Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dZIZhRHDXv.exe

Overview

General Information

Sample name:dZIZhRHDXv.exe
renamed because original name is a hash value
Original sample name:e5a12459a39aa142a12c58d9afbe5b0d.exe
Analysis ID:1543219
MD5:e5a12459a39aa142a12c58d9afbe5b0d
SHA1:bebd558572194c56815a2fbaf016d1d4d0922ed3
SHA256:a45e9fae49d4af114a252f3cd5b69f33cb5994915a75cb51983910c9f21d81e5
Tags:exeuser-abuse_ch
Infos:

Detection

RHADAMANTHYS
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
One or more processes crash
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • dZIZhRHDXv.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\dZIZhRHDXv.exe" MD5: E5A12459A39AA142A12C58D9AFBE5B0D)
    • dialer.exe (PID: 7684 cmdline: "C:\Windows\system32\dialer.exe" MD5: E4BD77FB64DDE78F1A95ECE09F6A9B85)
    • WerFault.exe (PID: 7756 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 708 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7788 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 704 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
{"C2 url": "https://138.201.226.224:9292/bcacc1e7778c536b694/6wlh52ro.x0plp"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1791313957.00000000006A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
      00000001.00000003.1822087119.0000000005475000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
        00000001.00000003.1794640183.00000000033E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
          00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            0.3.dZIZhRHDXv.exe.4250000.8.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              1.3.dialer.exe.5720000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.3.dZIZhRHDXv.exe.4030000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  0.3.dZIZhRHDXv.exe.4250000.8.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    1.3.dialer.exe.5500000.6.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000003.1757931236.0000000002880000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Rhadamanthys {"C2 url": "https://138.201.226.224:9292/bcacc1e7778c536b694/6wlh52ro.x0plp"}
                      Source: dZIZhRHDXv.exeReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: dZIZhRHDXv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: dZIZhRHDXv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: wkernel32.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002A90000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793169848.00000000040B0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796451170.0000000003460000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796547390.0000000005580000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1792273411.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792472803.0000000004220000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795816573.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795591609.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1792713277.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792865220.00000000041D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796048912.0000000005500000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796213656.00000000056A0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1792273411.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792472803.0000000004220000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795816573.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795591609.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1792713277.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792865220.00000000041D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796048912.0000000005500000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796213656.00000000056A0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\minipath.pdb source: dZIZhRHDXv.exe
                      Source: Binary string: wkernel32.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002A90000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793169848.00000000040B0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796451170.0000000003460000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796547390.0000000005580000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E4CEA5 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00E4CEA5

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://138.201.226.224:9292/bcacc1e7778c536b694/6wlh52ro.x0plp
                      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 138.201.226.224:9292
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 138.201.226.224
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057C9F64 memset,memset,WSARecv,GetLastError,WSAGetLastError,WSAGetLastError,WSAGetLastError,RegisterWaitForSingleObject,1_2_057C9F64
                      Source: dialer.exe, 00000001.00000002.3000230789.000000000303C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://138.201.226.224:9292/bcacc1e7778c536b694/6wlh52ro.x0plp
                      Source: dZIZhRHDXv.exeString found in binary or memory: https://www.flos-freeware.chopenmailto:florian.balmer
                      Source: dZIZhRHDXv.exeString found in binary or memory: https://www.rizonesoft.com
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E02050 GetFileAttributesW,GetFileAttributesW,MessageBeep,DialogBoxIndirectParamW,LocalFree,ShellExecuteExW,GetShortPathNameW,StrCatBuffW,StrCatBuffW,StrCatBuffW,StrCatBuffW,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,SendMessageW,SendMessageW,SendMessageW,LdrInitializeThunk,StrRetToBufW,PathRemoveBackslashW,PathIsSameRootW,SetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,PostMessageW,GetFocus,GetDlgCtrlID,GetDlgItem,SetFocus,GetDlgItem,SetFocus,PathFileExistsW,lstrcpyW,StrRChrW,PathIsRootW,SetCurrentDirectoryW,SendMessageW,SendMessageW,lstrcpynW,MessageBeep,lstrcpynW,PathIsRootW,PathIsRootW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,0_2_00E02050
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E02050 GetFileAttributesW,GetFileAttributesW,MessageBeep,DialogBoxIndirectParamW,LocalFree,ShellExecuteExW,GetShortPathNameW,StrCatBuffW,StrCatBuffW,StrCatBuffW,StrCatBuffW,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,SendMessageW,SendMessageW,SendMessageW,LdrInitializeThunk,StrRetToBufW,PathRemoveBackslashW,PathIsSameRootW,SetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,PostMessageW,GetFocus,GetDlgCtrlID,GetDlgItem,SetFocus,GetDlgItem,SetFocus,PathFileExistsW,lstrcpyW,StrRChrW,PathIsRootW,SetCurrentDirectoryW,SendMessageW,SendMessageW,lstrcpynW,MessageBeep,lstrcpynW,PathIsRootW,PathIsRootW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,0_2_00E02050
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_cd5390ae-4
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_c3e6f367-8
                      Source: Yara matchