GetDlgItem 2896->2898 2899 6cd71720 2896->2899 2897->2896 2898->2894 2900 6cd71739 GetWindowRect GetWindowRect 2898->2900 2899->2898 3014 6cd718b0 GetWindowLongA GetWindowLongA 2900->3014 2903 6cd7178e 11 API calls 2903->2894 2905 6cd7229f ExtCreateRegion SetWindowRgn 2904->2905 2906 6cd722bb 2904->2906 2905->2906 2906->2840 2907->2855 2909 6cd73af5 2908->2909 2910 6cd73aea 2908->2910 2909->2855 3027 6cd73af9 GetModuleHandleA GetProcAddress 2910->3027 2918 6cd760d4 2912->2918 2913 6cd7149b 3 API calls 2913->2918 2914 6cd761ab SetCurrentDirectoryA 2914->2858 2917 6cd7149b 3 API calls 2917->2918 2918->2913 2918->2914 2919 6cd76d4c 4 API calls 2918->2919 2920 6cd76162 LoadLibraryA 2918->2920 3030 6cd72200 2918->3030 2919->2918 2920->2918 2922 6cd738ed ShowWindow 2921->2922 2923 6cd7327c SetFocus 2921->2923 2924 6cd73912 2922->2924 2924->2923 2925 6cd73923 GetWindowRect GetWindowRect 2924->2925 2926 6cd718b0 12 API calls 2925->2926 2927 6cd7397a 2926->2927 2928 6cd71460 3 API calls 2927->2928 2929 6cd73989 2928->2929 2930 6cd71460 3 API calls 2929->2930 2931 6cd739a2 RtlZeroMemory lstrcpyA 2930->2931 2933 6cd71460 3 API calls 2931->2933 2934 6cd739f9 2933->2934 2935 6cd73a7b CreateFontIndirectA 2934->2935 2936 6cd73a1a GetTempPathA lstrcatA lstrcatA 2934->2936 3039 6cd71b8b CreateThread CloseHandle 2935->3039 3034 6cd73a8f 2936->3034 2940 6cd73a71 lstrcpyA 2940->2935 2941 6cd73a6d 2941->2935 2943 6cd762df ShowWindow ShowWindow 2942->2943 2944 6cd762f9 SendMessageA LoadStringA 2942->2944 2943->2944 3051 6cd722c0 2944->3051 2947 6cd722c0 5 API calls 2968 6cd76338 2947->2968 2948 6cd7149b 3 API calls 2948->2968 2949 6cd76520 LoadStringA 2950 6cd722c0 5 API calls 2949->2950 2952 6cd76541 2950->2952 3337 6cd76577 LoadBitmapA 2952->3337 2959 6cd764ab LoadStringA 2960 6cd722c0 5 API calls 2959->2960 2960->2968 2962 6cd764de LoadStringA 2963 6cd722c0 5 API calls 2962->2963 2963->2968 2965 6cd763b9 LoadStringA 2966 6cd722c0 5 API calls 2965->2966 2966->2968 2967 6cd722c0 SendMessageA SendMessageA SendMessageA GetStdHandle WriteFile 2967->2968 2968->2948 2968->2949 2968->2959 2968->2962 2968->2965 2968->2967 2971 6cd76435 2968->2971 3058 6cd74338 2968->3058 3102 6cd74791 2968->3102 3135 6cd75b9c 2968->3135 3210 6cd75516 LoadStringA 2968->3210 3230 6cd7498e LoadStringA 2968->3230 3272 6cd74ee6 LoadStringA 2968->3272 3313 6cd75266 LoadStringA 2968->3313 3329 6cd714e6 2968->3329 3333 6cd7625c 2968->3333 2972 6cd722c0 5 API calls 2971->2972 2973 6cd7643f 2972->2973 2973->2949 2975 6cd73d24 SendMessageA 2974->2975 2976 6cd73d9c 2974->2976 2975->2976 2977 6cd73d3d VirtualAlloc 2975->2977 2976->2721 2981 6cd73d79 2977->2981 2978 6cd73d85 3523 6cd771e0 2978->3523 2979 6cd73d59 SendMessageA lstrcatA 2979->2981 2981->2978 2981->2979 2984 6cd73594 2983->2984 2985 6cd73c70 CreateSolidBrush SelectObject RoundRect 2983->2985 2986 6cd73cb5 GetDlgItemTextA SetBkMode SetTextColor DrawTextA 2985->2986 2987 6cd73ca8 OffsetRect 2985->2987 2986->2984 2988 6cd73d00 OffsetRect 2986->2988 2987->2986 2988->2984 2990 6cd73b95 GetWindowLongA SetWindowLongA 2989->2990 2991 6cd73c16 2989->2991 2992 6cd73bc1 2990->2992 2991->2753 2992->2991 2993 6cd73bff Sleep UpdateWindow 2992->2993 2993->2992 2995 6cd720de DeleteFileA 2994->2995 2996 6cd720c8 FreeLibrary 2994->2996 2998 6cd73ac2 2995->2998 2996->2995 2999 6cd73642 FreeLibrary DeleteFileA 2998->2999 3000 6cd73acb RemoveFontResourceA DeleteFileA 2998->3000 3001 6cd761bc GetTempPathA 2999->3001 3000->2999 3002 6cd76251 3001->3002 3003 6cd7365c EndDialog 3002->3003 3004 6cd761e0 FreeLibrary 3002->3004 3003->2721 3005 6cd72200 lstrcatA 3004->3005 3006 6cd761fa lstrcpyA lstrcatA lstrcatA lstrcatA DeleteFileA 3005->3006 3006->3002 3008 6cd714a9 FindResourceA 3007->3008 3009 6cd714bc SizeofResource LoadResource 3008->3009 3010 6cd714ba 3008->3010 3009->3010 3010->2865 3012 6cd76d77 WriteFile FlushFileBuffers CloseHandle 3011->3012 3013 6cd76d71 3011->3013 3012->2876 3013->2876 3015 6cd71901 3014->3015 3016 6cd718d9 3014->3016 3017 6cd71920 3015->3017 3018 6cd71909 GetSystemMetrics GetSystemMetrics 3015->3018 3016->3015 3019 6cd718ed GetSystemMetrics 3016->3019 3020 6cd718f8 GetSystemMetrics 3016->3020 3021 6cd7193d 3017->3021 3022 6cd71928 GetSystemMetrics GetSystemMetrics 3017->3022 3018->3021 3019->3015 3020->3015 3023 6cd71945 GetSystemMetrics GetSystemMetrics 3021->3023 3024 6cd7195a 3021->3024 3022->3021 3023->3024 3025 6cd71772 ShowWindow 3024->3025 3026 6cd71962 GetSystemMetrics GetSystemMetrics 3024->3026 3025->2903 3026->3025 3028 6cd73b16 GetWindowLongA SetWindowLongA 3027->3028 3029 6cd73b3e 3027->3029 3028->3029 3029->2909 3031 6cd72214 3030->3031 3032 6cd7223a lstrcpyA lstrcatA lstrcatA lstrcatA 3031->3032 3033 6cd72223 lstrcatA 3031->3033 3032->2917 3033->3031 3035 6cd76d4c 4 API calls 3034->3035 3036 6cd73aa0 3035->3036 3037 6cd73aa4 lstrcpyA AddFontResourceA 3036->3037 3038 6cd73a65 3036->3038 3037->3038 3038->2940 3038->2941 3039->2923 3040 6cd71bcc 3039->3040 3041 6cd71bdf Sleep lstrlenA GetDC GetDC CreateCompatibleDC 3040->3041 3043 6cd71c1d SendMessageA 3041->3043 3044 6cd71c2a SelectObject GetTextExtentPointA 3041->3044 3043->3044 3045 6cd71de1 3044->3045 3046 6cd71c4e 14 API calls 3044->3046 3050 6cd71d49 3046->3050 3047 6cd71dd5 Sleep 3047->3050 3048 6cd71d53 BitBlt TextOutA 3048->3050 3049 6cd71d93 BitBlt 3049->3050 3050->3047 3050->3048 3050->3049 3052 6cd722ce SendMessageA SendMessageA SendMessageA 3051->3052 3053 6cd722fc 3051->3053 3052->3053 3054 6cd76d14 2 API calls 3053->3054 3055 6cd72306 3054->3055 3056 6cd76d14 2 API calls 3055->3056 3057 6cd7230e 3056->3057 3057->2947 3059 6cd7435d LoadStringA 3058->3059 3060 6cd74358 3058->3060 3062 6cd722c0 5 API calls 3059->3062 3340 6cd740cf GetModuleHandleA GetProcAddress 3060->3340 3063 6cd7437e 3062->3063 3344 6cd72463 ExpandEnvironmentStringsA ExpandEnvironmentStringsA 3063->3344 3066 6cd743a7 3071 6cd743af LoadStringA 3066->3071 3072 6cd743db LoadStringA 3066->3072 3067 6cd743fe LoadStringA 3068 6cd722c0 5 API calls 3067->3068 3075 6cd743fc 3068->3075 3069 6cd745a2 LoadStringA 3076 6cd745ec 3069->3076 3070 6cd745d0 LoadStringA 3070->3076 3073 6cd722c0 5 API calls 3071->3073 3074 6cd722c0 5 API calls 3072->3074 3099 6cd74397 3073->3099 3074->3075 3077 6cd7448a LoadStringA 3075->3077 3083 6cd74425 3075->3083 3078 6cd722c0 5 API calls 3076->3078 3079 6cd722c0 5 API calls 3077->3079 3080 6cd745f2 3078->3080 3082 6cd74488 3079->3082 3403 6cd728d8 3080->3403 3085 6cd744b4 3082->3085 3094 6cd74532 3082->3094 3086 6cd74467 LoadStringA 3083->3086 3087 6cd7443b LoadStringA 3083->3087 3392 6cd765ae 3085->3392 3091 6cd722c0 5 API calls 3086->3091 3090 6cd722c0 5 API calls 3087->3090 3088 6cd7460b 3088->2968 3090->3099 3091->3082 3093 6cd744d1 3095 6cd744d5 LoadStringA 3093->3095 3096 6cd74508 LoadStringA 3093->3096 3094->3099 3100 6cd74568 LoadStringA 3094->3100 3097 6cd722c0 5 API calls 3095->3097 3098 6cd722c0 5 API calls 3096->3098 3097->3099 3098->3099 3099->3069 3099->3070 3101 6cd722c0 5 API calls 3100->3101 3101->3099 3103 6cd747b6 LoadStringA 3102->3103 3104 6cd747b1 3102->3104 3106 6cd722c0 5 API calls 3103->3106 3105 6cd740cf 7 API calls 3104->3105 3105->3103 3107 6cd747d7 3106->3107 3108 6cd72463 51 API calls 3107->3108 3109 6cd747ec 3108->3109 3110 6cd747f0 3109->3110 3111 6cd7481c 3109->3111 3113 6cd728d8 22 API calls 3110->3113 3112 6cd74829 3111->3112 3119 6cd748aa 3111->3119 3114 6cd765ae 9 API calls 3112->3114 3115 6cd747fb 3113->3115 3117 6cd74846 3114->3117 3454 6cd74616 GetSystemInfo CreateFileA 3115->3454 3120 6cd7487d LoadStringA 3117->3120 3121 6cd7484a LoadStringA 3117->3121 3118 6cd74803 3127 6cd74953 LoadStringA 3118->3127 3128 6cd74931 LoadStringA 3118->3128 3124 6cd748e9 LoadStringA 3119->3124 3125 6cd7486b 3119->3125 3123 6cd722c0 5 API calls 3120->3123 3122 6cd722c0 5 API calls 3121->3122 3122->3125 3123->3125 3126 6cd722c0 5 API calls 3124->3126 3129 6cd728d8 22 API calls 3125->3129 3126->3119 3130 6cd7496f 3127->3130 3128->3130 3129->3118 3131 6cd722c0 5 API calls 3130->3131 3132 6cd74975 3131->3132 3133 6cd74983 3132->3133 3134 6cd740fa 7 API calls 3132->3134 3133->2968 3134->3133 3136 6cd75bc0 ExpandEnvironmentStringsA ExpandEnvironmentStringsA 3135->3136 3137 6cd75bbb 3135->3137 3139 6cd75bf8 3136->3139 3138 6cd740cf 7 API calls 3137->3138 3138->3136 3140 6cd75c1b 3139->3140 3143 6cd76ea0 lstrlenA 3139->3143 3141 6cd75c27 GetModuleFileNameA 3140->3141 3142 6cd75c76 LoadStringA 3140->3142 3144 6cd75c46 3141->3144 3145 6cd722c0 5 API calls 3142->3145 3146 6cd75c07 lstrcpyA 3143->3146 3148 6cd75c5c lstrcatA lstrcpyA 3144->3148 3149 6cd75c4b lstrcatA 3144->3149 3147 6cd75c97 3145->3147 3146->3140 3150 6cd722c0 5 API calls 3147->3150 3148->3142 3149->3148 3151 6cd75c9d 3150->3151 3152 6cd75cf8 GetFileAttributesA 3151->3152 3153 6cd75cb4 lstrcpyA 3151->3153 3154 6cd75cec 3151->3154 3156 6cd75d0b 3152->3156 3186 6cd75d9b 3152->3186 3155 6cd75ccd 3153->3155 3154->3152 3188 6cd75dbe 3154->3188 3161 6cd76ea0 lstrlenA 3155->3161 3158 6cd75d14 3156->3158 3163 6cd75d1f LoadStringA MessageBoxA 3156->3163 3164 6cd75d4b 3156->3164 3157 6cd75df4 3159 6cd76d4c 4 API calls 3157->3159 3167 6cd72313 5 API calls 3158->3167 3165 6cd75e04 3159->3165 3160 6cd7603c SetEnvironmentVariableA lstrcpyA 3169 6cd7226a 3160->3169 3168 6cd75cd3 3161->3168 3162 6cd75dcf lstrcpyA 3170 6cd75de8 3162->3170 3163->3164 3164->3158 3171 6cd75d9d LoadStringA 3164->3171 3172 6cd75e3d 3165->3172 3173 6cd75e08 GetFileAttributesA 3165->3173 3166 6cd72368 10 API calls 3166->3160 3174 6cd75d6f SetFileAttributesA LoadStringA 3167->3174 3465 6cd77100 lstrcpyA GetSaveFileNameA 3168->3465 3176 6cd76060 SetEnvironmentVariableA 3169->3176 3467 6cd77170 3170->3467 3182 6cd722c0 5 API calls 3171->3182 3183 6cd75e44 SetFileAttributesA 3172->3183 3184 6cd75e71 3172->3184 3178 6cd75e17 LoadStringA 3173->3178 3173->3188 3179 6cd722c0 5 API calls 3174->3179 3180 6cd7607f 3176->3180 3181 6cd7607a 3176->3181 3185 6cd722c0 5 API calls 3178->3185 3179->3186 3180->2968 3187 6cd740fa 7 API calls 3181->3187 3182->3188 3183->3184 3189 6cd75e50 LoadStringA 3183->3189 3190 6cd76006 LoadStringA 3184->3190 3191 6cd75e7e LoadStringA 3184->3191 3185->3188 3186->3157 3186->3162 3187->3180 3188->3160 3188->3166 3193 6cd722c0 5 API calls 3189->3193 3192 6cd722c0 5 API calls 3190->3192 3194 6cd722c0 5 API calls 3191->3194 3192->3188 3193->3184 3195 6cd75e9f 3194->3195 3196 6cd75ea5 lstrcpyA 3195->3196 3197 6cd75eca 3195->3197 3198 6cd7226a 3196->3198 3199 6cd75ed6 ExpandEnvironmentStringsA 3197->3199 3200 6cd75ed2 3197->3200 3201 6cd75ebe SetCurrentDirectoryA 3198->3201 3199->3200 3202 6cd75fc4 ShellExecuteA 3200->3202 3203 6cd75efb RtlZeroMemory RtlZeroMemory lstrcpyA 3200->3203 3201->3197 3206 6cd75fd6 3202->3206 3204 6cd75f63 lstrcatA lstrcatA lstrcatA CreateProcessA WaitForSingleObject 3203->3204 3205 6cd75f2e GetCurrentDirectoryA lstrcatA lstrcatA 3203->3205 3204->3206 3205->3204 3206->3190 3207 6cd75fdf LoadStringA 3206->3207 3208 6cd722c0 5 API calls 3207->3208 3209 6cd76000 DeleteFileA 3208->3209 3209->3190 3211 6cd722c0 5 API calls 3210->3211 3212 6cd75547 GetTempPathA lstrcatA 3211->3212 3213 6cd75575 3212->3213 3214 6cd7557a VirtualAlloc 3212->3214 3215 6cd740cf 7 API calls 3213->3215 3472 6cd757a2 3214->3472 3215->3214 3217 6cd755ac 3218 6cd755f5 3217->3218 3219 6cd755bb VirtualAlloc 3217->3219 3221 6cd76d4c 4 API calls 3218->3221 3479 6cd756f6 VirtualAlloc ExpandEnvironmentStringsA 3219->3479 3222 6cd75609 3221->3222 3223 6cd75611 6 API calls 3222->3223 3224 6cd7569c VirtualFree 3222->3224 3223->3224 3225 6cd756d1 DeleteFileA 3224->3225 3226 6cd756bb VirtualFree 3224->3226 3227 6cd756e6 3225->3227 3228 6cd756eb 3225->3228 3226->3225 3229 6cd740fa 7 API calls 3227->3229 3228->2968 3229->3228 3231 6cd722c0 5 API calls 3230->3231 3232 6cd749c9 3231->3232 3233 6cd749e3 3232->3233 3234 6cd740cf 7 API calls 3232->3234 3235 6cd72463 51 API calls 3233->3235 3234->3233 3236 6cd749f4 3235->3236 3237 6cd749f8 3236->3237 3240 6cd74a1b VirtualAlloc VirtualAlloc 3236->3240 3238 6cd74ea5 LoadStringA 3237->3238 3239 6cd74e83 LoadStringA 3237->3239 3243 6cd74ec1 3238->3243 3239->3243 3241 6cd74a55 WideCharToMultiByte LoadStringA 3240->3241 3242 6cd74aa2 RtlMoveMemory 3240->3242 3244 6cd722c0 5 API calls 3241->3244 3268 6cd74a99 3242->3268 3245 6cd722c0 5 API calls 3243->3245 3244->3268 3246 6cd74ec7 3245->3246 3248 6cd74edb 3246->3248 3250 6cd740fa 7 API calls 3246->3250 3247 6cd74d74 3249 6cd728d8 22 API calls 3247->3249 3248->2968 3251 6cd74d7e SetFileAttributesA 3249->3251 3250->3248 3255 6cd74d9e MultiByteToWideChar lstrlenW 3251->3255 3259 6cd74ddf 3251->3259 3252 6cd74af3 RtlZeroMemory 3254 6cd74b11 ExpandEnvironmentStringsA 3252->3254 3252->3268 3254->3268 3255->3259 3256 6cd74b41 ExpandEnvironmentStringsA 3256->3268 3260 6cd76d4c 4 API calls 3259->3260 3261 6cd74dff 3260->3261 3262 6cd74e03 3261->3262 3263 6cd74e5d VirtualFree VirtualFree 3261->3263 3264 6cd74e12 CreateFileA 3261->3264 3262->3263 3263->3237 3264->3263 3266 6cd74e38 SetFileTime CloseHandle 3264->3266 3266->3263 3267 6cd74c31 DialogBoxParamA 3267->3268 3268->3247 3268->3252 3268->3256 3268->3267 3269 6cd74c9c RtlMoveMemory 3268->3269 3270 6cd74cb9 RtlMoveMemory RtlMoveMemory 3268->3270 3271 6cd74ce3 RtlMoveMemory RtlMoveMemory 3268->3271 3485 6cd73e20 3268->3485 3491 6cd73da0 RtlZeroMemory 3268->3491 3269->3268 3270->3268 3271->3268 3273 6cd722c0 5 API calls 3272->3273 3274 6cd74f10 3273->3274 3275 6cd74f4b 3274->3275 3276 6cd740cf 7 API calls 3274->3276 3277 6cd72463 51 API calls 3275->3277 3276->3275 3278 6cd74f5b 3277->3278 3279 6cd74f5f 3278->3279 3280 6cd74f77 LoadStringA 3278->3280 3281 6cd74f98 3278->3281 3493 6cd729c2 3279->3493 3282 6cd722c0 5 API calls 3280->3282 3285 6cd74fd5 LoadStringA 3281->3285 3286 6cd74fb2 LoadStringA 3281->3286 3294 6cd74fd3 3281->3294 3282->3281 3290 6cd722c0 5 API calls 3285->3290 3289 6cd722c0 5 API calls 3286->3289 3287 6cd7520e 3293 6cd7524f 3287->3293 3295 6cd740fa 7 API calls 3287->3295 3288 6cd751cc CreateFileA 3291 6cd75217 LoadStringA 3288->3291 3292 6cd751ed LoadStringA 3288->3292 3289->3294 3290->3294 3299 6cd722c0 5 API calls 3291->3299 3298 6cd722c0 5 API calls 3292->3298 3293->2968 3296 6cd75045 LoadStringA 3294->3296 3297 6cd75022 LoadStringA 3294->3297 3308 6cd75043 3294->3308 3295->3293 3301 6cd722c0 5 API calls 3296->3301 3300 6cd722c0 5 API calls 3297->3300 3298->3287 3303 6cd75238 CloseHandle 3299->3303 3300->3308 3301->3308 3302 6cd750ec 3302->3279 3304 6cd75170 LoadStringA 3302->3304 3305 6cd7519a LoadStringA 3302->3305 3303->3287 3306 6cd722c0 5 API calls 3304->3306 3307 6cd722c0 5 API calls 3305->3307 3306->3279 3307->3279 3308->3302 3309 6cd750ee LoadStringA 3308->3309 3311 6cd750cb LoadStringA 3308->3311 3310 6cd722c0 5 API calls 3309->3310 3310->3302 3312 6cd722c0 5 API calls 3311->3312 3312->3302 3314 6cd722c0 5 API calls 3313->3314 3315 6cd75293 lstrcpyA lstrcatA lstrcatA 3314->3315 3316 6cd722c0 5 API calls 3315->3316 3317 6cd752ce lstrcpyA 3316->3317 3318 6cd752d9 3317->3318 3319 6cd75312 3318->3319 3320 6cd753b3 3318->3320 3327 6cd75342 3318->3327 3496 6cd76fa0 3319->3496 3320->3327 3502 6cd76f00 3320->3502 3324 6cd75413 3326 6cd73e20 6 API calls 3324->3326 3325 6cd7543e 3325->3327 3328 6cd73e20 6 API calls 3325->3328 3326->3327 3327->2968 3328->3327 3330 6cd714fe 3329->3330 3331 6cd7153a 3330->3331 3508 6cd71545 lstrcpyA 3330->3508 3331->2968 3336 6cd76276 3333->3336 3334 6cd76298 GetProcAddress 3335 6cd762a9 3334->3335 3335->2968 3336->3334 3338 6cd7658f GetWindowLongA SendMessageA 3337->3338 3339 6cd7654c GetDlgItem EnableWindow RedrawWindow 3337->3339 3338->3339 3339->2721 3341 6cd740f9 3340->3341 3342 6cd740e8 3340->3342 3341->3059 3343 6cd722c0 5 API calls 3342->3343 3343->3341 3345 6cd724af 3344->3345 3346 6cd724d0 3345->3346 3423 6cd76ea0 lstrlenA 3345->3423 3347 6cd72546 LoadStringA 3346->3347 3350 6cd72505 lstrcpyA 3346->3350 3351 6cd724e4 GetModuleFileNameA 3346->3351 3348 6cd722c0 5 API calls 3347->3348 3353 6cd72567 3348->3353 3352 6cd72503 3350->3352 3351->3352 3355 6cd7252c lstrcatA lstrcpyA 3352->3355 3356 6cd7251b lstrcatA 3352->3356 3357 6cd722c0 5 API calls 3353->3357 3355->3347 3356->3355 3358 6cd72571 GetFileAttributesA 3357->3358 3389 6cd72585 3358->3389 3359 6cd725c2 CreateFileA 3359->3389 3360 6cd725e0 CreateFileA 3360->3389 3361 6cd72597 SetFileAttributesA 3364 6cd722c0 5 API calls 3361->3364 3362 6cd72605 GetFileAttributesA 3362->3389 3363 6cd7277c GetFileTime GetFileSize 3368 6cd727b6 3363->3368 3364->3389 3366 6cd726ea 3371 6cd728cd 3366->3371 3375 6cd722c0 5 API calls 3366->3375 3367 6cd7273f LoadStringA MessageBoxA 3367->3366 3367->3389 3369 6cd72804 CreateFileMappingA 3368->3369 3370 6cd727ed CreateFileMappingA 3368->3370 3373 6cd72819 3369->3373 3370->3373 3371->3066 3371->3067 3371->3099 3374 6cd7281d LoadStringA 3373->3374 3377 6cd7285e MapViewOfFile 3373->3377 3378 6cd7284e MapViewOfFile 3373->3378 3376 6cd722c0 5 API calls 3374->3376 3375->3371 3376->3366 3383 6cd7286c 3377->3383 3378->3383 3379 6cd7263c LoadStringA MessageBoxA 3379->3366 3379->3389 3380 6cd72688 lstrcpyA 3380->3389 3381 6cd72710 LoadStringA 3382 6cd722c0 5 API calls 3381->3382 3382->3389 3385 6cd72872 SetEnvironmentVariableA lstrcpyA 3383->3385 3386 6cd72870 3383->3386 3384 6cd76ea0 lstrlenA 3384->3389 3434 6cd7226a 3385->3434 3386->3374 3387 6cd7269b lstrcpyA RtlMoveMemory lstrcpyA 3387->3389 3389->3347 3389->3359 3389->3360 3389->3361 3389->3362 3389->3363 3389->3366 3389->3367 3389->3379 3389->3380 3389->3381 3389->3384 3389->3387 3425 6cd72313 IsDlgButtonChecked 3389->3425 3429 6cd76e30 RtlZeroMemory GetOpenFileNameA 3389->3429 3431 6cd72411 lstrcpyA lstrcatA DeleteFileA MoveFileA 3389->3431 3390 6cd728a9 SetEnvironmentVariableA 3390->3366 3393 6cd765bd 3392->3393 3394 6cd765fb 3393->3394 3395 6cd765c6 LoadStringA 3393->3395 3396 6cd7660f LoadStringA 3394->3396 3400 6cd76632 RtlMoveMemory RtlMoveMemory 3394->3400 3397 6cd722c0 5 API calls 3395->3397 3398 6cd722c0 5 API calls 3396->3398 3399 6cd765e7 3397->3399 3398->3399 3399->3093 3402 6cd766e8 3400->3402 3402->3093 3404 6cd729bd 3403->3404 3405 6cd728ea 3403->3405 3404->3088 3419 6cd740fa GetModuleHandleA GetProcAddress 3404->3419 3406 6cd72912 UnmapViewOfFile CloseHandle SetFilePointer SetEndOfFile CloseHandle 3405->3406 3436 6cd729ef LoadLibraryA 3405->3436 3441 6cd72368 IsDlgButtonChecked 3406->3441 3411 6cd728fc 3414 6cd722c0 5 API calls 3411->3414 3412 6cd72908 3415 6cd722c0 5 API calls 3412->3415 3413 6cd72968 CreateFileA 3413->3404 3416 6cd7298e SetFileTime CloseHandle 3413->3416 3417 6cd72906 3414->3417 3415->3406 3418 6cd722c0 5 API calls 3416->3418 3417->3406 3418->3404 3420 6cd74125 3419->3420 3421 6cd74113 3419->3421 3420->3088 3422 6cd722c0 5 API calls 3421->3422 3422->3420 3424 6cd724be lstrcpyA 3423->3424 3424->3346 3426 6cd7235c 3425->3426 3427 6cd72329 lstrcpyA lstrcatA GetFileAttributesA 3425->3427 3426->3389 3427->3426 3428 6cd7234d CopyFileA 3427->3428 3428->3426 3430 6cd76e7c 3429->3430 3430->3389 3432 6cd72459 3431->3432 3433 6cd72449 CopyFileA 3431->3433 3432->3389 3433->3432 3435 6cd7227a 3434->3435 3435->3390 3437 6cd728f8 3436->3437 3438 6cd72a0b GetProcAddress 3436->3438 3437->3411 3437->3412 3439 6cd72a47 CloseHandle 3438->3439 3440 6cd72a1c 3438->3440 3439->3437 3440->3439 3442 6cd72382 3441->3442 3443 6cd7240c SetFileAttributesA 3441->3443 3444 6cd7238d 3442->3444 3449 6cd723b4 3442->3449 3443->3404 3443->3413 3445 6cd72396 CopyFileA 3444->3445 3446 6cd723a3 3444->3446 3445->3446 3446->3443 3448 6cd723ac DeleteFileA 3446->3448 3447 6cd723d5 LoadStringA 3450 6cd722c0 5 API calls 3447->3450 3448->3443 3449->3446 3449->3447 3451 6cd723f6 3450->3451 3452 6cd722c0 5 API calls 3451->3452 3453 6cd723fc SetFileAttributesA 3452->3453 3453->3443 3455 6cd74787 3454->3455 3456 6cd74668 GetFileSize CreateFileMappingA 3454->3456 3455->3118 3457 6cd74694 3456->3457 3458 6cd7477d CloseHandle 3456->3458 3459 6cd722c0 5 API calls 3457->3459 3458->3455 3463 6cd746a1 3459->3463 3460 6cd746c2 MapViewOfFile 3461 6cd74737 3460->3461 3460->3463 3462 6cd74775 CloseHandle 3461->3462 3462->3458 3463->3460 3463->3462 3464 6cd7471f UnmapViewOfFile 3463->3464 3464->3463 3466 6cd7714a 3465->3466 3466->3154 3468 6cd77185 GetFileAttributesA 3467->3468 3471 6cd771c6 3467->3471 3469 6cd77190 3468->3469 3468->3471 3470 6cd771ad CreateDirectoryA 3469->3470 3469->3471 3470->3469 3470->3471 3471->3157 3475 6cd757bf 3472->3475 3473 6cd7587d RtlMoveMemory 3474 6cd7589a 3473->3474 3474->3217 3475->3473 3476 6cd75808 DialogBoxParamA 3475->3476 3478 6cd722c0 5 API calls 3475->3478 3476->3475 3477 6cd7582b RtlMoveMemory lstrcatA 3476->3477 3477->3475 3478->3475 3480 6cd75735 lstrcmpA 3479->3480 3481 6cd75783 VirtualFree 3479->3481 3483 6cd75778 lstrcpyA 3480->3483 3484 6cd75742 3480->3484 3482 6cd7579b 3481->3482 3482->3218 3483->3481 3484->3481 3486 6cd73e36 3485->3486 3487 6cd73e84 3485->3487 3486->3487 3488 6cd73e86 RtlZeroMemory 3486->3488 3489 6cd73e7a 3486->3489 3487->3268 3488->3487 3490 6cd722c0 5 API calls 3489->3490 3490->3487 3492 6cd73dbf 3491->3492 3492->3268 3494 6cd729ed 3493->3494 3495 6cd729cc UnmapViewOfFile CloseHandle CloseHandle 3493->3495 3494->3287 3494->3288 3495->3494 3497 6cd76faf GetVersionExA 3496->3497 3498 6cd76fce RegOpenKeyExA 3496->3498 3497->3498 3500 6cd77031 3498->3500 3501 6cd77000 RegQueryValueExA RegCloseKey 3498->3501 3500->3327 3501->3500 3503 6cd76f0f GetVersionExA 3502->3503 3504 6cd76f2e RegOpenKeyExA 3502->3504 3503->3504 3506 6cd753f3 3504->3506 3507 6cd76f60 RegQueryValueExA RegCloseKey 3504->3507 3506->3324 3506->3325 3506->3327 3507->3506 3510 6cd7156a 3508->3510 3509 6cd715d2 3509->3330 3510->3509 3511 6cd76f00 4 API calls 3510->3511 3512 6cd715a4 3511->3512 3518 6cd71607 3512->3518 3514 6cd715af 3515 6cd715be 3514->3515 3521 6cd715de lstrlenA 3514->3521 3515->3509 3516 6cd715c3 SetEnvironmentVariableA 3515->3516 3516->3509 3520 6cd7161e lstrcpyA 3518->3520 3520->3514 3522 6cd715f3 3521->3522 3522->3515 3524 6cd771f2 lstrlenA 3523->3524 3525 6cd73d8c VirtualFree 3523->3525 3524->3525 3526 6cd771fc OpenClipboard 3524->3526 3525->2976 3526->3525 3527 6cd7720a GlobalAlloc 3526->3527 3528 6cd7721c GlobalLock 3527->3528 3529 6cd77249 CloseClipboard 3527->3529 3528->3529 3530 6cd77228 lstrcpyA EmptyClipboard 3528->3530 3529->3525 3530->3529 3531 6cd7723b GlobalUnlock SetClipboardData 3530->3531 3531->3529 3816 6cd73690 3817 6cd73757 3816->3817 3818 6cd736a4 GetWindowLongA 3816->3818 3821 6cd73786 3817->3821 3824 6cd7383c 3817->3824 3845 6cd7375e 3817->3845 3819 6cd736cc 3818->3819 3820 6cd736b8 SetWindowPos 3818->3820 3822 6cd736d9 SetDlgItemTextA 3819->3822 3820->3819 3825 6cd73793 GetDlgCtrlID 3821->3825 3826 6cd73829 3821->3826 3829 6cd736ed 3822->3829 3830 6cd73709 3822->3830 3823 6cd738a8 EndDialog 3846 6cd73752 3823->3846 3827 6cd73867 3824->3827 3828 6cd73843 3824->3828 3831 6cd737e6 SetTextColor 3825->3831 3832 6cd737a1 SetTextColor 3825->3832 3835 6cd73880 3827->3835 3836 6cd7386c 3827->3836 3833 6cd7384c CreateSolidBrush 3828->3833 3834 6cd73859 3828->3834 3829->3830 3855 6cd73c34 GetDlgItem SendMessageA 3829->3855 3837 6cd716e0 30 API calls 3830->3837 3840 6cd73810 SetBkColor CreateSolidBrush 3831->3840 3841 6cd737fd SetBkMode GetStockObject 3831->3841 3838 6cd737cb SetBkColor CreateSolidBrush 3832->3838 3839 6cd737b8 SetBkMode GetStockObject 3832->3839 3833->3834 3844 6cd73887 3835->3844 3835->3845 3842 6cd73c60 9 API calls 3836->3842 3843 6cd73728 3837->3843 3838->3826 3839->3826 3840->3826 3841->3826 3848 6cd73877 3842->3848 3849 6cd71460 3 API calls 3843->3849 3844->3846 3850 6cd7388d SendMessageA 3844->3850 3845->3823 3845->3846 3851 6cd73737 3849->3851 3850->3846 3852 6cd73744 3851->3852 3854 6cd73ae0 4 API calls 3851->3854 3856 6cd77260 GetClientRect GetClientRect 3852->3856 3854->3852 3855->3830 3858 6cd7728d GetWindowRect GetWindowRect MoveWindow 3856->3858 3858->3846 3532 6cd71adb 3533 6cd71b73 DefWindowProcA 3532->3533 3561 6cd73b43 3562 6cd71460 3 API calls 3561->3562 3563 6cd73b52 3562->3563 3564 6cd73b6e 3563->3564 3565 6cd73b6f 6 API calls 3563->3565 3565->3564 3859 6cd73683 3860 6cd73690 3859->3860 3861 6cd73757 3860->3861 3862 6cd736a4 GetWindowLongA 3860->3862 3865 6cd7375e 3861->3865 3866 6cd73786 3861->3866 3869 6cd7383c 3861->3869 3863 6cd736cc 3862->3863 3864 6cd736b8 SetWindowPos 3862->3864 3867 6cd736d9 SetDlgItemTextA 3863->3867 3864->3863 3868 6cd738a8 EndDialog 3865->3868 3898 6cd73752 3865->3898 3870 6cd73793 GetDlgCtrlID 3866->3870 3871 6cd73829 3866->3871 3874 6cd736ed 3867->3874 3875 6cd73709 3867->3875 3868->3898 3872 6cd73867 3869->3872 3873 6cd73843 3869->3873 3876 6cd737e6 SetTextColor 3870->3876 3877 6cd737a1 SetTextColor 3870->3877 3880 6cd73880 3872->3880 3881 6cd7386c 3872->3881 3878 6cd7384c CreateSolidBrush 3873->3878 3879 6cd73859 3873->3879 3874->3875 3899 6cd73c34 GetDlgItem SendMessageA 3874->3899 3882 6cd716e0 30 API calls 3875->3882 3885 6cd73810 SetBkColor CreateSolidBrush 3876->3885 3886 6cd737fd SetBkMode GetStockObject 3876->3886 3883 6cd737cb SetBkColor CreateSolidBrush 3877->3883 3884 6cd737b8 SetBkMode GetStockObject 3877->3884 3878->3879 3880->3865 3889 6cd73887 3880->3889 3887 6cd73c60 9 API calls 3881->3887 3888 6cd73728 3882->3888 3883->3871 3884->3871 3885->3871 3886->3871 3891 6cd73877 3887->3891 3892 6cd71460 3 API calls 3888->3892 3893 6cd7388d SendMessageA 3889->3893 3889->3898 3894 6cd73737 3892->3894 3893->3898 3895 6cd73744 3894->3895 3897 6cd73ae0 4 API calls 3894->3897 3896 6cd77260 5 API calls 3895->3896 3896->3898 3897->3895 3899->3875 2706 6cd722c0 2707 6cd722ce SendMessageA SendMessageA SendMessageA 2706->2707 2708 6cd722fc 2706->2708 2707->2708 2713 6cd76d14 GetStdHandle 2708->2713 2710 6cd72306 2711 6cd76d14 2 API calls 2710->2711 2712 6cd7230e 2711->2712 2716 6cd76db0 2713->2716 2717 6cd76d2c WriteFile 2716->2717 2717->2710 3566 6cd7a740 RegCreateKeyExA 3567 6cd7a770 RegSetValueExA RegCloseKey 3566->3567 3568 6cd7a78f 3566->3568 3567->3568 3569 6cd760cf 3570 6cd760d4 3569->3570 3571 6cd761ab SetCurrentDirectoryA 3570->3571 3572 6cd72200 lstrcatA 3570->3572 3573 6cd7149b 3 API calls 3570->3573 3576 6cd76d4c 4 API calls 3570->3576 3577 6cd76162 LoadLibraryA 3570->3577 3574 6cd760ef lstrcpyA lstrcatA lstrcatA lstrcatA 3572->3574 3573->3570 3575 6cd7149b 3 API calls 3574->3575 3575->3570 3576->3570 3577->3570 3578 6cd7424c 3579 6cd74262 3578->3579 3604 6cd77040 lstrlenA 3579->3604 3581 6cd7426f 3582 6cd77040 2 API calls 3581->3582 3583 6cd74281 3582->3583 3584 6cd77040 2 API calls 3583->3584 3585 6cd74293 3584->3585 3586 6cd77040 2 API calls 3585->3586 3587 6cd742a8 3586->3587 3588 6cd742c5 3587->3588 3589 6cd742ac ExpandEnvironmentStringsA 3587->3589 3608 6cd770b0 3588->3608 3589->3588 3591 6cd742cd 3592 6cd77040 2 API calls 3591->3592 3593 6cd742dd 3592->3593 3594 6cd74304 3593->3594 3595 6cd742e1 ExpandEnvironmentStringsA SetEnvironmentVariableA 3593->3595 3596 6cd74325 3594->3596 3597 6cd7430d DialogBoxParamA 3594->3597 3595->3594 3598 6cd75afe 13 API calls 3596->3598 3599 6cd74334 3597->3599 3600 6cd7432a 3598->3600 3601 6cd76089 17 API calls 3600->3601 3602 6cd7432f 3601->3602 3602->3599 3603 6cd762cd 254 API calls 3602->3603 3603->3599 3605 6cd7705b 3604->3605 3607 6cd77076 3604->3607 3606 6cd77064 CompareStringA 3605->3606 3605->3607 3606->3605 3606->3607 3607->3581 3609 6cd770c0 GetModuleHandleA GetModuleFileNameA lstrlenA 3608->3609 3610 6cd770e4 SetCurrentDirectoryA 3608->3610 3609->3610 3610->3591 3612 6cd72dc9 3613 6cd72dd0 3612->3613 3614 6cd72dea GetDlgItem GetDlgItem 3613->3614 3615 6cd73298 3613->3615 3617 6cd72ad8 2 API calls 3614->3617 3616 6cd7329f 3615->3616 3619 6cd732b6 3615->3619 3620 6cd73372 3615->3620 3618 6cd72e22 LoadStringA 3617->3618 3637 6cd72e47 3618->3637 3623 6cd732c9 3619->3623 3673 6cd732bf 3619->3673 3621 6cd73377 3620->3621 3622 6cd733af 3620->3622 3621->3616 3626 6cd73386 TrackPopupMenu 3621->3626 3627 6cd733c8 GetDlgCtrlID 3622->3627 3640 6cd73556 3622->3640 3624 6cd73320 3623->3624 3625 6cd732cf 3623->3625 3632 6cd73326 3624->3632 3633 6cd73330 3624->3633 3625->3616 3629 6cd732dc DialogBoxParamA 3625->3629 3626->3616 3634 6cd733d6 SendMessageA 3627->3634 3635 6cd733ec 3627->3635 3628 6cd71460 3 API calls 3666 6cd73604 3628->3666 3629->3616 3636 6cd732fb 3629->3636 3630 6cd72e6e lstrcpyA CreateFontIndirectA SendMessageA 3631 6cd72eab LoadIconA SendMessageA 3630->3631 3638 6cd71460 3 API calls 3631->3638 3639 6cd762cd 254 API calls 3632->3639 3641 6cd73336 3633->3641 3642 6cd73340 3633->3642 3699 6cd73543 3634->3699 3643 6cd733f9 GetDlgCtrlID 3635->3643 3635->3699 3656 6cd73308 MessageBoxA 3636->3656 3637->3630 3637->3631 3647 6cd72ed9 3638->3647 3639->3616 3644 6cd73584 3640->3644 3645 6cd7355d 3640->3645 3648 6cd73d1a 14 API calls 3641->3648 3642->3616 3651 6cd73353 ShowWindow ShowWindow 3642->3651 3649 6cd73407 3643->3649 3650 6cd73419 SetTextColor 3643->3650 3657 6cd735a0 3644->3657 3658 6cd73589 3644->3658 3654 6cd73566 CreateSolidBrush 3645->3654 3655 6cd73573 3645->3655 3646 6cd7362e 3659 6cd720bd FreeLibrary 3646->3659 3660 6cd72f68 CheckDlgButton 3647->3660 3671 6cd72ef6 SetWindowTextA 3647->3671 3648->3616 3649->3650 3665 6cd73464 3649->3665 3652 6cd73446 SetBkColor CreateSolidBrush 3650->3652 3653 6cd73430 SetBkMode GetStockObject 3650->3653 3651->3616 3652->3699 3653->3699 3654->3655 3656->3616 3663 6cd735a7 3657->3663 3664 6cd735cd 3657->3664 3662 6cd73c60 9 API calls 3658->3662 3661 6cd73633 DeleteFileA 3659->3661 3756 6cd72afb GetDlgItem GetWindowRect GetDlgItem GetWindowRect IntersectRect 3660->3756 3668 6cd73ac2 2 API calls 3661->3668 3667 6cd73594 3662->3667 3663->3616 3669 6cd735b1 SendMessageA 3663->3669 3672 6cd735d4 3664->3672 3664->3673 3675 6cd734b5 3665->3675 3676 6cd7346a SetTextColor 3665->3676 3666->3646 3677 6cd73b6f 6 API calls 3666->3677 3678 6cd73642 FreeLibrary DeleteFileA 3668->3678 3669->3616 3679 6cd72a53 3671->3679 3672->3616 3681 6cd735e1 ShowWindow 3672->3681 3673->3628 3674 6cd7366b 3673->3674 3684 6cd73500 SetTextColor 3675->3684 3685 6cd734bb SetTextColor 3675->3685 3682 6cd73497 SetBkColor CreateSolidBrush 3676->3682 3683 6cd73481 SetBkMode GetStockObject 3676->3683 3677->3646 3686 6cd761bc 8 API calls 3678->3686 3687 6cd72f05 SetDlgItemTextA 3679->3687 3681->3616 3682->3699 3683->3699 3693 6cd73517 SetBkMode GetStockObject 3684->3693 3694 6cd7352a SetBkColor CreateSolidBrush 3684->3694 3691 6cd734e5 SetBkColor CreateSolidBrush 3685->3691 3692 6cd734d2 SetBkMode GetStockObject 3685->3692 3695 6cd7365c EndDialog 3686->3695 3696 6cd72a53 3687->3696 3688 6cd72f97 3689 6cd72fa0 ShowWindow 3688->3689 3690 6cd72fad 3688->3690 3689->3690 3698 6cd71460 3 API calls 3690->3698 3691->3699 3692->3699 3693->3699 3694->3699 3695->3616 3697 6cd72f16 SetDlgItemTextA 3696->3697 3701 6cd72a53 3697->3701 3700 6cd72fbc 3698->3700 3703 6cd72fd2 3700->3703 3704 6cd72a7d 9 API calls 3700->3704 3702 6cd72f27 SetDlgItemTextA 3701->3702 3706 6cd72a53 3702->3706 3705 6cd75afe 13 API calls 3703->3705 3708 6cd72fc7 3704->3708 3709 6cd72fd7 3705->3709 3707 6cd72f3d SetDlgItemTextA 3706->3707 3711 6cd72a53 3707->3711 3708->3703 3713 6cd71fe3 5 API calls 3708->3713 3710 6cd71460 3 API calls 3709->3710 3719 6cd72fe6 3710->3719 3712 6cd72f4e SetDlgItemTextA 3711->3712 3715 6cd72a53 3712->3715 3713->3703 3714 6cd73081 GetDlgItem SetWindowLongA 3716 6cd730b3 GetDlgItem SetWindowLongA 3714->3716 3717 6cd730cf 3714->3717 3718 6cd72f5f SetDlgItemTextA 3715->3718 3716->3717 3720 6cd730f4 3717->3720 3721 6cd730d8 GetDlgItem SetWindowLongA 3717->3721 3718->3660 3719->3714 3757 6cd73c34 GetDlgItem SendMessageA 3719->3757 3723 6cd716e0 30 API calls 3720->3723 3721->3720 3725 6cd73113 3723->3725 3724 6cd73067 3758 6cd73c34 GetDlgItem SendMessageA 3724->3758 3727 6cd716e0 30 API calls 3725->3727 3729 6cd73137 3727->3729 3728 6cd73074 3759 6cd73c34 GetDlgItem SendMessageA 3728->3759 3731 6cd716e0 30 API calls 3729->3731 3732 6cd73156 3731->3732 3733 6cd71460 3 API calls 3732->3733 3734 6cd73165 3733->3734 3735 6cd7316f 3734->3735 3736 6cd72294 2 API calls 3734->3736 3737 6cd72ad8 2 API calls 3735->3737 3736->3735 3738 6cd7317a 6 API calls 3737->3738 3739 6cd7320f 3738->3739 3740 6cd731eb SetClassLongA GetDlgItem SetClassLongA 3738->3740 3741 6cd71460 3 API calls 3739->3741 3740->3739 3742 6cd73225 3741->3742 3743 6cd73256 3742->3743 3744 6cd73229 3742->3744 3747 6cd71460 3 API calls 3743->3747 3745 6cd73230 SetTimer 3744->3745 3746 6cd73249 3744->3746 3745->3746 3760 6cd72244 CreateThread CloseHandle 3746->3760 3748 6cd73265 3747->3748 3750 6cd73254 3748->3750 3751 6cd73ae0 4 API calls 3748->3751 3752 6cd76089 17 API calls 3750->3752 3751->3750 3753 6cd73277 3752->3753 3754 6cd738cc 60 API calls 3753->3754 3755 6cd7327c SetFocus 3754->3755 3756->3688 3757->3724 3758->3728 3759->3714 3760->3750 3902 6cd72109 3905 6cd74126 GetVersionExA GetModuleHandleA GetProcAddress 3902->3905 3904 6cd7210e 3906 6cd74156 3905->3906 3907 6cd7415a GetCommandLineA 3905->3907 3906->3907 3908 6cd76d14 2 API calls 3907->3908 3909 6cd7416b 3908->3909 3910 6cd77040 2 API calls 3909->3910 3911 6cd74178 3910->3911 3912 6cd74180 3911->3912 3913 6cd7424e 3911->3913 3915 6cd76d14 2 API calls 3912->3915 3914 6cd76d14 2 API calls 3913->3914 3916 6cd74258 3914->3916 3917 6cd7418a 3915->3917 3919 6cd74262 3916->3919 3920 6cd76d14 2 API calls 3916->3920 3918 6cd76d14 2 API calls 3917->3918 3921 6cd74194 3918->3921 3922 6cd77040 2 API calls 3919->3922 3920->3919 3923 6cd76d14 2 API calls 3921->3923 3924 6cd7426f 3922->3924 3926 6cd7419e 3923->3926 3925 6cd77040 2 API calls 3924->3925 3927 6cd74281 3925->3927 3928 6cd76d14 2 API calls 3926->3928 3929 6cd77040 2 API calls 3927->3929 3930 6cd741a8 3928->3930 3931 6cd74293 3929->3931 3932 6cd76d14 2 API calls 3930->3932 3933 6cd77040 2 API calls 3931->3933 3934 6cd741b2 3932->3934 3935 6cd742a8 3933->3935 3936 6cd76d14 2 API calls 3934->3936 3937 6cd742c5 3935->3937 3938 6cd742ac ExpandEnvironmentStringsA 3935->3938 3939 6cd741bc 3936->3939 3941 6cd770b0 4 API calls 3937->3941 3938->3937 3940 6cd76d14 2 API calls 3939->3940 3942 6cd741c6 3940->3942 3943 6cd742cd 3941->3943 3944 6cd76d14 2 API calls 3942->3944 3945 6cd77040 2 API calls 3943->3945 3946 6cd741d0 3944->3946 3947 6cd742dd 3945->3947 3948 6cd76d14 2 API calls 3946->3948 3949 6cd74304 3947->3949 3950 6cd742e1 ExpandEnvironmentStringsA SetEnvironmentVariableA 3947->3950 3951 6cd741da 3948->3951 3953 6cd74325 3949->3953 3954 6cd7430d DialogBoxParamA 3949->3954 3950->3949 3952 6cd76d14 2 API calls 3951->3952 3955 6cd741e4 3952->3955 3956 6cd75afe 13 API calls 3953->3956 3957 6cd74334 3954->3957 3958 6cd76d14 2 API calls 3955->3958 3959 6cd7432a 3956->3959 3957->3904 3961 6cd741ee 3958->3961 3960 6cd76089 17 API calls 3959->3960 3962 6cd7432f 3960->3962 3963 6cd76d14 2 API calls 3961->3963 3962->3957 3964 6cd762cd 254 API calls 3962->3964 3965 6cd741f8 3963->3965 3964->3957 3966 6cd76d14 2 API calls 3965->3966 3967 6cd74202 3966->3967 3968 6cd76d14 2 API calls 3967->3968 3969 6cd7420c 3968->3969 3970 6cd76d14 2 API calls 3969->3970 3971 6cd74216 3970->3971 3972 6cd76d14 2 API calls 3971->3972 3973 6cd74220 3972->3973 3974 6cd76d14 2 API calls 3973->3974 3975 6cd7422a 3974->3975 3976 6cd76d14 2 API calls 3975->3976 3977 6cd74234 3976->3977 3978 6cd76d14 2 API calls 3977->3978 3979 6cd7423e 3978->3979 3980 6cd76d14 2 API calls 3979->3980 3981 6cd74248 3980->3981 3981->3904 3982 6cd74735 3988 6cd746a1 3982->3988 3983 6cd746c2 MapViewOfFile 3984 6cd74737 3983->3984 3983->3988 3985 6cd74775 CloseHandle 3984->3985 3986 6cd7477d CloseHandle 3985->3986 3987 6cd74787 3986->3987 3988->3983 3988->3985 3989 6cd7471f UnmapViewOfFile 3988->3989 3989->3988 3761 6cd7a6f0 RegCreateKeyExA 3762 6cd7a72f 3761->3762 3763 6cd7a71a RegDeleteValueA RegCloseKey 3761->3763 3763->3762 3990 6cd758b0 3991 6cd758ca GetWindowLongA 3990->3991 3992 6cd759a8 3990->3992 3993 6cd758e7 SetWindowPos 3991->3993 4011 6cd758fb 3991->4011 3994 6cd75a04 3992->3994 3995 6cd759af 3992->3995 3993->4011 3999 6cd75a0b 3994->3999 4000 6cd75a6a 3994->4000 3997 6cd759b7 GetDlgItemTextA 3995->3997 3998 6cd759e1 GetKeyState 3995->3998 3996 6cd75920 4003 6cd716e0 30 API calls 3996->4003 4004 6cd759d7 3997->4004 4005 6cd759ff 3997->4005 3998->4005 4006 6cd759ee SendMessageA 3998->4006 4007 6cd75a14 SetTextColor 3999->4007 4008 6cd75a59 3999->4008 4001 6cd75a95 4000->4001 4002 6cd75a71 4000->4002 4015 6cd75aae 4001->4015 4016 6cd75a9a 4001->4016 4012 6cd75a87 4002->4012 4013 6cd75a7a CreateSolidBrush 4002->4013 4014 6cd7593f 4003->4014 4004->4005 4017 6cd75ad6 EndDialog 4004->4017 4006->4005 4009 6cd75a3e SetBkColor CreateSolidBrush 4007->4009 4010 6cd75a2b SetBkMode GetStockObject 4007->4010 4009->4008 4010->4008 4011->3996 4030 6cd73c34 GetDlgItem SendMessageA 4011->4030 4013->4012 4019 6cd71460 3 API calls 4014->4019 4015->4004 4021 6cd75ab5 4015->4021 4020 6cd73c60 9 API calls 4016->4020 4017->4005 4022 6cd7594e 4019->4022 4023 6cd75aa5 4020->4023 4021->4005 4024 6cd75abb SendMessageA 4021->4024 4025 6cd7595b 4022->4025 4026 6cd73ae0 4 API calls 4022->4026 4024->4005 4027 6cd77260 5 API calls 4025->4027 4026->4025 4028 6cd75969 RtlMoveMemory SetWindowTextA 4027->4028 4028->4005 4030->3996 4031 6cd7633f 4052 6cd76344 4031->4052 4032 6cd76520 LoadStringA 4033 6cd722c0 5 API calls 4032->4033 4035 6cd76541 4033->4035 4034 6cd74338 88 API calls 4034->4052 4036 6cd76577 3 API calls 4035->4036 4039 6cd7654c GetDlgItem EnableWindow RedrawWindow 4036->4039 4037 6cd74791 90 API calls 4037->4052 4038 6cd75b9c 70 API calls 4038->4052 4040 6cd75516 36 API calls 4040->4052 4041 6cd7498e 103 API calls 4041->4052 4042 6cd764ab LoadStringA 4043 6cd722c0 5 API calls 4042->4043 4043->4052 4044 6cd74ee6 72 API calls 4044->4052 4045 6cd764de LoadStringA 4046 6cd722c0 5 API calls 4045->4046 4046->4052 4047 6cd75266 19 API calls 4047->4052 4048 6cd763b9 LoadStringA 4050 6cd722c0 5 API calls 4048->4050 4049 6cd7149b 3 API calls 4049->4052 4050->4052 4051 6cd722c0 SendMessageA SendMessageA SendMessageA GetStdHandle WriteFile 4051->4052 4052->4032 4052->4034 4052->4037 4052->4038 4052->4040 4052->4041 4052->4042 4052->4044 4052->4045 4052->4047 4052->4048 4052->4049 4052->4051 4053 6cd714e6 8 API calls 4052->4053 4054 6cd7625c GetProcAddress 4052->4054 4055 6cd76435 4052->4055 4053->4052 4054->4052 4056 6cd722c0 5 API calls 4055->4056 4057 6cd7643f 4056->4057 4057->4032 3764 6cd7197e 3765 6cd71993 GetWindowLongA GetWindowLongA SendMessageA SetCapture 3764->3765 3766 6cd719d2 3764->3766 3767 6cd71b73 DefWindowProcA 3765->3767 3768 6cd71ac0 3766->3768 3769 6cd719dd GetWindowRect 3766->3769 3768->3767 3771 6cd71ad4 3768->3771 3772 6cd71ae0 GetWindowLongA GetWindowLongA SendMessageA GetWindowRect 3768->3772 3770 6cd71a14 3769->3770 3773 6cd71a2c GetWindowLongA GetWindowLongA SendMessageA ReleaseCapture 3770->3773 3774 6cd71a68 3770->3774 3776 6cd71b40 3772->3776 3777 6cd71b6e ReleaseCapture 3772->3777 3773->3767 3775 6cd71a7a 3774->3775 3778 6cd71a81 SetCapture GetWindowLongA GetWindowLongA SendMessageA 3774->3778 3776->3777 3779 6cd71b4d GetParent GetDlgCtrlID SendMessageA 3776->3779 3777->3767 3778->3767 3779->3777 4058 6cd72b3e 4059 6cd72be5 4058->4059 4060 6cd72b55 4058->4060 4061 6cd72bf0 4059->4061 4066 6cd72c90 4059->4066 4062 6cd72b7e SetTextColor 4060->4062 4063 6cd72b5e SetTextColor 4060->4063 4064 6cd72bff GetParent GetActiveWindow 4061->4064 4065 6cd72ccb CallWindowProcA 4061->4065 4074 6cd72b9c SetBkMode 4062->4074 4063->4074 4068 6cd72c87 4064->4068 4069 6cd72c12 GetCursorPos GetWindowRect PtInRect 4064->4069 4066->4065 4067 6cd72ca2 ShellExecuteA 4066->4067 4067->4065 4072 6cd72c63 GetCapture 4069->4072 4073 6cd72c3a GetCapture 4069->4073 4072->4068 4078 6cd72c6c ReleaseCapture InvalidateRect 4072->4078 4073->4068 4077 6cd72c43 SetCapture InvalidateRect 4073->4077 4075 6cd72baf 4074->4075 4076 6cd72bce GetSysColor CreateSolidBrush 4074->4076 4079 6cd72bc5 GetStockObject 4075->4079 4080 6cd72bb8 CreateSolidBrush 4075->4080 4081 6cd72bdb 4076->4081 4077->4068 4078->4068 4079->4081 4080->4081 3780 6cd72ce7 3781 6cd72cee 3780->3781 3782 6cd72d4f GetDlgCtrlID 3781->3782 3785 6cd72d95 GetDlgCtrlID 3781->3785 3783 6cd72d5c CallWindowProcA GetParent InvalidateRect 3782->3783 3786 6cd72da2 CallWindowProcA 3785->3786 4086 6cd71424 4087 6cd714a9 FindResourceA 4086->4087 4091 6cd71443 4086->4091 4088 6cd714bc SizeofResource LoadResource 4087->4088 4089 6cd714ba 4087->4089 4088->4089 4090 6cd7149b 3 API calls 4090->4091 4091->4090 4092 6cd7147d 4091->4092 4093 6cd758a1 4094 6cd758b0 4093->4094 4095 6cd758ca GetWindowLongA 4094->4095 4096 6cd759a8 4094->4096 4097 6cd758e7 SetWindowPos 4095->4097 4115 6cd758fb 4095->4115 4098 6cd75a04 4096->4098 4099 6cd759af 4096->4099 4097->4115 4103 6cd75a0b 4098->4103 4104 6cd75a6a 4098->4104 4101 6cd759b7 GetDlgItemTextA 4099->4101 4102 6cd759e1 GetKeyState 4099->4102 4100 6cd75920 4107 6cd716e0 30 API calls 4100->4107 4108 6cd759d7 4101->4108 4109 6cd759ff 4101->4109 4102->4109 4110 6cd759ee SendMessageA 4102->4110 4111 6cd75a14 SetTextColor 4103->4111 4112 6cd75a59 4103->4112 4105 6cd75a95 4104->4105 4106 6cd75a71 4104->4106 4119 6cd75aae 4105->4119 4120 6cd75a9a 4105->4120 4116 6cd75a87 4106->4116 4117 6cd75a7a CreateSolidBrush 4106->4117 4118 6cd7593f 4107->4118 4108->4109 4121 6cd75ad6 EndDialog 4108->4121 4110->4109 4113 6cd75a3e SetBkColor CreateSolidBrush 4111->4113 4114 6cd75a2b SetBkMode GetStockObject 4111->4114 4113->4112 4114->4112 4115->4100 4134 6cd73c34 GetDlgItem SendMessageA 4115->4134 4117->4116 4123 6cd71460 3 API calls 4118->4123 4119->4108 4125 6cd75ab5 4119->4125 4124 6cd73c60 9 API calls 4120->4124 4121->4109 4126 6cd7594e 4123->4126 4127 6cd75aa5 4124->4127 4125->4109 4128 6cd75abb SendMessageA 4125->4128 4129 6cd7595b 4126->4129 4130 6cd73ae0 4 API calls 4126->4130 4128->4109 4131 6cd77260 5 API calls 4129->4131 4130->4129 4132 6cd75969 RtlMoveMemory SetWindowTextA 4131->4132 4132->4109 4134->4100 3788 6cd76ce0 FindFirstFileA 3789 6cd76d04 FindClose 3788->3789 3790 6cd76cfd 3788->3790 3789->3790 3791 6cd72be0 3792 6cd72ccb CallWindowProcA 3791->3792 4135 6cd7a7a0 4136 6cd7a7af GetVersionExA 4135->4136 4137 6cd7a7ce RegCreateKeyExA 4135->4137 4136->4137 4139 6cd7a834 4137->4139 4140 6cd7a80a lstrlenA RegSetValueExA RegCloseKey 4137->4140 4140->4139 3793 6cd72cee 3794 6cd72d4f GetDlgCtrlID 3793->3794 3795 6cd72cfd 3793->3795 3796 6cd72d5c CallWindowProcA GetParent InvalidateRect 3794->3796 3795->3794 3798 6cd72d95 GetDlgCtrlID 3795->3798 3799 6cd72da2 CallWindowProcA 3798->3799

                                                  Control-flow Graph

                                                  APIs
                                                  • SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                  • SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                  • SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 34e47b354545ae9a3fdeeae0527d3bf82e8d68242a8fd1481cc1b122840a3c29
                                                  • Instruction ID: db469720e09ed688d6dc72ff879014ed0e5b5a37601849d4b3ab6700d5835c74
                                                  • Opcode Fuzzy Hash: 34e47b354545ae9a3fdeeae0527d3bf82e8d68242a8fd1481cc1b122840a3c29
                                                  • Instruction Fuzzy Hash: E4E04F3128162575F93367508C43FDE65995B02B48F208120FA01B9AF0EBF0660B96FD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7 6cd76d14-6cd76d47 GetStdHandle call 6cd76db0 WriteFile
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5), ref: 6CD76D1C
                                                  • WriteFile.KERNEL32(?,?,?,?,00000000,?,000000F5), ref: 6CD76D3E
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: FileHandleWrite
                                                  • String ID:
                                                  • API String ID: 3320372497-0
                                                  • Opcode ID: d844ca47285880180042dfa4e4d52d8a159a6f81d82256ef4095a53a5612f731
                                                  • Instruction ID: b85f6b300411115457988cd7cab79f02376f76562ebcc90eee0fd9811a0fbe7a
                                                  • Opcode Fuzzy Hash: d844ca47285880180042dfa4e4d52d8a159a6f81d82256ef4095a53a5612f731
                                                  • Instruction Fuzzy Hash: A9E0B67181010DBBDF119FA4CC41DDDBBB9EB00228F108265AA24A66B0EB319B559BA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 6CD7149B: FindResourceA.KERNEL32(?,6CD71479,0000000A), ref: 6CD714B1
                                                  • GetTempPathA.KERNEL32(00000400,6CD8223D,PCRE_DLL,6CD72FD7,0000000B,6CD8463D,00000400,0000006F,?), ref: 6CD75B23
                                                  • lstrcatA.KERNEL32(6CD8223D,\pcre.dll,00000400,6CD8223D,PCRE_DLL,6CD72FD7,0000000B,6CD8463D,00000400,0000006F,?), ref: 6CD75B32
                                                    • Part of subcall function 6CD76D4C: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D67
                                                  • LoadLibraryA.KERNEL32(6CD8223D,6CD8223D,00000000,6CD8223D,\pcre.dll,00000400,6CD8223D,PCRE_DLL,6CD72FD7,0000000B,6CD8463D,00000400,0000006F,?), ref: 6CD75B4D
                                                  • GetProcAddress.KERNEL32(pcre_compile,6CD8223D), ref: 6CD75B66
                                                  • GetProcAddress.KERNEL32(pcre_exec,pcre_compile), ref: 6CD75B7B
                                                  • GetProcAddress.KERNEL32(pcre_copy_substring,pcre_exec), ref: 6CD75B90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CreateFileFindLibraryLoadPathResourceTemplstrcat
                                                  • String ID: PCRE_DLL$\pcre.dll$pcre_compile$pcre_copy_substring$pcre_exec
                                                  • API String ID: 4288541509-2867501554
                                                  • Opcode ID: 455b9bf8748a29fcfd723ce58b357d0dc9b1eccb16a59e5e41bb5e917fde6ab7
                                                  • Instruction ID: b02cd93f414d4caa3d203198e38ac6c3936634094426a2cc10f493da1ae4aa85
                                                  • Opcode Fuzzy Hash: 455b9bf8748a29fcfd723ce58b357d0dc9b1eccb16a59e5e41bb5e917fde6ab7
                                                  • Instruction Fuzzy Hash: 1CF0BD70712150A9FE316B618C5CF7E3E7AEB03B1C3500A25A601A9E70FB714A1EDA31
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetSystemInfo.KERNEL32(?,00000001,?,?), ref: 6CD7462A
                                                  • CreateFileA.KERNEL32(6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,?,00000001,?,?), ref: 6CD7465A
                                                  • GetFileSize.KERNEL32(?,?,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,?,00000001,?,?), ref: 6CD74672
                                                  • CreateFileMappingA.KERNEL32(?,00000000,00000004,00000000,00000000,00000000), ref: 6CD74687
                                                  • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD74780
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • MapViewOfFile.KERNEL32(?,00000002,?,?,?,?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911,C0000000), ref: 6CD746D0
                                                  • UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000002,?,?,?,?,?), ref: 6CD74728
                                                  • CloseHandle.KERNEL32(?,?,00000002,?,?,?,?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911), ref: 6CD74778
                                                  Strings
                                                  • trying large file patchmode, xrefs: 6CD74697
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$MessageSend$CloseCreateHandleView$InfoMappingSizeSystemUnmap
                                                  • String ID: trying large file patchmode
                                                  • API String ID: 3390188210-199533899
                                                  • Opcode ID: 4ca2900b68604bcc9cd2eff4a05b567fb5a9f58ae55ece0a18f2e9382f4e3b7a
                                                  • Instruction ID: 3cf48be314391ba75a3bbe730e357d52e78b65230f81b5ca673bffaf56c8e683
                                                  • Opcode Fuzzy Hash: 4ca2900b68604bcc9cd2eff4a05b567fb5a9f58ae55ece0a18f2e9382f4e3b7a
                                                  • Instruction Fuzzy Hash: F941F575D00208EFDF22DF94DC81BDEBBB5EF45318F20812AE111A6AA4E7746956CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(?), ref: 6CD771F3
                                                  • OpenClipboard.USER32(00000000), ref: 6CD77200
                                                  • GlobalAlloc.KERNEL32(00002042,00000000,?), ref: 6CD77213
                                                  • GlobalLock.KERNEL32(00000000,00002042,00000000,?), ref: 6CD7721F
                                                  • lstrcpyA.KERNEL32(00000000,?,00000000,00002042,00000000,?), ref: 6CD7722C
                                                  • EmptyClipboard.USER32 ref: 6CD77231
                                                  • GlobalUnlock.KERNEL32(00000000,00000000,?,00000000,00002042,00000000,?), ref: 6CD7723C
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 6CD77244
                                                  • CloseClipboard.USER32 ref: 6CD77249
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenUnlocklstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 3593921032-0
                                                  • Opcode ID: f65672604a2f745d15c385fb6336e8c6269afb21dd57a671da69c886c963b2d9
                                                  • Instruction ID: a4cf7d7743e9f1e590b877d89fa2f383462f7d04a30dc05f0a1870a15c707018
                                                  • Opcode Fuzzy Hash: f65672604a2f745d15c385fb6336e8c6269afb21dd57a671da69c886c963b2d9
                                                  • Instruction Fuzzy Hash: 2FF0F030B15625B5E63223B10C81EBF28588B0376CF312911F868EABB1EFB4CD0941B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetVersionExA.KERNEL32(?), ref: 6CD76FC0
                                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,?), ref: 6CD76FF7
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00000000,00000001,?), ref: 6CD77022
                                                  • RegCloseKey.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,?,00000000,00000001,?), ref: 6CD7702B
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValueVersion
                                                  • String ID:
                                                  • API String ID: 2996790148-0
                                                  • Opcode ID: 487ece90361f513cc7b554e11134285546270502a32006d15a53591e74668c87
                                                  • Instruction ID: 3130e1b64ebccfb29ebe90b134d9b9cdfcbe3e362581b6cb25ea7bc2f26d0791
                                                  • Opcode Fuzzy Hash: 487ece90361f513cc7b554e11134285546270502a32006d15a53591e74668c87
                                                  • Instruction Fuzzy Hash: 2801E97191010CEADF208F50CC55BEEBBB9EB05348F1041A9E608A66B0E775DA99DB72
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindResourceA.KERNEL32(?,6CD71479,0000000A), ref: 6CD714B1
                                                  • SizeofResource.KERNEL32(?,00000000,00000000), ref: 6CD714C1
                                                  • LoadResource.KERNEL32(?,?,00000000,00000000), ref: 6CD714D0
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadSizeof
                                                  • String ID:
                                                  • API String ID: 507330600-0
                                                  • Opcode ID: d8e4b73a5bfb510792406dba8f2724ca2424b7e3c8f9277ee175758128bdd159
                                                  • Instruction ID: b91d381acd28c19e95d8410a81d80f9fa3cb5bb0a0a2c6b04b48a61b8bae09ef
                                                  • Opcode Fuzzy Hash: d8e4b73a5bfb510792406dba8f2724ca2424b7e3c8f9277ee175758128bdd159
                                                  • Instruction Fuzzy Hash: EEF03070604208FADF219F61CD119AD7EB8EB0235CF208265B959E5970E7B0DA219771
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 6CD76CF3
                                                  • FindClose.KERNEL32(00000000,?,?), ref: 6CD76D05
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: 979f0add1b60af9980b8b1f71a2e6074693626d1f880305a576188f58626c3e1
                                                  • Instruction ID: 94e131d4a43d18af69be7f2e3f24b0f423b99f12af985e5e7152074dea448ab7
                                                  • Opcode Fuzzy Hash: 979f0add1b60af9980b8b1f71a2e6074693626d1f880305a576188f58626c3e1
                                                  • Instruction Fuzzy Hash: C0D05E7041050996CA3097789C46CCD72AC5B01338F100351B638D66F0EB34DA958A75
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a388c1f502f5394a2f541948c2e2502fa1042dc7c5ef02c15fa016b34946817
                                                  • Instruction ID: 8a6dafdffa3c077ff3c0cbde84db1831ee3d711357ca6056b575aaf447a71850
                                                  • Opcode Fuzzy Hash: 1a388c1f502f5394a2f541948c2e2502fa1042dc7c5ef02c15fa016b34946817
                                                  • Instruction Fuzzy Hash: C822FD8913BFB918FBC3E4258694E33D1C5AF9D04FA044D394A11EA594AF3FA68F2134
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7921d1ff2892ff33cd6d0eff7bfd4627521c2d1a2fc7140d5f4624dbbc4ab670
                                                  • Instruction ID: 1251d6f86ba852e53deb63b98707d606c20b496caad61297459ee3c8e66f7ecc
                                                  • Opcode Fuzzy Hash: 7921d1ff2892ff33cd6d0eff7bfd4627521c2d1a2fc7140d5f4624dbbc4ab670
                                                  • Instruction Fuzzy Hash: 1A22E7377A5A1F0AE7689D69CCC63B87297EBC1709F6EC3398404C6EC9E57E824E5110
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eca87fc29cf3c940f8b93fff332ec96a9ab3ca4d3fac94f6b1c79f34f08dc1db
                                                  • Instruction ID: 7441a51b013e88ad67d1cf10f9ba563122ebb3a0b5cccaf550fddceb4574c2cb
                                                  • Opcode Fuzzy Hash: eca87fc29cf3c940f8b93fff332ec96a9ab3ca4d3fac94f6b1c79f34f08dc1db
                                                  • Instruction Fuzzy Hash: 2A02407398560B4BEB1CCD26CCC1AD57393B7D42A871BD27C9829C7644EE7CE64B8640
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f15a1cd23abbcb8dc1570f1c80baec6ab94aad62574a5b7e492d7337cf3acec0
                                                  • Instruction ID: 34ac5e3880105066b88f1e16d13756d00954caf3823d96d5fbf8ab9bdbf23c6a
                                                  • Opcode Fuzzy Hash: f15a1cd23abbcb8dc1570f1c80baec6ab94aad62574a5b7e492d7337cf3acec0
                                                  • Instruction Fuzzy Hash: 61117936504601CFD731DB25C950AEEB7F8AF41708F698969D4D6E3E20F334AA96C760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 761b5e175e292ec1bb657823413b4652a7c9bc98c229b0e9673dc1eddbf72874
                                                  • Instruction ID: 86c1b4849cf05606dd644e77457a4400b7c02d76e8771ea65641cc22be9b581c
                                                  • Opcode Fuzzy Hash: 761b5e175e292ec1bb657823413b4652a7c9bc98c229b0e9673dc1eddbf72874
                                                  • Instruction Fuzzy Hash: BFC00277051440EEEE4F0B00E91A9A0BB26E708635734448EE005444A2ABB76823E900
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5ad59243ed67fd5ebd3e5a5964d2427436f1d77b68934569e614c548b996b07
                                                  • Instruction ID: d88deb7aae4bc3267eef166ebb9a50d9359ae9dcda92f38d610eaaa2bea61a9a
                                                  • Opcode Fuzzy Hash: d5ad59243ed67fd5ebd3e5a5964d2427436f1d77b68934569e614c548b996b07
                                                  • Instruction Fuzzy Hash: 3FA01273011440DDEA0B0700E915A907725E304531F34044EE0064085097571821E400
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 191 6cd75b9c-6cd75bb9 192 6cd75bc0-6cd75bf6 ExpandEnvironmentStringsA * 2 191->192 193 6cd75bbb call 6cd740cf 191->193 195 6cd75c16-6cd75c19 192->195 193->192 196 6cd75c1b-6cd75c25 195->196 197 6cd75bf8-6cd75bfb 195->197 199 6cd75c27-6cd75c49 GetModuleFileNameA call 6cd7226a 196->199 200 6cd75c76-6cd75ca0 LoadStringA call 6cd722c0 * 2 196->200 197->195 198 6cd75bfd-6cd75c14 call 6cd76ea0 lstrcpyA 197->198 198->196 207 6cd75c5c-6cd75c71 lstrcatA lstrcpyA 199->207 208 6cd75c4b-6cd75c57 lstrcatA 199->208 211 6cd75ca2-6cd75ca9 200->211 212 6cd75cab-6cd75cb2 200->212 207->200 208->207 211->212 213 6cd75cf8-6cd75d05 GetFileAttributesA 211->213 214 6cd75cb4-6cd75cec lstrcpyA call 6cd7226a call 6cd76ea0 call 6cd77100 212->214 215 6cd75cee 212->215 218 6cd75dc3-6cd75dc7 213->218 219 6cd75d0b-6cd75d12 213->219 217 6cd75cf0-6cd75cf2 214->217 215->217 217->213 221 6cd7602e-6cd76032 217->221 222 6cd75df4-6cd75e06 call 6cd76d4c 218->222 223 6cd75dc9-6cd75dcd 218->223 224 6cd75d16-6cd75d1d 219->224 225 6cd75d14 219->225 227 6cd76034-6cd76037 call 6cd72368 221->227 228 6cd7603c-6cd76078 SetEnvironmentVariableA lstrcpyA call 6cd7226a SetEnvironmentVariableA 221->228 244 6cd75e3d-6cd75e42 222->244 245 6cd75e08-6cd75e11 GetFileAttributesA 222->245 223->222 230 6cd75dcf-6cd75def lstrcpyA call 6cd7226a call 6cd77170 223->230 232 6cd75d1f-6cd75d49 LoadStringA MessageBoxA 224->232 233 6cd75d4b-6cd75d52 224->233 231 6cd75d65-6cd75d9b call 6cd72313 SetFileAttributesA LoadStringA call 6cd722c0 225->231 227->228 254 6cd7607f-6cd76086 228->254 255 6cd7607a call 6cd740fa 228->255 230->222 231->218 242 6cd75d60-6cd75d63 232->242 234 6cd75d54-6cd75d59 233->234 235 6cd75d5b 233->235 234->242 235->242 242->231 243 6cd75d9d-6cd75dbe LoadStringA call 6cd722c0 242->243 243->221 257 6cd75e44-6cd75e4e SetFileAttributesA 244->257 258 6cd75e71-6cd75e78 244->258 245->221 251 6cd75e17-6cd75e38 LoadStringA call 6cd722c0 245->251 251->221 255->254 257->258 263 6cd75e50-6cd75e6c LoadStringA call 6cd722c0 257->263 264 6cd76006-6cd76027 LoadStringA call 6cd722c0 258->264 265 6cd75e7e-6cd75ea3 LoadStringA call 6cd722c0 258->265 263->258 264->221 272 6cd75ea5-6cd75ec5 lstrcpyA call 6cd7226a SetCurrentDirectoryA 265->272 273 6cd75eca-6cd75ed0 265->273 272->273 275 6cd75ed6-6cd75ee8 ExpandEnvironmentStringsA 273->275 276 6cd75ed2-6cd75ed4 273->276 278 6cd75eee-6cd75ef5 275->278 276->278 279 6cd75fc4-6cd75fd1 ShellExecuteA 278->279 280 6cd75efb-6cd75f2c RtlZeroMemory * 2 lstrcpyA 278->280 283 6cd75fd6-6cd75fdd 279->283 281 6cd75f63-6cd75fc2 lstrcatA * 3 CreateProcessA WaitForSingleObject 280->281 282 6cd75f2e-6cd75f5e GetCurrentDirectoryA lstrcatA * 2 280->282 281->283 282->281 283->264 284 6cd75fdf-6cd76001 LoadStringA call 6cd722c0 DeleteFileA 283->284 284->264
                                                  APIs
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000400,00000001,?,00000000,?,6CD7636F,00000000,00000001,00000000,6CD90A45,00000400,00000184,00000000,00000000), ref: 6CD75BD3
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,6CD7D911,00000400,?,?,00000400,00000001,?,00000000,?,6CD7636F,00000000,00000001,00000000,6CD90A45,00000400), ref: 6CD75BE9
                                                  • lstrcpyA.KERNEL32(6CD7D911,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001,?,00000000,?,6CD7636F,00000000), ref: 6CD75C0D
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001,?,00000000), ref: 6CD75C35
                                                  • lstrcatA.KERNEL32(?,6CD7D7A9,00000000,?,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD75C57
                                                  • lstrcatA.KERNEL32(?,6CD7D911,00000000,?,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD75C64
                                                  • lstrcpyA.KERNEL32(6CD7D911,?,?,6CD7D911,00000000,?,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400), ref: 6CD75C71
                                                  • LoadStringA.USER32(00000005,6CD8E645,00000400,00000000), ref: 6CD75C88
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD75CBC
                                                  • GetFileAttributesA.KERNEL32(6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001,?,00000000), ref: 6CD75CFD
                                                  • LoadStringA.USER32(00000029,6CD8EA45,00000400,6CD7D911), ref: 6CD75D31
                                                  • MessageBoxA.USER32(6CD8EA45,6CD7D911,00000024,00000029), ref: 6CD75D44
                                                  • SetFileAttributesA.KERNEL32(6CD7D911,00000080,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD75D75
                                                  • LoadStringA.USER32(0000002A,6CD8EE45,00000400,6CD7D911), ref: 6CD75D8C
                                                    • Part of subcall function 6CD740CF: GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                    • Part of subcall function 6CD740CF: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                  • LoadStringA.USER32(0000002B,6CD8F245,00000400,6CD7D911), ref: 6CD75DAF
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD75DD7
                                                  • GetFileAttributesA.KERNEL32(6CD7D911,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?), ref: 6CD75E09
                                                  • LoadStringA.USER32(0000002B,6CD8F645,00000400,6CD7D911), ref: 6CD75E29
                                                  • SetFileAttributesA.KERNEL32(6CD7D911,00000000,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?), ref: 6CD75E46
                                                  • LoadStringA.USER32(0000002C,6CD8FA45,00000400,6CD7D911), ref: 6CD75E62
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • LoadStringA.USER32(0000002D,6CD8FE45,00000400,6CD7D911), ref: 6CD75E90
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?), ref: 6CD75EAD
                                                  • SetCurrentDirectoryA.KERNEL32(?,?,6CD7D911,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?), ref: 6CD75EC5
                                                  • ExpandEnvironmentStringsA.KERNEL32(6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?), ref: 6CD75EE3
                                                  • RtlZeroMemory.KERNEL32(?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645,00000400,00000000), ref: 6CD75F04
                                                  • RtlZeroMemory.KERNEL32(?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911,00000005,6CD8E645), ref: 6CD75F12
                                                  • lstrcpyA.KERNEL32(?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000,00000000,6CD7D911), ref: 6CD75F23
                                                  • GetCurrentDirectoryA.KERNEL32(00000400,?,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000), ref: 6CD75F3A
                                                  • lstrcatA.KERNEL32(?,?,00000400,?,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400), ref: 6CD75F4D
                                                  • lstrcatA.KERNEL32(?,6CD7D7C0,?,?,00000400,?,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D), ref: 6CD75F5E
                                                  • lstrcatA.KERNEL32(?,6CD7D911,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400,6CD7D911,00000000), ref: 6CD75F6B
                                                  • lstrcatA.KERNEL32(?,6CD7D7C2,?,6CD7D911,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400), ref: 6CD75F7C
                                                  • lstrcatA.KERNEL32(?,?,?,6CD7D7C2,?,6CD7D911,?,6CD7D7BC,?,00000010,?,00000044,6CD7D932,?,00000400,0000002D), ref: 6CD75F89
                                                  • CreateProcessA.KERNEL32(6CD7D911,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,6CD7D7C2,?,6CD7D911), ref: 6CD75FB0
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,6CD7D911,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,6CD7D7C2), ref: 6CD75FBD
                                                  • ShellExecuteA.SHELL32(00000000,open,6CD7D911,?,00000000,0000000A), ref: 6CD75FD1
                                                  • LoadStringA.USER32(0000002E,6CD90245,00000400,00000000), ref: 6CD75FF1
                                                  • DeleteFileA.KERNEL32(6CD7D911,0000002E,6CD90245,00000400,00000000,open,6CD7D911,?,00000000,0000000A,6CD7D932,?,00000400,0000002D,6CD8FE45,00000400), ref: 6CD76001
                                                  • LoadStringA.USER32(0000002F,6CD90645,00000400,6CD7D911), ref: 6CD76018
                                                  • SetEnvironmentVariableA.KERNEL32(dup2_last_file,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400,00000001), ref: 6CD76042
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,dup2_last_file,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?,?,00000400), ref: 6CD7604F
                                                  • SetEnvironmentVariableA.KERNEL32(dup2_last_path,?,?,6CD7D911,dup2_last_file,6CD7D911,00000005,6CD8E645,00000400,00000000,6CD7D911,?,?,6CD7D911,00000400,?), ref: 6CD7606C
                                                    • Part of subcall function 6CD76EA0: lstrlenA.KERNEL32(?), ref: 6CD76EAA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadString$lstrcatlstrcpy$File$Environment$AttributesMessage$ExpandSendStrings$CurrentDirectoryMemoryModuleVariableZero$AddressCreateDeleteExecuteHandleNameObjectProcProcessShellSingleWaitlstrlen
                                                  • String ID: All Files$dup2_last_file$dup2_last_path$open
                                                  • API String ID: 3369982232-2561620864
                                                  • Opcode ID: 6a4b8e9c8e3354ecb7feb0ca973ada832ff11d8a171b60aae37ada4fe36d8921
                                                  • Instruction ID: 50184f8dd6b2d587d00abe946814f60ea59b56729c01b59ab43448d0cbf4c451
                                                  • Opcode Fuzzy Hash: 6a4b8e9c8e3354ecb7feb0ca973ada832ff11d8a171b60aae37ada4fe36d8921
                                                  • Instruction Fuzzy Hash: 5DC19DB5944658B9EB319B608C89FEF73AC9B0630CF014996A314F1DF0F774964E8A36
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 287 6cd72dc9-6cd72de4 289 6cd72dea-6cd72e45 GetDlgItem * 2 call 6cd72ad8 LoadStringA 287->289 290 6cd73298-6cd7329d 287->290 298 6cd72e47-6cd72e49 289->298 299 6cd72e55-6cd72e5c 289->299 291 6cd7329f-6cd732a6 290->291 292 6cd732ab-6cd732b0 290->292 295 6cd73677-6cd73680 291->295 296 6cd732b6-6cd732bd 292->296 297 6cd73372-6cd73375 292->297 302 6cd732bf 296->302 303 6cd732c9-6cd732cd 296->303 300 6cd73377-6cd73380 297->300 301 6cd733af-6cd733b4 297->301 298->299 307 6cd72e4b-6cd72e4e 298->307 308 6cd72e65-6cd72e6c 299->308 300->295 309 6cd73386-6cd733aa TrackPopupMenu 300->309 310 6cd733b6-6cd733bb 301->310 311 6cd733c8-6cd733d4 GetDlgCtrlID 301->311 304 6cd735f5-6cd73606 call 6cd71460 302->304 305 6cd73320-6cd73324 303->305 306 6cd732cf-6cd732d6 303->306 337 6cd7362e-6cd73669 call 6cd720bd DeleteFileA call 6cd73ac2 FreeLibrary DeleteFileA call 6cd761bc EndDialog 304->337 338 6cd73608-6cd73619 call 6cd71bb2 304->338 317 6cd73326-6cd7332b call 6cd762cd 305->317 318 6cd73330-6cd73334 305->318 306->295 313 6cd732dc-6cd732f9 DialogBoxParamA 306->313 307->299 314 6cd72e50-6cd72e53 307->314 315 6cd72e6e-6cd72ea6 lstrcpyA CreateFontIndirectA SendMessageA 308->315 316 6cd72eab-6cd72edb LoadIconA SendMessageA call 6cd71460 308->316 309->295 310->311 319 6cd733bd-6cd733c2 310->319 320 6cd733d6-6cd733e7 SendMessageA 311->320 321 6cd733ec-6cd733f3 311->321 323 6cd7331b 313->323 324 6cd732fb-6cd73316 call 6cd72a53 MessageBoxA 313->324 314->299 325 6cd72e5e 314->325 315->316 356 6cd72ee1-6cd72f63 call 6cd72a53 SetWindowTextA call 6cd72a53 SetDlgItemTextA call 6cd72a53 SetDlgItemTextA call 6cd72a53 SetDlgItemTextA call 6cd72a53 SetDlgItemTextA call 6cd72a53 SetDlgItemTextA call 6cd72a53 SetDlgItemTextA 316->356 357 6cd72f68-6cd72f6f 316->357 317->295 330 6cd73336-6cd7333b call 6cd73d1a 318->330 331 6cd73340-6cd73344 318->331 319->311 328 6cd73556-6cd7355b 319->328 329 6cd7354a-6cd7354e 320->329 332 6cd73545 321->332 333 6cd733f9-6cd73405 GetDlgCtrlID 321->333 323->295 324->323 325->308 335 6cd73584-6cd73587 328->335 336 6cd7355d-6cd73564 328->336 330->295 331->295 334 6cd7334a-6cd73351 331->334 332->329 343 6cd73407-6cd7340b 333->343 344 6cd73419-6cd7342e SetTextColor 333->344 345 6cd73353-6cd73368 ShowWindow * 2 334->345 346 6cd7336d 334->346 353 6cd735a0-6cd735a5 335->353 354 6cd73589-6cd73598 call 6cd73c60 335->354 349 6cd73566-6cd73571 CreateSolidBrush 336->349 350 6cd73573 336->350 337->295 338->337 371 6cd7361b-6cd73629 call 6cd73b6f 338->371 343->344 359 6cd7340d-6cd73411 343->359 347 6cd73446-6cd7345f SetBkColor CreateSolidBrush 344->347 348 6cd73430-6cd73441 SetBkMode GetStockObject 344->348 345->346 346->295 347->329 348->329 363 6cd73578-6cd7357c 349->363 350->363 365 6cd735a7-6cd735ab 353->365 366 6cd735cd-6cd735d2 353->366 356->357 367 6cd72f71-6cd72f76 357->367 368 6cd72f78 357->368 359->344 369 6cd73413-6cd73417 359->369 365->295 374 6cd735b1-6cd735c8 SendMessageA 365->374 377 6cd735d4-6cd735db 366->377 378 6cd735f0-6cd735f3 366->378 375 6cd72f7d-6cd72f9e CheckDlgButton call 6cd72afb 367->375 368->375 369->344 370 6cd73464-6cd73468 369->370 380 6cd734b5-6cd734b9 370->380 381 6cd7346a-6cd7347f SetTextColor 370->381 371->337 374->295 394 6cd72fa0-6cd72fa8 ShowWindow 375->394 395 6cd72fad-6cd72fbe call 6cd71460 375->395 377->295 386 6cd735e1-6cd735eb ShowWindow 377->386 378->304 379 6cd7366b-6cd73674 378->379 389 6cd73500-6cd73515 SetTextColor 380->389 390 6cd734bb-6cd734d0 SetTextColor 380->390 387 6cd73497-6cd734b0 SetBkColor CreateSolidBrush 381->387 388 6cd73481-6cd73492 SetBkMode GetStockObject 381->388 386->295 387->329 388->329 398 6cd73517-6cd73528 SetBkMode GetStockObject 389->398 399 6cd7352a-6cd7353e SetBkColor CreateSolidBrush 389->399 396 6cd734e5-6cd734fe SetBkColor CreateSolidBrush 390->396 397 6cd734d2-6cd734e3 SetBkMode GetStockObject 390->397 394->395 408 6cd72fd2-6cd72fe8 call 6cd75afe call 6cd71460 395->408 409 6cd72fc0-6cd72fc9 call 6cd72a7d 395->409 396->329 397->329 404 6cd73543 398->404 399->404 404->329 422 6cd73081-6cd730b1 GetDlgItem SetWindowLongA 408->422 423 6cd72fee-6cd7304f 408->423 409->408 416 6cd72fcb-6cd72fcd call 6cd71fe3 409->416 416->408 425 6cd730b3-6cd730ca GetDlgItem SetWindowLongA 422->425 426 6cd730cf-6cd730d6 422->426 423->422 428 6cd73051-6cd73058 423->428 425->426 430 6cd730f4-6cd73167 call 6cd716e0 * 3 call 6cd71460 426->430 431 6cd730d8-6cd730ef GetDlgItem SetWindowLongA 426->431 428->422 429 6cd7305a-6cd7307c call 6cd73c34 * 3 428->429 429->422 445 6cd7316f-6cd731e9 call 6cd72ad8 CreatePopupMenu LoadStringA AppendMenuA LoadStringA AppendMenuA LoadCursorA 430->445 446 6cd73169-6cd7316a call 6cd72294 430->446 431->430 450 6cd7320f-6cd73227 call 6cd71460 445->450 451 6cd731eb-6cd7320a SetClassLongA GetDlgItem SetClassLongA 445->451 446->445 454 6cd73256-6cd73267 call 6cd71460 450->454 455 6cd73229-6cd7322e 450->455 451->450 462 6cd73272-6cd73290 call 6cd76089 call 6cd738cc SetFocus 454->462 463 6cd73269-6cd7326d call 6cd73ae0 454->463 456 6cd73230-6cd73242 SetTimer 455->456 457 6cd73249-6cd73254 call 6cd72244 455->457 456->457 457->462 463->462
                                                  APIs
                                                  • GetDlgItem.USER32(0000006F,?), ref: 6CD72DFB
                                                  • GetDlgItem.USER32(0000006A,0000006F), ref: 6CD72E0D
                                                    • Part of subcall function 6CD72AD8: LoadCursorA.USER32(00000001), ref: 6CD72AE3
                                                    • Part of subcall function 6CD72AD8: SetClassLongA.USER32(?,000000F4,00000000), ref: 6CD72AF2
                                                  • LoadStringA.USER32(0000000B,6CD8463D,00000400,0000006F), ref: 6CD72E34
                                                  • lstrcpyA.KERNEL32(6CD7D8E2,Courier New,0000000B,6CD8463D,00000400,0000006F,?), ref: 6CD72E78
                                                  • CreateFontIndirectA.GDI32(6CD7D8C6), ref: 6CD72E96
                                                  • SendMessageA.USER32(00000030,00000000,00000001,6CD7D8C6), ref: 6CD72EA6
                                                  • LoadIconA.USER32(00000000,000001F4), ref: 6CD72EB2
                                                  • SendMessageA.USER32(00000080,00000001,00000000,0000000B), ref: 6CD72EC5
                                                  • SetWindowTextA.USER32(00000000,00000000), ref: 6CD72EF8
                                                  • SetDlgItemTextA.USER32(00000000,00000065,00000000), ref: 6CD72F09
                                                  • SetDlgItemTextA.USER32(00000000,00000066,00000000), ref: 6CD72F1A
                                                  • SetDlgItemTextA.USER32(00000000,00000067,00000000), ref: 6CD72F30
                                                  • SetDlgItemTextA.USER32(00000000,00000068,00000000), ref: 6CD72F41
                                                  • SetDlgItemTextA.USER32(00000000,0000006A,00000000), ref: 6CD72F52
                                                  • SetDlgItemTextA.USER32(00000000,00000069,00000000), ref: 6CD72F63
                                                  • CheckDlgButton.USER32(0000006B,00000001,00000001), ref: 6CD72F86
                                                  • ShowWindow.USER32(00000000,00000000,0000000B,6CD8463D,00000400,0000006F,?), ref: 6CD72FA8
                                                  • GetDlgItem.USER32(00000067,6CD8463D), ref: 6CD73089
                                                  • SetWindowLongA.USER32(000000FC,6CD72B40,00000067), ref: 6CD730A0
                                                  • GetDlgItem.USER32(?,0000006A), ref: 6CD730B8
                                                  • SetWindowLongA.USER32(00000000,000000FC,6CD72CF0), ref: 6CD730C5
                                                  • GetDlgItem.USER32(?,0000006F), ref: 6CD730DD
                                                  • SetWindowLongA.USER32(00000000,000000FC,6CD72CF0), ref: 6CD730EA
                                                  • CreatePopupMenu.USER32 ref: 6CD7317A
                                                  • LoadStringA.USER32(0000000E,6CD84A3D,00000400,0000006F), ref: 6CD73198
                                                  • AppendMenuA.USER32(00000000,00000000,000000C9,6CD84A3D), ref: 6CD731AA
                                                  • LoadStringA.USER32(0000000F,6CD84E3D,00000400,0000000E), ref: 6CD731C1
                                                  • AppendMenuA.USER32(00000000,00000000,000000CA,6CD84E3D), ref: 6CD731D3
                                                  • LoadCursorA.USER32(00000002,00000000), ref: 6CD731E0
                                                  • SetClassLongA.USER32(000000F4,00000000,00000002), ref: 6CD731F4
                                                  • GetDlgItem.USER32(0000006C,000000F4), ref: 6CD73201
                                                  • SetClassLongA.USER32(00000000,000000F4,00000000), ref: 6CD7320A
                                                  • SetTimer.USER32(?,00000000,?,00000000), ref: 6CD7323D
                                                  • SetFocus.USER32(00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400,0000000E,6CD84A3D,00000400,0000006F,?), ref: 6CD73282
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Item$Text$LoadLong$Window$ClassMenuString$AppendCreateCursorMessageSend$ButtonCheckFocusFontIconIndirectPopupShowTimerlstrcpy
                                                  • String ID: BTN_ABOUT_DOWN$BTN_ABOUT_OVER$BTN_ABOUT_UP$BTN_EXIT_DOWN$BTN_EXIT_OVER$BTN_EXIT_UP$BTN_PATCH_DOWN$BTN_PATCH_OVER$BTN_PATCH_UP$Courier New
                                                  • API String ID: 131015904-1397710211
                                                  • Opcode ID: 66039db3726ec54f9417478ad8890243dbb15a37e1ef9ae93c29234bcf714975
                                                  • Instruction ID: 02a0c1a20c8d9e154e4a9f3deea6ec0a965848f991d902eccbbc9751b1cfe7f3
                                                  • Opcode Fuzzy Hash: 66039db3726ec54f9417478ad8890243dbb15a37e1ef9ae93c29234bcf714975
                                                  • Instruction Fuzzy Hash: A7B18130781660FEFF336B24CC46F9A7ABAAB4271CF004515B354B9AF0E7B2441A9675
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 469 6cd72463-6cd724ad ExpandEnvironmentStringsA * 2 470 6cd724cb-6cd724ce 469->470 471 6cd724d0-6cd724d9 470->471 472 6cd724af-6cd724b2 470->472 474 6cd72546-6cd72583 LoadStringA call 6cd722c0 * 2 GetFileAttributesA 471->474 475 6cd724db-6cd724e2 471->475 472->470 473 6cd724b4-6cd724c9 call 6cd76ea0 lstrcpyA 472->473 473->471 489 6cd72585-6cd7258c 474->489 490 6cd725b9-6cd725c0 474->490 478 6cd72505-6cd72511 lstrcpyA 475->478 479 6cd724e4-6cd72503 GetModuleFileNameA call 6cd7226a 475->479 480 6cd72516-6cd72519 478->480 479->480 484 6cd7252c-6cd72541 lstrcatA lstrcpyA 480->484 485 6cd7251b-6cd72527 lstrcatA 480->485 484->474 485->484 493 6cd72590-6cd72595 489->493 494 6cd7258e 489->494 491 6cd725c2-6cd725de CreateFileA 490->491 492 6cd725e0-6cd725f7 CreateFileA 490->492 495 6cd725fc-6cd725ff 491->495 492->495 496 6cd72597-6cd725aa SetFileAttributesA call 6cd722c0 493->496 497 6cd725af-6cd725b4 call 6cd72313 493->497 494->490 498 6cd72605-6cd72612 GetFileAttributesA 495->498 499 6cd7277c-6cd727b4 GetFileTime GetFileSize 495->499 496->497 497->490 502 6cd726ef-6cd726f6 498->502 503 6cd72618-6cd7261f 498->503 504 6cd727b6 499->504 505 6cd727b9-6cd727c0 499->505 510 6cd7273f-6cd72770 LoadStringA MessageBoxA 502->510 511 6cd726f8-6cd726ff 502->511 506 6cd72777 503->506 507 6cd72625-6cd72634 call 6cd76ea0 503->507 504->505 508 6cd727c2-6cd727d8 call 6cd76ee0 505->508 509 6cd727db-6cd727eb 505->509 513 6cd728ba-6cd728c1 506->513 527 6cd72636-6cd7263a 507->527 528 6cd7266f-6cd7267e 507->528 508->509 517 6cd72804-6cd72814 CreateFileMappingA 509->517 518 6cd727ed-6cd72802 CreateFileMappingA 509->518 510->506 512 6cd72772 510->512 511->506 516 6cd72701-6cd7270e call 6cd72411 511->516 512->474 521 6cd728c3-6cd728c8 call 6cd722c0 513->521 522 6cd728cd-6cd728d5 513->522 537 6cd72710-6cd72738 LoadStringA call 6cd722c0 516->537 538 6cd7273d 516->538 524 6cd72819-6cd7281b 517->524 518->524 521->522 525 6cd72840-6cd7284c 524->525 526 6cd7281d-6cd7283e LoadStringA call 6cd722c0 524->526 532 6cd7285e-6cd72867 MapViewOfFile 525->532 533 6cd7284e-6cd7285c MapViewOfFile 525->533 526->513 527->528 534 6cd7263c-6cd7266d LoadStringA MessageBoxA 527->534 535 6cd72680-6cd72686 call 6cd76ea0 528->535 536 6cd72688-6cd72698 lstrcpyA call 6cd76c90 528->536 542 6cd7286c-6cd7286e 532->542 533->542 534->528 543 6cd726ea 534->543 535->536 550 6cd7269b-6cd726e3 lstrcpyA RtlMoveMemory lstrcpyA call 6cd7226a call 6cd76e30 536->550 551 6cd7269a 536->551 537->474 538->506 547 6cd72872-6cd728b5 SetEnvironmentVariableA lstrcpyA call 6cd7226a SetEnvironmentVariableA 542->547 548 6cd72870 542->548 543->506 547->513 548->526 550->543 558 6cd726e5 550->558 551->550 558->474
                                                  APIs
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000400), ref: 6CD7248D
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,6CD7D911,00000400,?,?,00000400), ref: 6CD724A3
                                                  • lstrcpyA.KERNEL32(6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD724C4
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000400,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD724F2
                                                  • lstrcpyA.KERNEL32(?,6CD7E95F,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD72511
                                                  • lstrcatA.KERNEL32(?,6CD7D11A,?,6CD7E95F,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD72527
                                                  • lstrcatA.KERNEL32(?,6CD7D911,?,6CD7E95F,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD72534
                                                  • lstrcpyA.KERNEL32(6CD7D911,?,?,6CD7D911,?,6CD7E95F,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD72541
                                                  • LoadStringA.USER32(00000013,6CD8323D,00000400,6CD7D911), ref: 6CD72558
                                                  • GetFileAttributesA.KERNEL32(6CD7D911,00000013,6CD8323D,00000400,6CD7D911,00000000,6CD7D911,?,6CD7D911,00000400,?,?,00000400), ref: 6CD72576
                                                  • SetFileAttributesA.KERNEL32(6CD7D911,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD83E3D,00000400,6CD7D911,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD725A0
                                                  • CreateFileA.KERNEL32(6CD7D911,80000000,00000001,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD83E3D,00000400,6CD7D911,6CD7D911,C0000000), ref: 6CD725D9
                                                  • CreateFileA.KERNEL32(6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD7D911,00000000,6CD7D911,?,6CD7D911), ref: 6CD725F7
                                                  • GetFileAttributesA.KERNEL32(6CD7D911,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD7D911,00000000,6CD7D911,?), ref: 6CD7260A
                                                  • LoadStringA.USER32(00000010,6CD8363D,00000400,6CD7D911), ref: 6CD7264E
                                                  • MessageBoxA.USER32(6CD8363D,6CD7D911,00000034,00000010), ref: 6CD72665
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,6CD7D911,6CD7D911,6CD7D911,80000000,00000001,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD83E3D), ref: 6CD7268A
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,00000000,?,?,?,6CD7D911,6CD7D911,6CD7D911,6CD7D911,80000000,00000001,00000000,00000003,00000082,00000000), ref: 6CD726A1
                                                  • RtlMoveMemory.KERNEL32(?,Exe Files [*.exe],0000002E,6CD7D911,00000000,?,?,?,6CD7D911,6CD7D911,6CD7D911,6CD7D911,80000000,00000001,00000000,00000003), ref: 6CD726B1
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,Exe Files [*.exe],0000002E,6CD7D911,00000000,?,?,?,6CD7D911,6CD7D911,6CD7D911,6CD7D911,80000000,00000001,00000000), ref: 6CD726C3
                                                  • LoadStringA.USER32(00000011,6CD83A3D,00000400,6CD7D911), ref: 6CD72729
                                                  • LoadStringA.USER32(00000012,6CD83E3D,00000400,6CD7D911), ref: 6CD72751
                                                  • MessageBoxA.USER32(6CD83E3D,6CD7D911,00000034,00000012), ref: 6CD72768
                                                  • GetFileTime.KERNEL32(6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD7D911,00000000), ref: 6CD72796
                                                  • GetFileSize.KERNEL32(6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000,6CD7D911,00000013,6CD8323D,00000400,6CD7D911), ref: 6CD727A6
                                                  • CreateFileMappingA.KERNEL32(00000000,00000002,00000000,00000000,00000000,00000000), ref: 6CD727FD
                                                  • CreateFileMappingA.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 6CD72814
                                                  • LoadStringA.USER32(00000014,6CD8423D,00000400,00000000), ref: 6CD7282F
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD72857
                                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD72867
                                                  • SetEnvironmentVariableA.KERNEL32(dup2_last_file,6CD7D911,00000000,00000002,00000000,00000000,00000000,6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002,00000000,00000003), ref: 6CD72887
                                                  • lstrcpyA.KERNEL32(?,6CD7D911,dup2_last_file,6CD7D911,00000000,00000002,00000000,00000000,00000000,6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000002), ref: 6CD72898
                                                  • SetEnvironmentVariableA.KERNEL32(dup2_last_path,?,?,6CD7D911,dup2_last_file,6CD7D911,00000000,00000002,00000000,00000000,00000000,6CD7E51D,6CD7F181,6CD7F189,6CD7F191,6CD7D911), ref: 6CD728B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$lstrcpy$LoadString$CreateEnvironment$Attributes$ExpandMappingMessageStringsVariableViewlstrcat$MemoryModuleMoveNameSizeTime
                                                  • String ID: Exe Files [*.exe]$File not loaded$Removing readonly file attribute$dup2_last_file$dup2_last_path
                                                  • API String ID: 3117120910-276086001
                                                  • Opcode ID: 010fd31c25041235b978d731935b5b453960ae787fa3cecaffc82d5ffa8109c0
                                                  • Instruction ID: baa704ecea187231aae72a3a7d82ce32d4ce1c3c052fb8310783d59cfc4a7725
                                                  • Opcode Fuzzy Hash: 010fd31c25041235b978d731935b5b453960ae787fa3cecaffc82d5ffa8109c0
                                                  • Instruction Fuzzy Hash: 95A1D170984294F9FF319B20CC4AFDE3668AB0671CF104A16B700F9EF1EBB596498675
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • Sleep.KERNEL32(?), ref: 6CD71BEC
                                                  • lstrlenA.KERNEL32(?,?), ref: 6CD71BF4
                                                  • GetDC.USER32(?), ref: 6CD71BFE
                                                  • GetDC.USER32(00000000), ref: 6CD71C08
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 6CD71C0E
                                                  • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 6CD71C25
                                                  • SelectObject.GDI32(?,?), ref: 6CD71C2E
                                                  • GetTextExtentPointA.GDI32(?,?,?,?), ref: 6CD71C40
                                                  • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 6CD71C63
                                                  • SelectObject.GDI32(?,00000000), ref: 6CD71C6C
                                                  • RtlZeroMemory.KERNEL32(?,0000002C,?,00000000,?,?,00000000,?,?), ref: 6CD71C77
                                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 6CD71CAF
                                                  • SelectObject.GDI32(?,00000000), ref: 6CD71CB8
                                                  • GetDC.USER32(00000000), ref: 6CD71CBF
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 6CD71CC5
                                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 6CD71CDE
                                                  • SelectObject.GDI32(?,00000000), ref: 6CD71CE7
                                                  • BitBlt.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00CC0020), ref: 6CD71D07
                                                  • SetBkMode.GDI32(?,00000001), ref: 6CD71D11
                                                  • SetTextColor.GDI32(?,00000000), ref: 6CD71D1C
                                                  • GetModuleHandleA.KERNEL32(user32.dll,?,00000000,?,?,00000000,?,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?), ref: 6CD71D26
                                                  • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 6CD71D31
                                                  • BitBlt.GDI32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,00CC0020), ref: 6CD71D6C
                                                  • TextOutA.GDI32(?,-00000004,00000000,?,?), ref: 6CD71D7D
                                                  • BitBlt.GDI32(?,?,?,00000000,00000000,?,00000000,00000000,00CC0020), ref: 6CD71DAE
                                                  • Sleep.KERNEL32(0000001E,user32.dll,?,00000000,?,?,00000000,?,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 6CD71DD7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Create$ObjectSelect$CompatibleText$SectionSleep$AddressBitmapColorExtentHandleMemoryMessageModeModulePointProcSendZerolstrlen
                                                  • String ID: SetLayeredWindowAttributes$user32.dll
                                                  • API String ID: 17561160-3673630139
                                                  • Opcode ID: f5f920759abe0b31c288128c6cf39fa94c5cd013286d615469fd599b08da248e
                                                  • Instruction ID: 14a45308b56393beb1b082edeb279d707c87b3793f98781b0e0510e596f08feb
                                                  • Opcode Fuzzy Hash: f5f920759abe0b31c288128c6cf39fa94c5cd013286d615469fd599b08da248e
                                                  • Instruction Fuzzy Hash: F551D671940609FAEF319FA0CD01FEEBF76FF04704F144614A255B59B0E772A52A9B24
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 577 6cd7498e-6cd749dc LoadStringA call 6cd722c0 580 6cd749e3-6cd749f6 call 6cd72463 577->580 581 6cd749de call 6cd740cf 577->581 585 6cd74a01-6cd74a0b 580->585 586 6cd749f8-6cd749fc 580->586 581->580 588 6cd74a14-6cd74a19 585->588 589 6cd74a0d-6cd74a12 585->589 587 6cd74e7d-6cd74e81 586->587 590 6cd74ea5-6cd74ebc LoadStringA 587->590 591 6cd74e83-6cd74ea3 LoadStringA 587->591 592 6cd74a1b-6cd74a53 VirtualAlloc * 2 588->592 589->592 595 6cd74ec1-6cd74ed4 call 6cd722c0 590->595 591->595 593 6cd74a55-6cd74aa0 WideCharToMultiByte LoadStringA call 6cd722c0 592->593 594 6cd74aa2-6cd74ab6 RtlMoveMemory 592->594 597 6cd74abd-6cd74ac3 593->597 594->597 604 6cd74ed6 call 6cd740fa 595->604 605 6cd74edb-6cd74ee3 595->605 600 6cd74d6a-6cd74d6e 597->600 602 6cd74d74-6cd74d88 call 6cd728d8 600->602 603 6cd74ac8-6cd74b0f call 6cd76c90 RtlZeroMemory 600->603 611 6cd74d8d-6cd74d9c SetFileAttributesA 602->611 612 6cd74d8a 602->612 613 6cd74b11-6cd74b35 ExpandEnvironmentStringsA call 6cd76c90 603->613 614 6cd74b38-6cd74b3f 603->614 604->605 615 6cd74ddf-6cd74de7 call 6cd76c90 611->615 616 6cd74d9e-6cd74da4 611->616 612->611 613->614 618 6cd74b41-6cd74b65 ExpandEnvironmentStringsA call 6cd76c90 614->618 619 6cd74b68 614->619 632 6cd74dec-6cd74e01 call 6cd76d4c 615->632 621 6cd74da6-6cd74da9 616->621 622 6cd74dab 616->622 618->619 620 6cd74d42-6cd74d46 619->620 626 6cd74b6d-6cd74b92 call 6cd73e20 620->626 627 6cd74d4c-6cd74d67 620->627 628 6cd74dae-6cd74ddd MultiByteToWideChar lstrlenW 621->628 622->628 636 6cd74b94-6cd74b9b 626->636 637 6cd74bdc-6cd74be0 626->637 627->600 628->632 638 6cd74e03-6cd74e07 632->638 639 6cd74e09-6cd74e10 632->639 636->637 640 6cd74b9d-6cd74ba3 636->640 641 6cd74be6-6cd74bed 637->641 642 6cd74d1f-6cd74d26 637->642 645 6cd74e5d-6cd74e78 VirtualFree * 2 638->645 639->645 646 6cd74e12-6cd74e36 CreateFileA 639->646 647 6cd74ba5-6cd74bb5 call 6cd77300 640->647 648 6cd74bbe-6cd74bd0 call 6cd77300 640->648 643 6cd74bef-6cd74c17 call 6cd73da0 call 6cd76c90 641->643 644 6cd74c1a-6cd74c21 641->644 649 6cd74d3e-6cd74d3f 642->649 650 6cd74d28-6cd74d2b 642->650 643->644 653 6cd74c75-6cd74c7b 644->653 654 6cd74c23-6cd74c2f 644->654 645->587 646->645 652 6cd74e38-6cd74e58 SetFileTime CloseHandle 646->652 647->648 667 6cd74bb7 647->667 668 6cd74bd2 648->668 669 6cd74bd9 648->669 649->620 657 6cd74d31-6cd74d33 650->657 652->645 662 6cd74c81-6cd74c83 653->662 654->653 659 6cd74c31-6cd74c5b DialogBoxParamA 654->659 663 6cd74d35-6cd74d3c 657->663 664 6cd74d2d-6cd74d2e 657->664 659->653 666 6cd74c5d-6cd74c72 call 6cd76c90 659->666 670 6cd74c85-6cd74c8c 662->670 671 6cd74c7d-6cd74c7e 662->671 663->620 664->657 666->653 667->648 668->669 669->637 674 6cd74c93-6cd74c9a 670->674 675 6cd74c8e-6cd74c91 670->675 671->662 677 6cd74cb0-6cd74cb7 674->677 678 6cd74c9c-6cd74cae RtlMoveMemory 674->678 676 6cd74d02-6cd74d05 675->676 682 6cd74d07-6cd74d0d 676->682 683 6cd74d0f 676->683 680 6cd74cda-6cd74ce1 677->680 681 6cd74cb9-6cd74cd8 RtlMoveMemory * 2 677->681 678->676 680->676 684 6cd74ce3-6cd74cff RtlMoveMemory * 2 680->684 681->676 685 6cd74d16-6cd74d1d 682->685 683->685 684->676 685->620
                                                  APIs
                                                  • LoadStringA.USER32(00000006,6CD89E3D,00000400,00000001), ref: 6CD749BA
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • LoadStringA.USER32(0000000A,6CD8A63D,00000400,?), ref: 6CD74E95
                                                    • Part of subcall function 6CD740CF: GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                    • Part of subcall function 6CD740CF: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 6CD74A2A
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000000,?,00001000,00000004), ref: 6CD74A41
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00001000,00000004,00000000,?,00001000,00000004), ref: 6CD74A73
                                                  • LoadStringA.USER32(00000018,6CD8A23D,00000400,00000000), ref: 6CD74A8A
                                                  • RtlMoveMemory.KERNEL32(?,00000000,?,00001000,00000004,00000000,?,00001000,00000004), ref: 6CD74AB1
                                                  • RtlZeroMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000,?,00001000,00000004,00000000,?,00001000,00000004), ref: 6CD74B00
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,6CD7F199,00001000,?,?,?,?,?,00000000,?,?,00000000,?,00001000,00000004,00000000), ref: 6CD74B1E
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,6CD80199,00001000,?,?,?,?,?,00000000,?,?,00000000,?,00001000,00000004,00000000), ref: 6CD74B4E
                                                  • DialogBoxParamA.USER32(00000003,6CD758B0,?,?,?), ref: 6CD74C54
                                                  • RtlMoveMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CD74CA3
                                                  • RtlMoveMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CD74CBE
                                                  • RtlMoveMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD74CD0
                                                  • RtlMoveMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CD74CEA
                                                  • RtlMoveMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD74CF7
                                                  • SetFileAttributesA.KERNEL32(6CD7D911,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD74D93
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,6CD7D911,?,?,?,?,?,?,?,?,?), ref: 6CD74DC3
                                                  • lstrlenW.KERNEL32(?,00000000,00000000,?,000000FF,?,?,6CD7D911,?,?,?,?,?,?,?,?), ref: 6CD74DD1
                                                  • CreateFileA.KERNEL32(6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,6CD7D911,?,?,?,?,?), ref: 6CD74E29
                                                  • SetFileTime.KERNEL32(6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,6CD7D911,?,?), ref: 6CD74E4D
                                                  • CloseHandle.KERNEL32(6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,6CD7D911,?,?), ref: 6CD74E58
                                                  • VirtualFree.KERNEL32(?,?,00004000,6CD7D911,?,?,6CD7D911,?,?,?,?,?,?,?,?,?), ref: 6CD74E68
                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,00004000,6CD7D911,?,?,6CD7D911,?,?,?,?,?,?), ref: 6CD74E78
                                                  • LoadStringA.USER32(0000000B,6CD8AA3D,00000400,?), ref: 6CD74EB7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Memory$Move$LoadStringVirtual$FileMessageSend$AllocByteCharEnvironmentExpandFreeHandleMultiStringsWide$AddressAttributesCloseCreateDialogModuleParamProcTimeZerolstrlen
                                                  • String ID: $ <>[]|$^!%&/\(){}=?`*+-'#.:;,@~"
                                                  • API String ID: 1051299063-3390012715
                                                  • Opcode ID: 0d59b0d849fad365c9a3111b0048b8675fec0f55796926c84c9ab2c9c26b6f60
                                                  • Instruction ID: 61867794c084d466837e0c4732a368f528b0c95497f6d067376574323a51892c
                                                  • Opcode Fuzzy Hash: 0d59b0d849fad365c9a3111b0048b8675fec0f55796926c84c9ab2c9c26b6f60
                                                  • Instruction Fuzzy Hash: 62E15571D01218EEEF228FA4CD41BEEBBB5AB05308F104419F650B6AB0E7715A59DF74
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetVersionExA.KERNEL32(6CD82199,?,?,?,6CD7210E), ref: 6CD74138
                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,6CD82199,?,?,?,6CD7210E), ref: 6CD74142
                                                  • GetProcAddress.KERNEL32(00000000,AttachConsole), ref: 6CD7414D
                                                  • GetCommandLineA.KERNEL32(00000000,AttachConsole,kernel32.dll,6CD82199,?,?,?,6CD7210E), ref: 6CD7415A
                                                  Strings
                                                  • backup, xrefs: 6CD74276
                                                  • startupworkdir, xrefs: 6CD7429D
                                                  • diablo2oo2's universal patcher - console help, xrefs: 6CD74194
                                                  • /startupworkdir <dir> : set working directory for the patcher, xrefs: 6CD74216
                                                  • /help : this help menu, xrefs: 6CD741B2
                                                  • kernel32.dll, xrefs: 6CD7413D
                                                  • /silent : no window gui, no input, xrefs: 6CD741C6
                                                  • setvar, xrefs: 6CD742D2
                                                  • /help : show help menu, xrefs: 6CD7424E
                                                  • during file attachment export, xrefs: 6CD741EE
                                                  • overwrite, xrefs: 6CD74288
                                                  • AttachConsole, xrefs: 6CD74147
                                                  • /backup : make backup of every file which is patched, xrefs: 6CD74202
                                                  • /setvar <content> : set content of %dup2_cmd_var%, xrefs: 6CD7422A
                                                  • dup2_cmd_var, xrefs: 6CD742FA
                                                  • help, xrefs: 6CD7416D
                                                  • --------------------------------------------------------------------, xrefs: 6CD74180
                                                  • /overwrite : overwrite existing files, xrefs: 6CD741DA
                                                  • silent, xrefs: 6CD74264
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: AddressCommandHandleLineModuleProcVersion
                                                  • String ID: during file attachment export$ /backup : make backup of every file which is patched$ /help : show help menu$ /help : this help menu$ /overwrite : overwrite existing files$ /setvar <content> : set content of %dup2_cmd_var%$ /silent : no window gui, no input$ /startupworkdir <dir> : set working directory for the patcher$ diablo2oo2's universal patcher - console help$--------------------------------------------------------------------$AttachConsole$backup$dup2_cmd_var$help$kernel32.dll$overwrite$setvar$silent$startupworkdir
                                                  • API String ID: 919412983-4279514999
                                                  • Opcode ID: 0bd160717d9f9e9ae35b668f20045cb4b0507abaf13b4ae7a2d13df308c6d71f
                                                  • Instruction ID: c6503db3983b0258dbc6c75967caad03b4ffcd4955b7b4e335aaf229cd44d8f2
                                                  • Opcode Fuzzy Hash: 0bd160717d9f9e9ae35b668f20045cb4b0507abaf13b4ae7a2d13df308c6d71f
                                                  • Instruction Fuzzy Hash: 3731236029616674F93637B49E0AFCD1A248B4322CF260C59B214B5EB2FBB1511F45FB
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • SetTextColor.GDI32(?,?), ref: 6CD72B77
                                                  • SetTextColor.GDI32(?,00FF0000), ref: 6CD72B97
                                                  • SetBkMode.GDI32(?,00000001), ref: 6CD72BA1
                                                  • CreateSolidBrush.GDI32(?), ref: 6CD72BBE
                                                  • GetStockObject.GDI32(00000005), ref: 6CD72BC7
                                                  • GetSysColor.USER32(00000004), ref: 6CD72BD0
                                                  • CreateSolidBrush.GDI32(00000000), ref: 6CD72BD6
                                                  • GetParent.USER32(?), ref: 6CD72C02
                                                  • GetActiveWindow.USER32 ref: 6CD72C09
                                                  • GetCursorPos.USER32(?), ref: 6CD72C16
                                                  • GetWindowRect.USER32(?,?), ref: 6CD72C22
                                                  • PtInRect.USER32(?,?,?), ref: 6CD72C31
                                                  • GetCapture.USER32 ref: 6CD72C3A
                                                  • SetCapture.USER32(?,?,?,?), ref: 6CD72C46
                                                  • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 6CD72C5C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: ColorRect$BrushCaptureCreateSolidTextWindow$ActiveCursorInvalidateModeObjectParentStock
                                                  • String ID: open
                                                  • API String ID: 1204622265-2758837156
                                                  • Opcode ID: 938c9ef402978610a6b69928ea091f2e59ef751a34c3701888662c7620548000
                                                  • Instruction ID: 67ae38f3d2296b203829181db76b2d459e829d5a3c49f2867be181c97ea14c0e
                                                  • Opcode Fuzzy Hash: 938c9ef402978610a6b69928ea091f2e59ef751a34c3701888662c7620548000
                                                  • Instruction Fuzzy Hash: 60415031644299EAEF329FA4CC85FDE3BB9AB0131CF144911F200E5AB0E771C5999775
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 793 6cd73690-6cd7369e 794 6cd73757-6cd7375c 793->794 795 6cd736a4-6cd736b6 GetWindowLongA 793->795 798 6cd73774-6cd73779 794->798 799 6cd7375e-6cd73764 794->799 796 6cd736cc-6cd736eb call 6cd72a53 SetDlgItemTextA 795->796 797 6cd736b8-6cd736c7 SetWindowPos 795->797 813 6cd736ed-6cd736f4 796->813 814 6cd73709-6cd73739 call 6cd716e0 call 6cd71460 796->814 797->796 803 6cd73786-6cd7378d 798->803 804 6cd7377b-6cd73780 798->804 801 6cd738c0-6cd738c9 799->801 802 6cd7376a 799->802 806 6cd738a8-6cd738b2 EndDialog 802->806 808 6cd73793-6cd7379f GetDlgCtrlID 803->808 809 6cd7382b 803->809 804->803 807 6cd7383c-6cd73841 804->807 806->801 811 6cd73867-6cd7386a 807->811 812 6cd73843-6cd7384a 807->812 815 6cd737e6-6cd737fb SetTextColor 808->815 816 6cd737a1-6cd737b6 SetTextColor 808->816 810 6cd73830-6cd73834 809->810 820 6cd73880-6cd73885 811->820 821 6cd7386c-6cd7387b call 6cd73c60 811->821 817 6cd7384c-6cd73857 CreateSolidBrush 812->817 818 6cd73859 812->818 813->814 819 6cd736f6-6cd736fd 813->819 840 6cd73744-6cd73752 call 6cd77260 814->840 841 6cd7373b-6cd7373f call 6cd73ae0 814->841 825 6cd73810-6cd73824 SetBkColor CreateSolidBrush 815->825 826 6cd737fd-6cd7380e SetBkMode GetStockObject 815->826 823 6cd737cb-6cd737e4 SetBkColor CreateSolidBrush 816->823 824 6cd737b8-6cd737c9 SetBkMode GetStockObject 816->824 828 6cd7385e-6cd73862 817->828 818->828 819->814 829 6cd736ff-6cd73704 call 6cd73c34 819->829 832 6cd73887-6cd7388b 820->832 833 6cd738a3-6cd738a6 820->833 823->810 824->810 827 6cd73829 825->827 826->827 827->810 829->814 832->801 838 6cd7388d-6cd738a1 SendMessageA 832->838 833->806 834 6cd738b4-6cd738bd 833->834 838->801 840->801 841->840
                                                  APIs
                                                  • GetWindowLongA.USER32(000000EC), ref: 6CD736AC
                                                  • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,000000EC), ref: 6CD736C7
                                                  • SetDlgItemTextA.USER32(?,00000065,00000000), ref: 6CD736DF
                                                  • EndDialog.USER32(?,00000000), ref: 6CD738AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$DialogItemLongText
                                                  • String ID: BTN_ABOUT_OK_DOWN$BTN_ABOUT_OK_OVER$BTN_ABOUT_OK_UP
                                                  • API String ID: 917433306-3517212525
                                                  • Opcode ID: e46a14c195eeec35e670756cfff2da074cab07f7bef70a30894ce813a17caabe
                                                  • Instruction ID: d0397dbc27583b2a8bc262a16b41165a83c51a5669bd9d7a87819782010e5ca7
                                                  • Opcode Fuzzy Hash: e46a14c195eeec35e670756cfff2da074cab07f7bef70a30894ce813a17caabe
                                                  • Instruction Fuzzy Hash: DF518131644614BAEF326F19DC41BCE7F25EB0236CF104A22F611A9DF0D776C4A696B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadBitmapA.USER32(?,?), ref: 6CD716F0
                                                  • LoadBitmapA.USER32(?,?), ref: 6CD71704
                                                  • LoadBitmapA.USER32(?,?), ref: 6CD71717
                                                  • GetDlgItem.USER32(?,?), ref: 6CD7172C
                                                  • GetWindowRect.USER32(00000000,?), ref: 6CD71741
                                                  • GetWindowRect.USER32(?,?), ref: 6CD7174D
                                                  • ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 6CD71776
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 6CD717D9
                                                  • RegisterClassExA.USER32(?), ref: 6CD717E9
                                                  • CreateWindowExA.USER32(00000020,Bmp_Button_Class,00000000,50000000,?,?,00000000,00000000,?,?,?,00000000), ref: 6CD7180F
                                                  • SetWindowLongA.USER32(00000000,00000000,?), ref: 6CD7181C
                                                  • SetWindowLongA.USER32(00000000,00000004,?), ref: 6CD71827
                                                  • SetWindowLongA.USER32(00000000,00000008,?), ref: 6CD71832
                                                  • CreateWindowExA.USER32(00000000,STATIC,00000000,5000000E,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 6CD71856
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$Load$BitmapLong$CreateRect$ClassCursorItemRegisterShow
                                                  • String ID: Bmp_Button_Class$STATIC
                                                  • API String ID: 3511724289-4004187156
                                                  • Opcode ID: 385b7778d71c7f7bc8472673d7be0f0e732ef3175c9cb38b38d8509365683f7f
                                                  • Instruction ID: 85d6578924f4eb89a631021e8ec37d35073379ffba18ad908da27a71c0a1faaa
                                                  • Opcode Fuzzy Hash: 385b7778d71c7f7bc8472673d7be0f0e732ef3175c9cb38b38d8509365683f7f
                                                  • Instruction Fuzzy Hash: 7A516F71580305BEEF219FA0CC81FDEBBB9EF04704F108614F605AA6A0E7B5A5198BB4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetWindowLongA.USER32(?,00000004), ref: 6CD71998
                                                  • GetWindowLongA.USER32(?,0000000C), ref: 6CD719A4
                                                  • SendMessageA.USER32(00000000,00000172,00000000,00000000), ref: 6CD719B2
                                                  • SetCapture.USER32(?,00000000,00000172,00000000,00000000,?,0000000C,?,00000004), ref: 6CD719BA
                                                  • GetWindowRect.USER32(?,?), ref: 6CD719E7
                                                  • GetWindowLongA.USER32(?,00000000), ref: 6CD71A31
                                                  • GetWindowLongA.USER32(?,0000000C), ref: 6CD71A3D
                                                  • SendMessageA.USER32(00000000,00000172,00000000,00000000), ref: 6CD71A4B
                                                  • ReleaseCapture.USER32 ref: 6CD71A50
                                                  • DefWindowProcA.USER32(?,?,?,?), ref: 6CD71B7F
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$CaptureMessageSend$ProcRectRelease
                                                  • String ID:
                                                  • API String ID: 2818777917-0
                                                  • Opcode ID: be892f974810993a21d78d126a6ff92b0e6fe4003661ae3c5893be75a3fc1067
                                                  • Instruction ID: 3a01bd2b217405d2976746b658e97369e0ae53373595b2f01bae53cd3092146e
                                                  • Opcode Fuzzy Hash: be892f974810993a21d78d126a6ff92b0e6fe4003661ae3c5893be75a3fc1067
                                                  • Instruction Fuzzy Hash: 3551A531680215AFEF329F64CD81B9E7FA5DB41348F108221F648AAAB1E771D896C774
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 879 6cd758b0-6cd758c4 880 6cd758ca-6cd758e5 GetWindowLongA 879->880 881 6cd759a8-6cd759ad 879->881 882 6cd758e7-6cd758f6 SetWindowPos 880->882 883 6cd758fb-6cd75902 880->883 884 6cd75a04-6cd75a09 881->884 885 6cd759af-6cd759b5 881->885 882->883 886 6cd75904-6cd7590b 883->886 887 6cd75920-6cd75950 call 6cd716e0 call 6cd71460 883->887 890 6cd75a0b-6cd75a12 884->890 891 6cd75a6a-6cd75a6f 884->891 888 6cd759b7-6cd759d1 GetDlgItemTextA 885->888 889 6cd759e1-6cd759ec GetKeyState 885->889 886->887 892 6cd7590d-6cd75914 886->892 922 6cd75952-6cd75956 call 6cd73ae0 887->922 923 6cd7595b-6cd75978 call 6cd77260 887->923 896 6cd759d7 888->896 897 6cd75af2-6cd75afb 888->897 898 6cd759ff 889->898 899 6cd759ee-6cd759fa SendMessageA 889->899 900 6cd75a14-6cd75a29 SetTextColor 890->900 901 6cd75a59 890->901 893 6cd75a95-6cd75a98 891->893 894 6cd75a71-6cd75a78 891->894 892->887 905 6cd75916-6cd7591b call 6cd73c34 892->905 909 6cd75aae-6cd75ab3 893->909 910 6cd75a9a-6cd75aa9 call 6cd73c60 893->910 906 6cd75a87 894->906 907 6cd75a7a-6cd75a85 CreateSolidBrush 894->907 911 6cd75ad6-6cd75ae4 EndDialog 896->911 898->897 899->898 902 6cd75a3e-6cd75a57 SetBkColor CreateSolidBrush 900->902 903 6cd75a2b-6cd75a3c SetBkMode GetStockObject 900->903 904 6cd75a5e-6cd75a62 901->904 902->904 903->904 905->887 913 6cd75a8c-6cd75a90 906->913 907->913 916 6cd75ab5-6cd75ab9 909->916 917 6cd75ad1-6cd75ad4 909->917 911->897 916->897 921 6cd75abb-6cd75acf SendMessageA 916->921 917->911 918 6cd75ae6-6cd75aef 917->918 918->897 921->897 922->923 927 6cd7597b-6cd7597d 923->927 928 6cd7597a 923->928 929 6cd75980-6cd75984 927->929 928->927 930 6cd75986-6cd7598a 929->930 931 6cd7598c-6cd759a3 RtlMoveMemory SetWindowTextA 929->931 930->931 932 6cd7597f 930->932 931->897 932->929
                                                  APIs
                                                  • GetWindowLongA.USER32(000000EC,?), ref: 6CD758DB
                                                  • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,000000EC,?), ref: 6CD758F6
                                                  • RtlMoveMemory.KERNEL32(?,?,00000000,00000000,?), ref: 6CD75990
                                                  • SetWindowTextA.USER32(?,?), ref: 6CD7599E
                                                  • GetDlgItemTextA.USER32(?,00000065,?,00000400), ref: 6CD759CA
                                                  • EndDialog.USER32(?), ref: 6CD75ADF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$Text$DialogItemLongMemoryMove
                                                  • String ID: BTN_REGP_OK_DOWN$BTN_REGP_OK_OVER$BTN_REGP_OK_UP
                                                  • API String ID: 1467606235-2190942234
                                                  • Opcode ID: 4d2d404d39b8636f85556c68868679f6e33fee9c67719b59501c1c8f9fb35315
                                                  • Instruction ID: 481967e97bb79367f31e9dc07c75cf957286b098ba8a755745bfd08d5b9e76cf
                                                  • Opcode Fuzzy Hash: 4d2d404d39b8636f85556c68868679f6e33fee9c67719b59501c1c8f9fb35315
                                                  • Instruction Fuzzy Hash: F851A231644255BAEF325B14CC82FCD3B65EB0236CF244635F251A89F0F7B298A69772
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadStringA.USER32(00000004,6CD8E23D,00000400,00000001), ref: 6CD75538
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • GetTempPathA.KERNEL32(00000400,?,00000004,6CD8E23D,00000400,00000001,?,00000000,?,6CD7637F,00000000,00000001,00000000,6CD90A45,00000400,00000184), ref: 6CD75553
                                                  • lstrcatA.KERNEL32(?,\regpatch.reg,00000400,?,00000004,6CD8E23D,00000400,00000001,?,00000000,?,6CD7637F,00000000,00000001,00000000,6CD90A45), ref: 6CD75564
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,\regpatch.reg,00000400,?,00000004,6CD8E23D,00000400,00000001,?,00000000,?,6CD7637F), ref: 6CD75592
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,00000000,?,00001000,00000004,?,\regpatch.reg,00000400,?,00000004,6CD8E23D), ref: 6CD755D3
                                                  • lstrcpyA.KERNEL32(6CD7D911,/s ",?,?,00000000,?,?,00000000,?,00001000,00000004,?,\regpatch.reg,00000400,?,00000004), ref: 6CD7561C
                                                  • lstrcatA.KERNEL32(6CD7D911,?,6CD7D911,/s ",?,?,00000000,?,?,00000000,?,00001000,00000004,?,\regpatch.reg,00000400), ref: 6CD75629
                                                  • lstrcatA.KERNEL32(6CD7D911,6CD7D701,6CD7D911,?,6CD7D911,/s ",?,?,00000000,?,?,00000000,?,00001000,00000004,?), ref: 6CD75634
                                                  • RtlZeroMemory.KERNEL32(?,0000003C,6CD7D911,6CD7D701,6CD7D911,?,6CD7D911,/s ",?,?,00000000,?,?,00000000,?,00001000), ref: 6CD75642
                                                  • ShellExecuteExA.SHELL32(0000003C,?,0000003C,6CD7D911,6CD7D701,6CD7D911,?,6CD7D911,/s ",?,?,00000000,?,?,00000000,?), ref: 6CD75686
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,0000003C,?,0000003C,6CD7D911,6CD7D701,6CD7D911,?,6CD7D911,/s ",?,?,00000000,?,?), ref: 6CD75693
                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,00000000,?,?,00000000,?,00001000,00000004,?,\regpatch.reg,00000400,?), ref: 6CD756AD
                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,00004000,?,?,00000000,?,?,00000000,?,00001000,00000004,?), ref: 6CD756CC
                                                  • DeleteFileA.KERNEL32(?,?,?,00004000,?,?,00000000,?,?,00000000,?,00001000,00000004,?,\regpatch.reg,00000400), ref: 6CD756D8
                                                    • Part of subcall function 6CD740CF: GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                    • Part of subcall function 6CD740CF: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Virtual$MessageSendlstrcat$AllocFree$AddressDeleteExecuteFileHandleLoadMemoryModuleObjectPathProcShellSingleStringTempWaitZerolstrcpy
                                                  • String ID: /s "$<$@$\regpatch.reg
                                                  • API String ID: 2640690069-2261817607
                                                  • Opcode ID: 7f922c5e4828757634ddb76e2b5ba95398fceeaac9852b0875179230fa854cb0
                                                  • Instruction ID: 98b75f1899e1292223a29fb1535b7b982d679b4c22c7851e2685877af0e5f50c
                                                  • Opcode Fuzzy Hash: 7f922c5e4828757634ddb76e2b5ba95398fceeaac9852b0875179230fa854cb0
                                                  • Instruction Fuzzy Hash: D34177F1804218AADF319B50CC41FEEB779AF45308F0044D9B748B6AB0E7755A8A8F39
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • UnmapViewOfFile.KERNEL32 ref: 6CD72918
                                                  • CloseHandle.KERNEL32 ref: 6CD72923
                                                  • SetFilePointer.KERNEL32(?,6CD7E51D,00000000), ref: 6CD72936
                                                  • SetEndOfFile.KERNEL32(?,?,6CD7E51D,00000000), ref: 6CD7293C
                                                  • CloseHandle.KERNEL32(?,?,?,6CD7E51D,00000000), ref: 6CD72942
                                                  • SetFileAttributesA.KERNEL32(6CD7D911,?,?,?,6CD7E51D,00000000), ref: 6CD7295A
                                                  • CreateFileA.KERNEL32(6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,?,6CD7E51D,00000000), ref: 6CD7297F
                                                  • SetFileTime.KERNEL32(6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,?,6CD7E51D,00000000), ref: 6CD729A3
                                                  • CloseHandle.KERNEL32(6CD7F181,6CD7F189,6CD7F191,6CD7D911,C0000000,00000000,00000000,00000003,00000082,00000000,6CD7D911,?,?,?,6CD7E51D,00000000), ref: 6CD729AE
                                                    • Part of subcall function 6CD729EF: LoadLibraryA.KERNEL32(Imagehlp.dll), ref: 6CD72A02
                                                    • Part of subcall function 6CD729EF: GetProcAddress.KERNEL32(00000000,CheckSumMappedFile), ref: 6CD72A13
                                                    • Part of subcall function 6CD729EF: CloseHandle.KERNEL32(00000000,00000000,CheckSumMappedFile,Imagehlp.dll), ref: 6CD72A48
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$CloseHandle$MessageSend$AddressAttributesCreateLibraryLoadPointerProcTimeUnmapView
                                                  • String ID: $PE CheckSum Fix : Failed$PE CheckSum Fix : OK$Restore original file time : OK
                                                  • API String ID: 2362126809-2918191134
                                                  • Opcode ID: 7458e2306e01f6e85b73e730e32cc271e373306e74ff69dd8c977aafebe2610d
                                                  • Instruction ID: 64312c2a4aff93e11dede8dc0997de922a2f489cfee363478b5b55ba912615ff
                                                  • Opcode Fuzzy Hash: 7458e2306e01f6e85b73e730e32cc271e373306e74ff69dd8c977aafebe2610d
                                                  • Instruction Fuzzy Hash: 3B11843128026CFEFE322B60CD05FCD3529AB0632CF144412BA10B5EF0E771561EA6B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(0000001B,6CD8AE3D,00000400,00000001), ref: 6CD74F01
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • LoadStringA.USER32(00000015,6CD8B23D,00000400), ref: 6CD74F89
                                                  • LoadStringA.USER32(00000021,6CD8B63D,00000400), ref: 6CD74FC4
                                                  • LoadStringA.USER32(00000021,6CD8BA3D,00000400), ref: 6CD74FE7
                                                  • LoadStringA.USER32(0000001E,6CD8BE3D,00000400), ref: 6CD75034
                                                  • LoadStringA.USER32(00000023,6CD8C23D,00000400), ref: 6CD75057
                                                  • LoadStringA.USER32(00000019,6CD8C63D,00000400), ref: 6CD750DD
                                                  • LoadStringA.USER32(0000001A,6CD8CA3D,00000400), ref: 6CD75100
                                                  • LoadStringA.USER32(00000031,6CD8CE3D,00000400,?), ref: 6CD75182
                                                  • LoadStringA.USER32(00000030,6CD8D23D,00000400,?), ref: 6CD751AC
                                                  • CreateFileA.KERNEL32(6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD751E3
                                                  • LoadStringA.USER32(00000033,6CD8D63D,00000400,6CD7D911), ref: 6CD751FF
                                                  • LoadStringA.USER32(00000032,6CD8DA3D,00000400,6CD7D911), ref: 6CD75229
                                                  • CloseHandle.KERNEL32(00000000,00000032,6CD8DA3D,00000400,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD75239
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadString$MessageSend$CloseCreateFileHandle
                                                  • String ID:
                                                  • API String ID: 3199326509-0
                                                  • Opcode ID: dd164551c11787de02646744b27411e6eb9b5fd9743e0f672b2f4be47100e7bc
                                                  • Instruction ID: 93d8071657226de6cc38bc77a064c59d7cd1b553bd4cdc906ddd843d852602bf
                                                  • Opcode Fuzzy Hash: dd164551c11787de02646744b27411e6eb9b5fd9743e0f672b2f4be47100e7bc
                                                  • Instruction Fuzzy Hash: FF71CD70686204FEFB32AB60CC4AFCA76B5AB0174CF109819B35575EF0E7B05149CA79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShowWindow.USER32(00000005), ref: 6CD762E7
                                                  • ShowWindow.USER32(00000000,00000005), ref: 6CD762F4
                                                  • SendMessageA.USER32(00000184,00000000,00000000), ref: 6CD76308
                                                  • LoadStringA.USER32(00000000,6CD90A45,00000400,00000184), ref: 6CD7631F
                                                  • LoadStringA.USER32(00000001,6CD91A45,00000400,00000002), ref: 6CD76532
                                                  • GetDlgItem.USER32(0000006C,00000001), ref: 6CD76554
                                                  • EnableWindow.USER32(00000000,00000000), ref: 6CD7655C
                                                  • RedrawWindow.USER32(00000000,00000000,00000001,0000006C,00000001,6CD91A45,00000400,00000002,0000001C,6CD91645,00000400,00000001,00000000,6CD90A45,00000400,00000184), ref: 6CD7656D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$LoadShowString$EnableItemMessageRedrawSend
                                                  • String ID: EXIT PATCHING
                                                  • API String ID: 3447863954-2450873957
                                                  • Opcode ID: 3ca8668ec7d6903bf44dfa8c4805bf87f6c3331c9183ba8584dda499c3f8c704
                                                  • Instruction ID: 37d1a5ef57c37cd820753b07533d92316c1ff9ece52f62b9abb28606b3ce3135
                                                  • Opcode Fuzzy Hash: 3ca8668ec7d6903bf44dfa8c4805bf87f6c3331c9183ba8584dda499c3f8c704
                                                  • Instruction Fuzzy Hash: 8051EE3058D254F9FB329B64CD02BCE7AB59B0231CF24451EE290A0DF1B37555AB963A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(00000070,00000000), ref: 6CD738E0
                                                  • ShowWindow.USER32(?,00000000,00000070,00000000,?,00000000,?,6CD7327C,00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400,0000000E,6CD84A3D), ref: 6CD738FB
                                                  • GetWindowRect.USER32(?,?), ref: 6CD73938
                                                  • GetWindowRect.USER32(?,?), ref: 6CD7394A
                                                    • Part of subcall function 6CD718B0: GetWindowLongA.USER32(?,000000EC), ref: 6CD718BE
                                                    • Part of subcall function 6CD718B0: GetWindowLongA.USER32(?,000000F0), ref: 6CD718CA
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(00000033), ref: 6CD718EF
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(00000021), ref: 6CD7190B
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(00000020), ref: 6CD71914
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(0000002D), ref: 6CD71947
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(0000002E), ref: 6CD71950
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(00000006), ref: 6CD71964
                                                    • Part of subcall function 6CD718B0: GetSystemMetrics.USER32(00000005), ref: 6CD7196D
                                                  • RtlZeroMemory.KERNEL32(?,0000003C,?,?,?,00000000,00000070,00000000,?,00000000,?,6CD7327C,00000000,000000CA,6CD84E3D,0000000F), ref: 6CD739C9
                                                  • lstrcpyA.KERNEL32(?,MS SANS SERIF,?,0000003C,?,?,?,00000000,00000070,00000000,?,00000000,?,6CD7327C,00000000,000000CA), ref: 6CD739E5
                                                  • GetTempPathA.KERNEL32(00000400,?,?,MS SANS SERIF,?,0000003C,?,?,?,00000000,00000070,00000000,?,00000000,?,6CD7327C), ref: 6CD73A26
                                                  • lstrcatA.KERNEL32(?,00000015,00000400,?,?,MS SANS SERIF,?,0000003C,?,?,?,00000000,00000070,00000000,?,00000000), ref: 6CD73A36
                                                  • lstrcatA.KERNEL32(?,00000095,?,00000015,00000400,?,?,MS SANS SERIF,?,0000003C,?,?,?,00000000,00000070,00000000), ref: 6CD73A49
                                                  • lstrcpyA.KERNEL32(?,00000015,0000009B,?,?,?,00000095,?,00000015,00000400,?,?,MS SANS SERIF,?,0000003C,?), ref: 6CD73A76
                                                  • CreateFontIndirectA.GDI32(?), ref: 6CD73A7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MetricsSystem$Window$LongRectlstrcatlstrcpy$CreateFontIndirectItemMemoryPathShowTempZero
                                                  • String ID: MS SANS SERIF
                                                  • API String ID: 1718168783-2292534163
                                                  • Opcode ID: e5eae67b363606d895978b8c7150e1386e5c6b0be6d4bc28360a76bb25cdce44
                                                  • Instruction ID: 4097fcd5d7df7731ed223ff0ad5c244562d27a31ba5e2cab23250913dd8f5142
                                                  • Opcode Fuzzy Hash: e5eae67b363606d895978b8c7150e1386e5c6b0be6d4bc28360a76bb25cdce44
                                                  • Instruction Fuzzy Hash: 8E5192B1500615EEEF31DF24CC85FDABBB9FB41348F008559A214ABAA1E770E959CB70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(00000002,6CD8563D,00000400), ref: 6CD7436F
                                                  • LoadStringA.USER32(0000000A,6CD87E3D,00000400,00000024), ref: 6CD745C0
                                                    • Part of subcall function 6CD740CF: GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                    • Part of subcall function 6CD740CF: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                  • LoadStringA.USER32(00000020,6CD85A3D,00000400,00000008), ref: 6CD743C1
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • LoadStringA.USER32(00000021,6CD85E3D,00000400,00000008), ref: 6CD743ED
                                                  • LoadStringA.USER32(00000022,6CD8623D,00000400,00000008), ref: 6CD74410
                                                  • LoadStringA.USER32(00000023,6CD8663D,00000400,00000400), ref: 6CD7444D
                                                  • LoadStringA.USER32(0000000B,6CD8823D,00000400,00000024), ref: 6CD745E2
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadString$MessageSend$AddressHandleModuleProc
                                                  • String ID:
                                                  • API String ID: 1736458721-0
                                                  • Opcode ID: 78270b5b607f2f52c43afb8b7ebfe5ea9fac9a3d16f0d78445f8833070b651e1
                                                  • Instruction ID: 05a68a6a59965b87bc8e8578fddbac64b9cb926432a9a161fe0e4628b38524c6
                                                  • Opcode Fuzzy Hash: 78270b5b607f2f52c43afb8b7ebfe5ea9fac9a3d16f0d78445f8833070b651e1
                                                  • Instruction Fuzzy Hash: A061BF30686240FAFF339B94CC06F8A7AB5AB01B4CF109855B350B5EB1E7B19249DB75
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EC), ref: 6CD718BE
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 6CD718CA
                                                  • GetSystemMetrics.USER32(00000033), ref: 6CD718EF
                                                  • GetSystemMetrics.USER32(00000004), ref: 6CD718FA
                                                  • GetSystemMetrics.USER32(00000021), ref: 6CD7190B
                                                  • GetSystemMetrics.USER32(00000020), ref: 6CD71914
                                                  • GetSystemMetrics.USER32(00000008), ref: 6CD7192A
                                                  • GetSystemMetrics.USER32(00000007), ref: 6CD71933
                                                  • GetSystemMetrics.USER32(0000002D), ref: 6CD71947
                                                  • GetSystemMetrics.USER32(0000002E), ref: 6CD71950
                                                  • GetSystemMetrics.USER32(00000006), ref: 6CD71964
                                                  • GetSystemMetrics.USER32(00000005), ref: 6CD7196D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MetricsSystem$LongWindow
                                                  • String ID:
                                                  • API String ID: 3112282201-0
                                                  • Opcode ID: 9ac105f992e2a1bd0ec87dee627b8ac329d158e3715ae37d9bc932f2d1c56605
                                                  • Instruction ID: b981e1268b9632df25cf417334fdeeafe0561bf3f2c19acb174a7e793ee84489
                                                  • Opcode Fuzzy Hash: 9ac105f992e2a1bd0ec87dee627b8ac329d158e3715ae37d9bc932f2d1c56605
                                                  • Instruction Fuzzy Hash: BD2190325C1302AFEB211F75C895BAD3754EF90358F248130A92A9AAF0EB70C846C771
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000400,?,00000000,?,00000000,?,6CD73277,00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400,0000000E,6CD84A3D,00000400), ref: 6CD760A1
                                                  • GetCurrentDirectoryA.KERNEL32(00000400,?,00000400,?,00000000,?,00000000,?,6CD73277,00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400,0000000E), ref: 6CD760B2
                                                  • lstrcpyA.KERNEL32(?,?,00000001,?,00000010,00000001,?,00000400,?,00000400,?,00000000,?,00000000,?,6CD73277), ref: 6CD760FD
                                                  • lstrcatA.KERNEL32(?,6CD7D7EB,?,?,00000001,?,00000010,00000001,?,00000400,?,00000400,?,00000000,?,00000000), ref: 6CD7610E
                                                  • lstrcatA.KERNEL32(?,?,?,6CD7D7EB,?,?,00000001,?,00000010,00000001,?,00000400,?,00000400,?,00000000), ref: 6CD76121
                                                  • lstrcatA.KERNEL32(?,.dll,?,?,?,6CD7D7EB,?,?,00000001,?,00000010,00000001,?,00000400,?,00000400), ref: 6CD76132
                                                  • LoadLibraryA.KERNEL32(?,?,00000000,?,?,.dll,?,?,?,6CD7D7EB,?,?,00000001,?,00000010,00000001), ref: 6CD76169
                                                  • SetCurrentDirectoryA.KERNEL32(?,00000400,?,00000400,?,00000000,?,00000000,?,6CD73277,00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400), ref: 6CD760BE
                                                    • Part of subcall function 6CD7149B: FindResourceA.KERNEL32(?,6CD71479,0000000A), ref: 6CD714B1
                                                  • SetCurrentDirectoryA.KERNEL32(?,00000002,?,?,?,?,?,00000000,?,?,.dll,?,?,?,6CD7D7EB,?), ref: 6CD761B2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectorylstrcat$FindLibraryLoadPathResourceTemplstrcpy
                                                  • String ID: .dll
                                                  • API String ID: 4090242041-2738580789
                                                  • Opcode ID: 1d5f194489170e15fc1af54943643039bf6888254742537aa83d6579e307a498
                                                  • Instruction ID: 855a81f153f449332b407793d24c0e9e512242f691df74ed599699a759a01e47
                                                  • Opcode Fuzzy Hash: 1d5f194489170e15fc1af54943643039bf6888254742537aa83d6579e307a498
                                                  • Instruction Fuzzy Hash: 21310F76800118AADB219B91CC44EEEB7BDBB49358F0445A6A205D7520F730DA5ECB70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 6CD77040: lstrlenA.KERNEL32(?), ref: 6CD77052
                                                    • Part of subcall function 6CD77040: CompareStringA.KERNEL32(00000000,00000001,?,00000000,?,00000000,?), ref: 6CD7706C
                                                  • ExpandEnvironmentStringsA.KERNEL32(6CD7D911,6CD7E95F,00000400,6CD7D668, /help : show help menu,6CD7D413,00000000,AttachConsole,kernel32.dll,6CD82199,?,?,?,6CD7210E), ref: 6CD742BC
                                                  • ExpandEnvironmentStringsA.KERNEL32(6CD7D911,6CD7ED5F,00000400,6CD7D668, /help : show help menu,6CD7D413,00000000,AttachConsole,kernel32.dll,6CD82199,?,?,?,6CD7210E), ref: 6CD742F0
                                                  • SetEnvironmentVariableA.KERNEL32(dup2_cmd_var,6CD7ED5F,6CD7D911,6CD7ED5F,00000400,6CD7D668, /help : show help menu,6CD7D413,00000000,AttachConsole,kernel32.dll,6CD82199,?,?,?,6CD7210E), ref: 6CD742FF
                                                  • DialogBoxParamA.USER32(00000001,00000000,Function_00002DD0,00000000,6CD7D668), ref: 6CD7431E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Environment$ExpandStrings$CompareDialogParamStringVariablelstrlen
                                                  • String ID: backup$dup2_cmd_var$overwrite$setvar$silent$startupworkdir
                                                  • API String ID: 3077006360-2026149501
                                                  • Opcode ID: 0de8d2d1d57c9b9103579d158f9da8392164f8d96a24938a7e72b1f04317c538
                                                  • Instruction ID: f615182e1da8f749463df32f1dd49030f7f73aed723c668d1015966c4e26f9c6
                                                  • Opcode Fuzzy Hash: 0de8d2d1d57c9b9103579d158f9da8392164f8d96a24938a7e72b1f04317c538
                                                  • Instruction Fuzzy Hash: 3201A2203CA6A4B8F97323345D06FCE16285B53228F050D42B34438EF2C7B6521E06FE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(user32.dll,00000000), ref: 6CD73B7D
                                                  • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 6CD73B88
                                                  • GetWindowLongA.USER32(?,000000EC), ref: 6CD73B9C
                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 6CD73BAC
                                                  • Sleep.KERNEL32(?), ref: 6CD73C00
                                                  • UpdateWindow.USER32(?), ref: 6CD73C08
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$AddressHandleModuleProcSleepUpdate
                                                  • String ID: SetLayeredWindowAttributes$user32.dll
                                                  • API String ID: 3069254162-3673630139
                                                  • Opcode ID: b6481f7038951313c9ad1c4275fdb14a39e96a2b6cdef11a527d351f5849ea7a
                                                  • Instruction ID: e0c1ceb3a3be19bbe966ebe6cd6a9ee2f9fe33b956c73bcfbf35fb750ea6acd4
                                                  • Opcode Fuzzy Hash: b6481f7038951313c9ad1c4275fdb14a39e96a2b6cdef11a527d351f5849ea7a
                                                  • Instruction Fuzzy Hash: FA21D270685208EFEF209F29CC40FAE3A65EB81328F148524F810E75F0D7719D55DA70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000400,?,?,?,?,?,6CD7365C,6CD8223D,6CD7E111), ref: 6CD761D4
                                                  • FreeLibrary.KERNEL32(?,00000400,?,?,?,?,?,6CD7365C,6CD8223D,6CD7E111), ref: 6CD761E3
                                                  • lstrcpyA.KERNEL32(?,?,6CD82645,?,00000010,?,00000400,?,?,?,?,?,6CD7365C,6CD8223D,6CD7E111), ref: 6CD76208
                                                  • lstrcatA.KERNEL32(?,6CD7D7F2,?,?,6CD82645,?,00000010,?,00000400,?,?,?,?,?,6CD7365C,6CD8223D), ref: 6CD76219
                                                  • lstrcatA.KERNEL32(?,?,?,6CD7D7F2,?,?,6CD82645,?,00000010,?,00000400,?), ref: 6CD7622C
                                                  • lstrcatA.KERNEL32(?,.dll,?,?,?,6CD7D7F2,?,?,6CD82645,?,00000010,?,00000400,?), ref: 6CD7623D
                                                  • DeleteFileA.KERNEL32(?,?,.dll,?,?,?,6CD7D7F2,?,?,6CD82645,?,00000010,?,00000400,?), ref: 6CD76249
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: lstrcat$DeleteFileFreeLibraryPathTemplstrcpy
                                                  • String ID: .dll
                                                  • API String ID: 1649043200-2738580789
                                                  • Opcode ID: c60f789de85b76b02597453b5d0514a21edd441762371c30a6e4efb88581bec6
                                                  • Instruction ID: 25f739b961420dbbe997de50a49973c164494a7ba6d7c8598e2a43fcb2ec0a3b
                                                  • Opcode Fuzzy Hash: c60f789de85b76b02597453b5d0514a21edd441762371c30a6e4efb88581bec6
                                                  • Instruction Fuzzy Hash: ED0112B6800158A6CB31D790CC85FEEB36CBB45349F4405A6B245E2954FB74D78E8BB0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateSolidBrush.GDI32 ref: 6CD73C79
                                                  • SelectObject.GDI32(?,00000000), ref: 6CD73C82
                                                  • RoundRect.GDI32(?,?,?,?,?,00000000,00000000), ref: 6CD73C9A
                                                  • OffsetRect.USER32(?,00000001,00000001), ref: 6CD73CB0
                                                  • GetDlgItemTextA.USER32(?,?,6CD7E538,00000400), ref: 6CD73CC5
                                                  • SetBkMode.GDI32(?,00000001), ref: 6CD73CCF
                                                  • SetTextColor.GDI32(?,?), ref: 6CD73CDD
                                                  • DrawTextA.USER32(?,6CD7E538,000000FF,?,00000025), ref: 6CD73CF2
                                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 6CD73D08
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: RectText$Offset$BrushColorCreateDrawItemModeObjectRoundSelectSolid
                                                  • String ID:
                                                  • API String ID: 3683931702-0
                                                  • Opcode ID: 59bb90bcf1e6044abe9ab94a1d9ede9ad792f627170dfaa7cf1093885a597e80
                                                  • Instruction ID: 849aa0dedb69175fdc0f66c9148f3c70b075f05a9a241fde73f6d6115a63a8f7
                                                  • Opcode Fuzzy Hash: 59bb90bcf1e6044abe9ab94a1d9ede9ad792f627170dfaa7cf1093885a597e80
                                                  • Instruction Fuzzy Hash: A6113031144704BEEB325F51CD01F8A7AB5EB14718F104B14B651A5DF1E7B2E49E97B0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongA.USER32(000000EC,?), ref: 6CD758DB
                                                  • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,000000EC,?), ref: 6CD758F6
                                                  • RtlMoveMemory.KERNEL32(?,?,00000000,00000000,?), ref: 6CD75990
                                                  • SetWindowTextA.USER32(?,?), ref: 6CD7599E
                                                  • GetDlgItemTextA.USER32(?,00000065,?,00000400), ref: 6CD759CA
                                                  • EndDialog.USER32(?), ref: 6CD75ADF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$Text$DialogItemLongMemoryMove
                                                  • String ID: BTN_REGP_OK_DOWN$BTN_REGP_OK_OVER$BTN_REGP_OK_UP
                                                  • API String ID: 1467606235-2190942234
                                                  • Opcode ID: c6df1087d649035fe10cf86ec4ea408fd1e0a07f0e59f94975ef480c6bcdebd6
                                                  • Instruction ID: ccbdf2bafd62de97f37bae8ca1c26712f56c353d8954f2e0e3d42a3364dd9c81
                                                  • Opcode Fuzzy Hash: c6df1087d649035fe10cf86ec4ea408fd1e0a07f0e59f94975ef480c6bcdebd6
                                                  • Instruction Fuzzy Hash: 9E21F430644255BEFF321B14CC42FCA3B79AB4277CF200625F655699F0E7B2989687B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000400,?), ref: 6CD71FFD
                                                  • lstrcatA.KERNEL32(?,\bassmod.dll,00000400,?), ref: 6CD7200E
                                                  • LoadLibraryA.KERNEL32(?,?,\bassmod.dll,00000400,?), ref: 6CD7201C
                                                  • GetProcAddress.KERNEL32(BASSMOD_Init,?), ref: 6CD72041
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadPathProcTemplstrcat
                                                  • String ID: BASSMOD_Init$\bassmod.dll
                                                  • API String ID: 316107575-384773266
                                                  • Opcode ID: 1cb7343dea238d19911d39ad6094e8809aaa066f23858ef5ce7b0314325838d7
                                                  • Instruction ID: 3875de2f717f31d93092622e90429d754b691db0e88755071f07dd11b67ecde4
                                                  • Opcode Fuzzy Hash: 1cb7343dea238d19911d39ad6094e8809aaa066f23858ef5ce7b0314325838d7
                                                  • Instruction Fuzzy Hash: 8B1106716481A0EFFB315B258C4DF69BFFCEB0231CF140025E645D5AE0E6719986C635
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(00000016,6CD91E45,00000400), ref: 6CD765D8
                                                  • LoadStringA.USER32(00000017,6CD92245,00000400), ref: 6CD76621
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • RtlMoveMemory.KERNEL32(?,6CD76730,00000278,?,?,?,?,?,00000001,?,6CD74846,00000004,-6CD7D608,?,00000004,00000008), ref: 6CD766BB
                                                  • RtlMoveMemory.KERNEL32(?,?,00000000,6CD76730,00000278,?,?,?,?,?,00000001,?,6CD74846,00000004,-6CD7D608,?), ref: 6CD766D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$LoadMemoryMoveString
                                                  • String ID: @$dUP2
                                                  • API String ID: 1206653450-646226640
                                                  • Opcode ID: 656e30f66e03bffeeec541ed6b673b8edaacf44b464f0161a85e83225688eb2f
                                                  • Instruction ID: b42d1d8e04d0e58f9b6051f1c13b14289441496a4d918a7022aad91e8edd45d5
                                                  • Opcode Fuzzy Hash: 656e30f66e03bffeeec541ed6b673b8edaacf44b464f0161a85e83225688eb2f
                                                  • Instruction Fuzzy Hash: A841ABB1204715EFEB14CF29C885A6AB7F8FB05318F10852DE605D7AA1E371E856CB74
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongA.USER32(000000EC), ref: 6CD736AC
                                                  • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,000000EC), ref: 6CD736C7
                                                  • SetDlgItemTextA.USER32(?,00000065,00000000), ref: 6CD736DF
                                                  • EndDialog.USER32(?,00000000), ref: 6CD738AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Window$DialogItemLongText
                                                  • String ID: BTN_ABOUT_OK_DOWN$BTN_ABOUT_OK_OVER$BTN_ABOUT_OK_UP
                                                  • API String ID: 917433306-3517212525
                                                  • Opcode ID: c657ce715866ef5a2f219603d94a3056f5795adea9ec491da2267a02ade35227
                                                  • Instruction ID: 3264fe71cab503c5f63e2c3e6148e8e1f1aadd77cb895a0916b29a952ab62cc6
                                                  • Opcode Fuzzy Hash: c657ce715866ef5a2f219603d94a3056f5795adea9ec491da2267a02ade35227
                                                  • Instruction Fuzzy Hash: B111B230284218BEFF326B14CC42FCA7F69AB427ACF104621B614699F0D7B2955A97B0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsDlgButtonChecked.USER32(0000006B), ref: 6CD7231F
                                                  • lstrcpyA.KERNEL32(6CD7DD11,?), ref: 6CD72332
                                                  • lstrcatA.KERNEL32(6CD7DD11,.BAK,6CD7DD11,?), ref: 6CD7233D
                                                  • GetFileAttributesA.KERNEL32(6CD7DD11,6CD7DD11,.BAK,6CD7DD11,?), ref: 6CD72343
                                                  • CopyFileA.KERNEL32(?,6CD7DD11,00000000), ref: 6CD72353
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesButtonCheckedCopylstrcatlstrcpy
                                                  • String ID: .BAK
                                                  • API String ID: 1049863671-450607331
                                                  • Opcode ID: 900bb73d2e334b16d1351a9b3e80d11f63ae5d26877cca835edabf4829f9d7e9
                                                  • Instruction ID: d866a5cff59fb0762ab31d016613ed1adf543d9ecfff6b5afa47ed0d08b3d9c3
                                                  • Opcode Fuzzy Hash: 900bb73d2e334b16d1351a9b3e80d11f63ae5d26877cca835edabf4829f9d7e9
                                                  • Instruction Fuzzy Hash: 01E02231045460B5CD321B618C02ECE3A1DAB0332CF100502F214B8FB1E372511BA3B9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrcpyA.KERNEL32(?,?), ref: 6CD72425
                                                  • lstrcatA.KERNEL32(?,.tmp,?,?), ref: 6CD72430
                                                  • DeleteFileA.KERNEL32(?,?,.tmp,?,?), ref: 6CD72436
                                                  • MoveFileA.KERNEL32(?,?), ref: 6CD7243F
                                                  • CopyFileA.KERNEL32(?,?,00000001), ref: 6CD7244F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$CopyDeleteMovelstrcatlstrcpy
                                                  • String ID: .tmp
                                                  • API String ID: 2634143726-2986845003
                                                  • Opcode ID: 6b11c466ef90b95cd89355b119912ea2770bb5c6170bce1cf27758ab2052a298
                                                  • Instruction ID: 4c9f79cd99473f89600adbc79121ff76a272b8ac6d86ee8f73ec4530bcd37d81
                                                  • Opcode Fuzzy Hash: 6b11c466ef90b95cd89355b119912ea2770bb5c6170bce1cf27758ab2052a298
                                                  • Instruction Fuzzy Hash: 42E0E572501434B2CE311B558D46ECE3A29AF1235CF008011FA04F5A74FB7697AB86FA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(user32.dll,?,6CD73AF5,?,00000002,?,6CD73272,?,00000000,00000000,000000CA,6CD84E3D,0000000F,6CD84E3D,00000400,0000000E), ref: 6CD73B02
                                                  • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 6CD73B0D
                                                  • GetWindowLongA.USER32(?,000000EC), ref: 6CD73B1D
                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 6CD73B2D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LongWindow$AddressHandleModuleProc
                                                  • String ID: SetLayeredWindowAttributes$user32.dll
                                                  • API String ID: 1792074081-3673630139
                                                  • Opcode ID: 1c40cebf85788fb68f43c6e30c2fe4d71505c20afbde16cea8a8b3423e5a7f9c
                                                  • Instruction ID: 386e116f21e9f609014c63c51058fe5cf0f455527add98f3b8976b16031b9736
                                                  • Opcode Fuzzy Hash: 1c40cebf85788fb68f43c6e30c2fe4d71505c20afbde16cea8a8b3423e5a7f9c
                                                  • Instruction Fuzzy Hash: CDE04F311441087ADF213BA2CC01FAE3D5EDB823A8F208610B525E9AF1EBB1C81F9670
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(00000003,6CD8863D,00000400), ref: 6CD747C8
                                                  • LoadStringA.USER32(0000000A,6CD8963D,00000400,?), ref: 6CD74943
                                                    • Part of subcall function 6CD740CF: GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                    • Part of subcall function 6CD740CF: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadString$AddressHandleModuleProc
                                                  • String ID:
                                                  • API String ID: 2917493658-0
                                                  • Opcode ID: 830834d16267ad5b151f7dc1236be670219e5efb9ddbf73b71b648d05e4c10b9
                                                  • Instruction ID: 8395febd1ec5320a4c08daad5be2324ed87ad3e792175f7d65897802fdc8d843
                                                  • Opcode Fuzzy Hash: 830834d16267ad5b151f7dc1236be670219e5efb9ddbf73b71b648d05e4c10b9
                                                  • Instruction Fuzzy Hash: 82519171601204FEEB339B94CC45FCABBB9AB0574CF108519A380B6EB0E7B19659DB74
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgCtrlID.USER32(?), ref: 6CD72D52
                                                  • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 6CD72D7A
                                                  • GetParent.USER32(?), ref: 6CD72D82
                                                  • InvalidateRect.USER32(00000000,00000000,00000000,?,00000000,?,?,?,?,?), ref: 6CD72D8C
                                                  • GetDlgCtrlID.USER32(?), ref: 6CD72D98
                                                  • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 6CD72DC0
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CallCtrlProcWindow$InvalidateParentRect
                                                  • String ID:
                                                  • API String ID: 1256023302-0
                                                  • Opcode ID: efb330797a9983074ebbfc209f441a2ec49933d25ed521d93da90ce867d0b6cc
                                                  • Instruction ID: 78dc26580f58281a58817cd5962eca6251067545f8cda02de43b7009b7989def
                                                  • Opcode Fuzzy Hash: efb330797a9983074ebbfc209f441a2ec49933d25ed521d93da90ce867d0b6cc
                                                  • Instruction Fuzzy Hash: C8210D311011C8EEDF324B64DA89FDD3666970570CF208822FA60D9975DB7AD4A196B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DialogBoxParamA.USER32(00000003,6CD758B0,?,00000001), ref: 6CD75822
                                                  • RtlMoveMemory.KERNEL32(?,?,?,00000003,6CD758B0,?,00000001,?,?), ref: 6CD7583F
                                                  • lstrcatA.KERNEL32(?,?,?,?,?,00000003,6CD758B0,?,00000001,?,?), ref: 6CD7584E
                                                  • RtlMoveMemory.KERNEL32(?,?,?,00000001,?,?), ref: 6CD7588D
                                                  Strings
                                                  • Can not use placeholders in console mode., xrefs: 6CD75869
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MemoryMove$DialogParamlstrcat
                                                  • String ID: Can not use placeholders in console mode.
                                                  • API String ID: 608252020-475865414
                                                  • Opcode ID: b9fe0be2780256e61d01704548ff4b0950cc4f5c56d5619dfd17f40bc39aa76d
                                                  • Instruction ID: d1d28022c5f1e8712239c81b8b5a3ed4686e1594a7b98dce99c64761a6714e1f
                                                  • Opcode Fuzzy Hash: b9fe0be2780256e61d01704548ff4b0950cc4f5c56d5619dfd17f40bc39aa76d
                                                  • Instruction Fuzzy Hash: 8621F8B5805269EBEB329B50CC40B9DFBBCEB46318F140999E78061971F7344986CBB6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(Imagehlp.dll), ref: 6CD72A02
                                                  • GetProcAddress.KERNEL32(00000000,CheckSumMappedFile), ref: 6CD72A13
                                                  • CloseHandle.KERNEL32(00000000,00000000,CheckSumMappedFile,Imagehlp.dll), ref: 6CD72A48
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: AddressCloseHandleLibraryLoadProc
                                                  • String ID: CheckSumMappedFile$Imagehlp.dll
                                                  • API String ID: 4093397079-2254704603
                                                  • Opcode ID: ddb6981d1028ca7f846b3db94b626ca6c2d8a9eec36b810a00ea3bb7d64ef7fb
                                                  • Instruction ID: bb9f21e3064dec9d45f46646fde28e588745f03ae3f88585c5216599ccf936b7
                                                  • Opcode Fuzzy Hash: ddb6981d1028ca7f846b3db94b626ca6c2d8a9eec36b810a00ea3bb7d64ef7fb
                                                  • Instruction Fuzzy Hash: A3F05471A00148EBEF218BA9CCC4ADE77FCA704308F1044616511D2B61FB74D6098B70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,6CD74F4B), ref: 6CD740D4
                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CD740DF
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  Strings
                                                  • Wow64DisableWow64FsRedirection, xrefs: 6CD740D9
                                                  • WOW64 File System Redirection : disabled, xrefs: 6CD740EF
                                                  • kernel32.dll, xrefs: 6CD740CF
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$AddressHandleModuleProc
                                                  • String ID: WOW64 File System Redirection : disabled$Wow64DisableWow64FsRedirection$kernel32.dll
                                                  • API String ID: 1180987372-1162415981
                                                  • Opcode ID: 3a8d609a235e1234edad06d12e889f6ea9bad761279875e8f113c7f1083a9111
                                                  • Instruction ID: dd25c50f11e619a4984a418e0cad2009ad4cb098346172fec71a0f1f145793d0
                                                  • Opcode Fuzzy Hash: 3a8d609a235e1234edad06d12e889f6ea9bad761279875e8f113c7f1083a9111
                                                  • Instruction Fuzzy Hash: 2EC09248501046B43A3023F22D09CBD2444CF4629C3880C106026E0E34EF34D11E8432
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,6CD7524F), ref: 6CD740FF
                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 6CD7410A
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  Strings
                                                  • kernel32.dll, xrefs: 6CD740FA
                                                  • WOW64 File System Redirection : enabled, xrefs: 6CD7411B
                                                  • Wow64RevertWow64FsRedirection, xrefs: 6CD74104
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$AddressHandleModuleProc
                                                  • String ID: WOW64 File System Redirection : enabled$Wow64RevertWow64FsRedirection$kernel32.dll
                                                  • API String ID: 1180987372-293881157
                                                  • Opcode ID: cd04c4c129e0d2063795312e7a5ec07993882f5a778e2d3f81684bce6c8ad8d5
                                                  • Instruction ID: 5e7a68fae298a7e5f270950244c89622f27d42211a875d8199ba1be0d3f23433
                                                  • Opcode Fuzzy Hash: cd04c4c129e0d2063795312e7a5ec07993882f5a778e2d3f81684bce6c8ad8d5
                                                  • Instruction Fuzzy Hash: B7C04828612085A9BA3237B24C08CAD2859DB8674839008166920F0E30EB7A899E9831
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(0000001F,6CD8DE3D,00000400,00000001), ref: 6CD75284
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000180,00000000,?), ref: 6CD722D9
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,0000018B,00000000,00000000), ref: 6CD722E8
                                                    • Part of subcall function 6CD722C0: SendMessageA.USER32(00000000,00000186,-00000001,00000000), ref: 6CD722F7
                                                  • lstrcpyA.KERNEL32(?,?,0000001F,6CD8DE3D,00000400,00000001,?,00000000,?,6CD763AF,00000000,00000001,00000000,6CD90A45,00000400,00000184), ref: 6CD752AB
                                                  • lstrcatA.KERNEL32(?,6CD7D6E7,?,?,0000001F,6CD8DE3D,00000400,00000001,?,00000000,?,6CD763AF,00000000,00000001,00000000,6CD90A45), ref: 6CD752B6
                                                  • lstrcatA.KERNEL32(?,?,?,6CD7D6E7,?,?,0000001F,6CD8DE3D,00000400,00000001,?,00000000,?,6CD763AF,00000000,00000001), ref: 6CD752C3
                                                  • lstrcpyA.KERNEL32(?,?,?,?,?,6CD7D6E7,?,?,0000001F,6CD8DE3D,00000400,00000001,?,00000000,?,6CD763AF), ref: 6CD752D0
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrcpy$LoadString
                                                  • String ID:
                                                  • API String ID: 1610432388-0
                                                  • Opcode ID: 6d60acfd1ce90dbc60a116bd308cb54ae168e92d124c836632833a7934c5ba09
                                                  • Instruction ID: c748986c43e002d9b13c8c82317a48e9368a0b8b3a21fd459a51b914ae555a65
                                                  • Opcode Fuzzy Hash: 6d60acfd1ce90dbc60a116bd308cb54ae168e92d124c836632833a7934c5ba09
                                                  • Instruction Fuzzy Hash: 9D5125B0505718DAE7318B20CC80FEB73A8EB4030CF14899DE79566970E7B56A899B75
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000001,?,?), ref: 6CD75714
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,?,00000000,?,00001000,00000004,00000001,?,?), ref: 6CD75729
                                                  • lstrcmpA.KERNEL32(?,?,?,?,?,00000000,?,00001000,00000004,00000001,?,?), ref: 6CD75739
                                                  • lstrcpyA.KERNEL32(?,?,?,?,?,?,?,00000000,?,00001000,00000004,00000001,?,?), ref: 6CD7577E
                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,?,00001000,00000004,00000001,?,?), ref: 6CD7578E
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Virtual$AllocEnvironmentExpandFreeStringslstrcmplstrcpy
                                                  • String ID:
                                                  • API String ID: 1433300790-0
                                                  • Opcode ID: 98a67a8e72961e8acd9c4207334b6e3eaf31fe18363ddb456b7e33c4f54bb585
                                                  • Instruction ID: 9e2473cae032cfd83cea5cbfe8f09d9ca18ca763a8edcdefbe08fb0f2b3367a5
                                                  • Opcode Fuzzy Hash: 98a67a8e72961e8acd9c4207334b6e3eaf31fe18363ddb456b7e33c4f54bb585
                                                  • Instruction Fuzzy Hash: DE110031944244FEEF31AF58DC41BCE7FB5AF06358F284054E590AA6B0F37546808B72
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(0000001D,6CD91245,00000400,00000001), ref: 6CD764BD
                                                  • LoadStringA.USER32(0000001C,6CD91645,00000400,00000001), ref: 6CD764F0
                                                  • LoadStringA.USER32(00000001,6CD91A45,00000400,00000002), ref: 6CD76532
                                                  • GetDlgItem.USER32(0000006C,00000001), ref: 6CD76554
                                                  • EnableWindow.USER32(00000000,00000000), ref: 6CD7655C
                                                  • RedrawWindow.USER32(00000000,00000000,00000001,0000006C,00000001,6CD91A45,00000400,00000002,0000001C,6CD91645,00000400,00000001,00000000,6CD90A45,00000400,00000184), ref: 6CD7656D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadString$Window$EnableItemRedraw
                                                  • String ID:
                                                  • API String ID: 3679095025-0
                                                  • Opcode ID: 61da26eddce4ff9474903512d92662c08716d941d854df9bc8307f64f10fdfd9
                                                  • Instruction ID: 1fb2268d3c0997b9ca558d02dd8332f01a746a44d42ecc439d46674def6c4f43
                                                  • Opcode Fuzzy Hash: 61da26eddce4ff9474903512d92662c08716d941d854df9bc8307f64f10fdfd9
                                                  • Instruction Fuzzy Hash: B3119134689518FAFF326B108D53FDE66B65B0132CF60541AB360F0DF1727149AAA135
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 6CD77273
                                                  • GetClientRect.USER32(?,?), ref: 6CD7727C
                                                  • GetWindowRect.USER32(?,?), ref: 6CD772BD
                                                  • GetWindowRect.USER32(?,?), ref: 6CD772C6
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?,?,?,?), ref: 6CD772EA
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Rect$Window$Client$Move
                                                  • String ID:
                                                  • API String ID: 2306913390-0
                                                  • Opcode ID: 5466a5f53e6a19e471acef218df414685dcc448f62439d56c97629f5dafe5c3d
                                                  • Instruction ID: 655a65950909486ec83e959ed65304e03df03a578bf320b16cbd46ad360f4aea
                                                  • Opcode Fuzzy Hash: 5466a5f53e6a19e471acef218df414685dcc448f62439d56c97629f5dafe5c3d
                                                  • Instruction Fuzzy Hash: 44116631181509AFCB25CF28CC80CDFBF79EF853187149618E559E7A60D731E955CAB4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_DYN_DATA$HKEY_LOCAL_MACHINE$HKEY_USERS
                                                  • API String ID: 0-225008743
                                                  • Opcode ID: ba5dd5511e6639a9e25d797ad0175d06d6681f619daf7969ee664e0def08da16
                                                  • Instruction ID: 10e084dbea22f763af4390c90c4c279c71fbe388731091af1a084af433152ab5
                                                  • Opcode Fuzzy Hash: ba5dd5511e6639a9e25d797ad0175d06d6681f619daf7969ee664e0def08da16
                                                  • Instruction Fuzzy Hash: 27F01D94398106B3E630633B5C65F4E219C47923ACF1D2F16BACEE6E32F438D44545B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetVersionExA.KERNEL32(00000094), ref: 6CD7A7C0
                                                  • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 6CD7A801
                                                  • lstrlenA.KERNEL32(?,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 6CD7A80D
                                                  • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,?,?,?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 6CD7A825
                                                  • RegCloseKey.ADVAPI32(?,00000000,?,?,00000000,00000001,?,?,?,?,?,00000000,00000000,00000000,000F003F,00000000), ref: 6CD7A82E
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValueVersionlstrlen
                                                  • String ID:
                                                  • API String ID: 721734588-0
                                                  • Opcode ID: 12882734470a7c121fd3b3d9354b65d5a640b25b0c2dc242800cee9784776ab0
                                                  • Instruction ID: 6bcb8ad2933d47486f2aa2e236d25248d8e87507a8a095a0b73ac29bb72cd5a8
                                                  • Opcode Fuzzy Hash: 12882734470a7c121fd3b3d9354b65d5a640b25b0c2dc242800cee9784776ab0
                                                  • Instruction Fuzzy Hash: 9A012D71A4420CFADF219F50CC01FED7B7AEB05304F104065B608656B0E775DA99DB71
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsDlgButtonChecked.USER32(0000006B), ref: 6CD72374
                                                  • CopyFileA.KERNEL32(6CD7DD11,6CD7D911,00000000), ref: 6CD7239E
                                                  • DeleteFileA.KERNEL32(6CD7DD11,0000006B), ref: 6CD723AD
                                                  • LoadStringA.USER32(0000000D,6CD82E3D,00000400,0000006B), ref: 6CD723E7
                                                  • SetFileAttributesA.KERNEL32(6CD7DD11), ref: 6CD72403
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesButtonCheckedCopyDeleteLoadString
                                                  • String ID:
                                                  • API String ID: 1907639918-0
                                                  • Opcode ID: bb954aedcc7190eb69f03c83207b628726167480792a29aec85ff1050bc091b3
                                                  • Instruction ID: 8ad9a00951ac3d5399b586882aa46a75d01aa06c87815dce4c552593833dd984
                                                  • Opcode Fuzzy Hash: bb954aedcc7190eb69f03c83207b628726167480792a29aec85ff1050bc091b3
                                                  • Instruction Fuzzy Hash: 9301A2A15491F4F9FF321315CC09B8E3A69971372CF04805AE240A4EB1D7B981DA83BA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(0000018B,00000000,00000000,6CD7333B), ref: 6CD73D33
                                                  • VirtualAlloc.KERNEL32(00000000,00050000,00001000,00000004,0000018B,00000000,00000000,6CD7333B), ref: 6CD73D4D
                                                  • SendMessageA.USER32(00000189,00000000,00000000,00000000), ref: 6CD73D67
                                                  • lstrcatA.KERNEL32(00000000,6CD7D338,00000189,00000000,00000000,00000000,00000000,00000000,00050000,00001000,00000004,0000018B,00000000,00000000,6CD7333B), ref: 6CD73D72
                                                  • VirtualFree.KERNEL32(6CD7D338,00050000,00004000,6CD7D338,00000189,00000000,00000000,00000000,00000000,00000000,00050000,00001000,00000004,0000018B,00000000,00000000), ref: 6CD73D97
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: MessageSendVirtual$AllocFreelstrcat
                                                  • String ID:
                                                  • API String ID: 3447240021-0
                                                  • Opcode ID: 82a068c881e7521a63f001da627799015f9ac5b1183c2aa663006d37b770d574
                                                  • Instruction ID: 9396d997eddace298c9fa7463fb6dd183d339100eee6ef511a6cdf8f882f4751
                                                  • Opcode Fuzzy Hash: 82a068c881e7521a63f001da627799015f9ac5b1183c2aa663006d37b770d574
                                                  • Instruction Fuzzy Hash: 4EF030743942507DFB3717218D96FBE25698782F19F200129F741A9AF0A7F0258B9539
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 6CD72B0F
                                                  • GetWindowRect.USER32(00000000,?), ref: 6CD72B16
                                                  • GetDlgItem.USER32(?,?), ref: 6CD72B21
                                                  • GetWindowRect.USER32(00000000,?), ref: 6CD72B28
                                                  • IntersectRect.USER32(?,?,?), ref: 6CD72B33
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Rect$ItemWindow$Intersect
                                                  • String ID:
                                                  • API String ID: 3468032208-0
                                                  • Opcode ID: 1583048bf30bbd94fd84b6852f8b8492155a7e860697753d1d4a9878ad06f0cf
                                                  • Instruction ID: d70447f8f3f158c67cd7f550618432444b2f6ff471b0d161ed7975d68cf2f268
                                                  • Opcode Fuzzy Hash: 1583048bf30bbd94fd84b6852f8b8492155a7e860697753d1d4a9878ad06f0cf
                                                  • Instruction Fuzzy Hash: 3FE06D724802187ACF20AFA5DC44CCF3F2DEF85314B008414B905F2920F731961ACAB0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadBitmapA.USER32(BTN_PATCH_DISABLED), ref: 6CD76586
                                                  • GetWindowLongA.USER32(?,0000000C), ref: 6CD76596
                                                  • SendMessageA.USER32(00000000,00000172,00000000,00000000), ref: 6CD765A4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: BitmapLoadLongMessageSendWindow
                                                  • String ID: BTN_PATCH_DISABLED
                                                  • API String ID: 1801189489-85872909
                                                  • Opcode ID: e70bd43234a786eb8b7abff53ca9c0b0f2775cf14c9996ab750ea9d9261bf097
                                                  • Instruction ID: 8269a624267fdb333384030239bc3e591ac4a060943d8eeb8dbc901bf3b8674e
                                                  • Opcode Fuzzy Hash: e70bd43234a786eb8b7abff53ca9c0b0f2775cf14c9996ab750ea9d9261bf097
                                                  • Instruction Fuzzy Hash: A3D05E602D0204BAFD3227658C41F9E7D9EC7417A8F0085207200E8AF2F6F18C0A9134
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MapViewOfFile.KERNEL32(?,00000002,?,?,?,?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911,C0000000), ref: 6CD746D0
                                                  • UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000002,?,?,?,?,?), ref: 6CD74728
                                                  • CloseHandle.KERNEL32(?,?,00000002,?,?,?,?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911), ref: 6CD74778
                                                  • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,?,?,6CD7D911,C0000000,00000002,00000000,00000003,00000082,00000000), ref: 6CD74780
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CloseFileHandleView$Unmap
                                                  • String ID:
                                                  • API String ID: 1018311036-0
                                                  • Opcode ID: bebd379d78e274509ed2ddcb114f777929fc978b1644fa0436d2f855a2926af5
                                                  • Instruction ID: a6101d47d1df8de3ead428c6dd5d53c00df598a03db652b74346baf16fe87828
                                                  • Opcode Fuzzy Hash: bebd379d78e274509ed2ddcb114f777929fc978b1644fa0436d2f855a2926af5
                                                  • Instruction Fuzzy Hash: 8A212A75D00108EFCF22DF94D980AEDBBB6FF41318F20812AE151A2974E7346996CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgCtrlID.USER32(?), ref: 6CD72D52
                                                  • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 6CD72D7A
                                                  • GetParent.USER32(?), ref: 6CD72D82
                                                  • InvalidateRect.USER32(00000000,00000000,00000000,?,00000000,?,?,?,?,?), ref: 6CD72D8C
                                                  • GetDlgCtrlID.USER32(?), ref: 6CD72D98
                                                  • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 6CD72DC0
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CallCtrlProcWindow$InvalidateParentRect
                                                  • String ID:
                                                  • API String ID: 1256023302-0
                                                  • Opcode ID: 654079da38aa842e94f9b5460a9526d4c0aa41deea818012fc5e3e6ff99bc775
                                                  • Instruction ID: 143d15ba28711e922582140a3d3ed21d00bc95149d5cbcec1acfb98b48b9eb3f
                                                  • Opcode Fuzzy Hash: 654079da38aa842e94f9b5460a9526d4c0aa41deea818012fc5e3e6ff99bc775
                                                  • Instruction Fuzzy Hash: 3001CC301412C8EEEF324B24CA8DFDD3657974470CF304822EDA4E99B9DA79D49195B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetVersionExA.KERNEL32(?), ref: 6CD76F20
                                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,?), ref: 6CD76F57
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00000000,00000001,?), ref: 6CD76F82
                                                  • RegCloseKey.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,?,00000000,00000001,?), ref: 6CD76F8B
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValueVersion
                                                  • String ID:
                                                  • API String ID: 2996790148-0
                                                  • Opcode ID: e1892d3d9792545cd93157d0401ee52856a44f0dfdadaad5d0370727a44a8380
                                                  • Instruction ID: 94143380e568ae2c1b4292bcab1775704350faba540e9d3c126ffab0fabdebc6
                                                  • Opcode Fuzzy Hash: e1892d3d9792545cd93157d0401ee52856a44f0dfdadaad5d0370727a44a8380
                                                  • Instruction Fuzzy Hash: 0E010C7192020CEFDF208F50CC41BEEBBB9EB05308F1041A5F604E5AB0E7759A999B71
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D67
                                                  • WriteFile.KERNEL32(00000400,6CD7E111,?,?,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D89
                                                  • FlushFileBuffers.KERNEL32(00000400,00000400,6CD7E111,?,?,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D91
                                                  • CloseHandle.KERNEL32(00000400,00000400,00000400,6CD7E111,?,?,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D99
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: File$BuffersCloseCreateFlushHandleWrite
                                                  • String ID:
                                                  • API String ID: 4137531733-0
                                                  • Opcode ID: dcaf5e4410800bcd8cafecdb1ba5ccb07b804effd0555680af52f84d583d2cd7
                                                  • Instruction ID: cfddf8f48a32d3003be818a889129d95eb2ff021526c48f46cfb61ae0995d78e
                                                  • Opcode Fuzzy Hash: dcaf5e4410800bcd8cafecdb1ba5ccb07b804effd0555680af52f84d583d2cd7
                                                  • Instruction Fuzzy Hash: 36F03731540108FADF319F60CC43FCD7775AB10718F208251B620F55F0E7719A25A769
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 6CD770C2
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000200,00000000), ref: 6CD770D4
                                                  • lstrlenA.KERNEL32(?,00000000,?,00000200,00000000), ref: 6CD770DA
                                                  • SetCurrentDirectoryA.KERNEL32(00000000), ref: 6CD770F4
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Module$CurrentDirectoryFileHandleNamelstrlen
                                                  • String ID:
                                                  • API String ID: 2912049553-0
                                                  • Opcode ID: 6d1e60377f57e4e8f8d8ec634b370f6db650299c7fccfbd2552bb4bd7925805e
                                                  • Instruction ID: 24e419995c8857fda93045159a97e491c8a7544af3c437383d4f575b889ca605
                                                  • Opcode Fuzzy Hash: 6d1e60377f57e4e8f8d8ec634b370f6db650299c7fccfbd2552bb4bd7925805e
                                                  • Instruction Fuzzy Hash: 77E02B21848220B9D7325B644C08FCF7AE89F07358F154854E684BABA1F7F4114683F4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadStringA.USER32(0000001D,6CD91245,00000400,00000001), ref: 6CD764BD
                                                  • LoadStringA.USER32(00000001,6CD91A45,00000400,00000002), ref: 6CD76532
                                                  • GetDlgItem.USER32(0000006C,00000001), ref: 6CD76554
                                                  • EnableWindow.USER32(00000000,00000000), ref: 6CD7655C
                                                  • RedrawWindow.USER32(00000000,00000000,00000001,0000006C,00000001,6CD91A45,00000400,00000002,0000001C,6CD91645,00000400,00000001,00000000,6CD90A45,00000400,00000184), ref: 6CD7656D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: LoadStringWindow$EnableItemRedraw
                                                  • String ID:
                                                  • API String ID: 3001624229-0
                                                  • Opcode ID: ad44e173752718e8fe3031ee70f4ce2794685dbc448da2d4fb49cbba73b35a24
                                                  • Instruction ID: 0fa90008762936d95b3182a72ec38fbded92ef5b993f41a96717a5068168edf0
                                                  • Opcode Fuzzy Hash: ad44e173752718e8fe3031ee70f4ce2794685dbc448da2d4fb49cbba73b35a24
                                                  • Instruction Fuzzy Hash: 3CE04F317C522079FE32A7249C83F8CAA699741B1CF504021B340F8DF4B7B2581E9174
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000400,6CD7E111), ref: 6CD72AA7
                                                  • lstrcatA.KERNEL32(6CD7E111,\bassmod.dll,00000400,6CD7E111), ref: 6CD72AB6
                                                    • Part of subcall function 6CD76D4C: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 6CD76D67
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2063752060.000000006CD71000.00000080.00000001.01000000.00000003.sdmp, Offset: 6CD70000, based on PE: true
                                                  • Associated: 00000003.00000002.2063740343.000000006CD70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063764357.000000006CD7B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063775261.000000006CD7D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CD93000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063788682.000000006CDC9000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000003.00000002.2063853540.000000006CE56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_6cd70000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: CreateFilePathTemplstrcat
                                                  • String ID: \bassmod.dll
                                                  • API String ID: 3703170275-1657146168
                                                  • Opcode ID: 6a69dd0cc4d1a91708bae066ddfdde8594bb12f72426e97fbc9d0b49ea6458be
                                                  • Instruction ID: a4feb6a2a882a1b295147ccabcace170951432a388863e19d749ca143c1c5b84
                                                  • Opcode Fuzzy Hash: 6a69dd0cc4d1a91708bae066ddfdde8594bb12f72426e97fbc9d0b49ea6458be
                                                  • Instruction Fuzzy Hash: D8F0E53024824979FF3193608C43FEEBA998B0131CF1145A4B950F6EE1EAF1AA0E8271
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:8.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:90
                                                  Total number of Limit Nodes:6
                                                  execution_graph 817 10001060 820 10001288 817->820 819 1000106b 821 10001380 6 API calls 820->821 823 1000128d 821->823 822 10001287 822->819 823->822 824 100012e2 HeapCreate 823->824 829 100012fc 824->829 825 10001384 827 10001390 WaitForSingleObject CloseHandle 825->827 828 100013a2 825->828 826 10001316 waveOutPrepareHeader 830 1000133e 826->830 827->828 831 100013d0 828->831 832 100013b1 waveOutReset waveOutUnprepareHeader waveOutClose 828->832 833 10001b17 RtlAllocateHeap 829->833 836 1000130e 829->836 837 10001348 waveOutWrite 830->837 834 100013d7 HeapDestroy 831->834 835 100013ee 831->835 832->831 833->836 834->835 835->819 836->825 836->826 837->825 838 1000135a CreateThread 837->838 838->825 839 10001371 SetThreadPriority 838->839 840 100013f3 2 API calls 838->840 839->819 839->825 857 10001030 858 10001288 20 API calls 857->858 859 10001040 858->859 812 10001414 Sleep 813 10001422 812->813 814 10001427 812->814 815 100013fa waveOutGetPosition 814->815 816 1000142c 814->816 815->812 841 100011a4 CreateFileA 842 10001ae4 843 10001aeb 842->843 844 10001b23 842->844 845 10001134 RtlAllocateHeap 844->845 847 10001f02 844->847 850 10001bc7 845->850 846 10001134 RtlAllocateHeap 846->850 848 10001134 RtlAllocateHeap 849 10001cd4 848->849 849->848 852 10001d05 849->852 850->846 850->847 850->849 851 10001134 RtlAllocateHeap 851->852 852->847 852->851 852->852 766 10001288 786 10001380 766->786 768 10001287 770 100012e2 HeapCreate 775 100012fc 770->775 771 10001384 773 10001390 WaitForSingleObject CloseHandle 771->773 774 100013a2 771->774 772 10001316 waveOutPrepareHeader 776 1000133e 772->776 773->774 777 100013d0 774->777 778 100013b1 waveOutReset waveOutUnprepareHeader waveOutClose 774->778 782 1000130e 775->782 794 10001b17 775->794 783 10001348 waveOutWrite 776->783 780 100013d7 HeapDestroy 777->780 781 100013ee 777->781 778->777 780->781 782->771 782->772 783->771 784 1000135a CreateThread 783->784 784->771 785 10001371 SetThreadPriority 784->785 806 100013f3 784->806 785->771 787 10001384 786->787 788 10001390 WaitForSingleObject CloseHandle 787->788 789 100013a2 787->789 788->789 790 100013d0 789->790 791 100013b1 waveOutReset waveOutUnprepareHeader waveOutClose 789->791 792 100013d7 HeapDestroy 790->792 793 1000128d 790->793 791->790 792->793 793->768 793->770 796 10001b2c 794->796 795 10001f02 795->782 796->795 804 10001134 RtlAllocateHeap 796->804 798 10001bc7 798->795 799 10001134 RtlAllocateHeap 798->799 800 10001cd4 798->800 799->798 801 10001134 RtlAllocateHeap 800->801 803 10001d05 800->803 801->800 802 10001134 RtlAllocateHeap 802->803 803->795 803->802 803->803 805 10001147 804->805 805->798 807 100013fa waveOutGetPosition 806->807 808 10001414 Sleep 807->808 809 10001422 808->809 810 10001427 808->810 810->807 811 1000142c 810->811 860 1000117a FindResourceA SizeofResource LoadResource 853 100011ec 856 100011f1 853->856 854 100011f5 855 100011cf SetFilePointer ReadFile 855->856 856->854 856->855

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_10001000 1 Function_10001380 2 Function_10001A80 3 Function_10001982 4 Function_10002203 5 Function_10001B05 6 Function_10001F06 6->2 6->3 9 Function_10002789 6->9 12 Function_1000188E 6->12 7 Function_10001288 7->1 17 Function_10001B17 7->17 37 Function_10001449 7->37 59 Function_100013F3 7->59 8 Function_10002308 10 Function_1000100C 11 Function_1000260D 13 Function_1000110E 14 Function_10001010 15 Function_10001112 16 Function_10001414 17->5 28 Function_10001134 17->28 60 Function_10001273 17->60 18 Function_1000111A 19 Function_1000101C 20 Function_1000111E 21 Function_10001020 22 Function_10002220 23 Function_100011A4 24 Function_100010A4 25 Function_100026A5 26 Function_10001026 27 Function_10001030 27->7 29 Function_10002234 30 Function_100021BB 31 Function_1000263B 32 Function_100022BE 33 Function_1000193F 57 Function_100018EF 33->57 34 Function_10002244 35 Function_100010C6 36 Function_100022C7 37->6 46 Function_10001654 37->46 54 Function_100023EA 37->54 38 Function_10001049 39 Function_1000114B 40 Function_1000194D 40->57 41 Function_100011CF 42 Function_100026CF 43 Function_10001050 44 Function_100022D0 45 Function_100022D3 47 Function_10001056 48 Function_1000195E 49 Function_10001060 49->7 50 Function_100022E2 51 Function_10001AE4 51->5 51->28 51->60 52 Function_100015E5 53 Function_100021E6 54->3 54->9 54->33 54->48 55 Function_100011EC 55->41 56 Function_1000126C 58 Function_100010F0 61 Function_10002577 61->33 62 Function_1000117A 63 Function_100026FA 64 Function_1000257E 64->48

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 10001380: WaitForSingleObject.KERNEL32(?,10004160,?,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 10001396
                                                    • Part of subcall function 10001380: CloseHandle.KERNEL32(?,10004160,?,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 1000139C
                                                    • Part of subcall function 10001380: waveOutReset.WINMM(02F3B000,02F3B000,10016198,00000020,02F3B000,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013BE
                                                    • Part of subcall function 10001380: waveOutUnprepareHeader.WINMM(?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013C4
                                                    • Part of subcall function 10001380: waveOutClose.WINMM(?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013CA
                                                    • Part of subcall function 10001380: HeapDestroy.KERNEL32(05F00000,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013DB
                                                  • HeapCreate.KERNEL32(10004164,000000FF,10001074,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,10001040,00000001), ref: 100012F0
                                                  • waveOutPrepareHeader.WINMM(10004164,10016198,00000020,0000000C,?,?,?,?,10001040,00000001), ref: 10001336
                                                  • waveOutWrite.WINMM(10004164,10016198,00000020,?,?,?,?,10001040,00000001), ref: 10001350
                                                  • CreateThread.KERNELBASE(00000000,00000000,100013F3,00000000,00000000,10006188), ref: 10001364
                                                  • SetThreadPriority.KERNELBASE(00000000,0000000F,?,?,?,?,10001040,00000001), ref: 10001374
                                                  Memory Dump Source
                                                  • Source File: 00000010.00000002.3502842136.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000010.00000002.3502829670.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502854782.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502867246.0000000010004000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502881574.0000000010017000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_16_2_10000000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: wave$CloseCreateHeaderHeapThread$DestroyHandleObjectPreparePriorityResetSingleUnprepareWaitWrite
                                                  • String ID:
                                                  • API String ID: 2713968407-0
                                                  • Opcode ID: 2009b84035df47f8c19b9643b934a29b422089fded2b8bd7dafb2442abd2461e
                                                  • Instruction ID: ac5d36506aa8d357ea39ce6044d3386a5bac6df8a4522790fc0c896b20e12fd4
                                                  • Opcode Fuzzy Hash: 2009b84035df47f8c19b9643b934a29b422089fded2b8bd7dafb2442abd2461e
                                                  • Instruction Fuzzy Hash: 02415971A01255ABFB11CF25CC98BEF7BA8EF857D1F518528FA449B159CB349A00CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 31 100013f3-100013f5 32 100013fa-10001420 waveOutGetPosition Sleep 31->32 34 10001422-10001424 32->34 35 10001427-1000142a 32->35 35->32 36 1000142c-10001433 35->36 37 10001444 36->37 38 10001435-1000143f 36->38 38->37 39 10001441 38->39 39->37
                                                  APIs
                                                  • waveOutGetPosition.WINMM(?,00000004,0000000C), ref: 10001405
                                                  • Sleep.KERNELBASE(00000005), ref: 10001416
                                                  Memory Dump Source
                                                  • Source File: 00000010.00000002.3502842136.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000010.00000002.3502829670.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502854782.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502867246.0000000010004000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502881574.0000000010017000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_16_2_10000000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: PositionSleepwave
                                                  • String ID:
                                                  • API String ID: 2381551157-0
                                                  • Opcode ID: cf7434af3cec0125fce73027c4f15a138c38a2a64dc93ea248612d2cb0c73b90
                                                  • Instruction ID: 708fbda80c6a82a2279f4d4a49f6192a252f93001582e63d44a1b805c9e5f71e
                                                  • Opcode Fuzzy Hash: cf7434af3cec0125fce73027c4f15a138c38a2a64dc93ea248612d2cb0c73b90
                                                  • Instruction Fuzzy Hash: 51F08C329002D8EBFB02CF148C00BC63F68EB163D1F0A4061FA456A1AAC3B48D80CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 40 10001134-10001145 RtlAllocateHeap 41 10001147-10001149 40->41 42 1000114a 40->42 41->42
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000009,10004000,10001BC7,10004164), ref: 1000113D
                                                  Memory Dump Source
                                                  • Source File: 00000010.00000002.3502842136.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000010.00000002.3502829670.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502854782.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502867246.0000000010004000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502881574.0000000010017000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_16_2_10000000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 9098c2567be60f5a839c9e852f95c253592f1850101e8cd0641dedea866c5221
                                                  • Instruction ID: 2161fad69fcb9aae42f35faaec487752547eb58a6de77c809ca4bc1e54b3640a
                                                  • Opcode Fuzzy Hash: 9098c2567be60f5a839c9e852f95c253592f1850101e8cd0641dedea866c5221
                                                  • Instruction Fuzzy Hash: CCB092763402119FF7128B61BC89BA63798EB80BE8B238421E512D50A8F65188805550
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 43 10001414-10001420 Sleep 44 10001422-10001424 43->44 45 10001427-1000142a 43->45 46 100013fa-10001411 waveOutGetPosition 45->46 47 1000142c-10001433 45->47 46->43 48 10001444 47->48 49 10001435-1000143f 47->49 49->48 50 10001441 49->50 50->48
                                                  APIs
                                                  • Sleep.KERNELBASE(00000005), ref: 10001416
                                                  Memory Dump Source
                                                  • Source File: 00000010.00000002.3502842136.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000010.00000002.3502829670.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502854782.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502867246.0000000010004000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502881574.0000000010017000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_16_2_10000000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 6d46402de44bb3ab673ab0dea5f0a5686e666231684e6e2dd873c03bb3975b8e
                                                  • Instruction ID: 26896bdba1bfa70f82b30afd89e87a67b1790004b5f4f36a08bb48c09e2d2b29
                                                  • Opcode Fuzzy Hash: 6d46402de44bb3ab673ab0dea5f0a5686e666231684e6e2dd873c03bb3975b8e
                                                  • Instruction Fuzzy Hash: 7AB0923218025486F3019F80A8087D67358D720393F40C026E225440E4837488A1DE60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,10004160,?,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 10001396
                                                  • CloseHandle.KERNEL32(?,10004160,?,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 1000139C
                                                  • waveOutReset.WINMM(02F3B000,02F3B000,10016198,00000020,02F3B000,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013BE
                                                  • waveOutUnprepareHeader.WINMM(?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013C4
                                                  • waveOutClose.WINMM(?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013CA
                                                  • HeapDestroy.KERNEL32(05F00000,?,?,?,?,1000128D,10001040,?,?,00000001), ref: 100013DB
                                                  Memory Dump Source
                                                  • Source File: 00000010.00000002.3502842136.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000010.00000002.3502829670.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502854782.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502867246.0000000010004000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000010.00000002.3502881574.0000000010017000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_16_2_10000000_rundll32.jbxd
                                                  Similarity
                                                  • API ID: wave$Close$DestroyHandleHeaderHeapObjectResetSingleUnprepareWait
                                                  • String ID:
                                                  • API String ID: 755419389-0
                                                  • Opcode ID: 0c8edf64347d0c7ab07e493f9c5edb427a8040aef40a79b560d8962686cbdfcc
                                                  • Instruction ID: 7a5e45d39f3742ef7a03327aef812cd67cbe7a1c08f55e259b8cce1fe85a7349
                                                  • Opcode Fuzzy Hash: 0c8edf64347d0c7ab07e493f9c5edb427a8040aef40a79b560d8962686cbdfcc
                                                  • Instruction Fuzzy Hash: D401FBB1601258BBEB119F56DC98AAF7BBCFB84AD1B518029F909CB254C735DE048A60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%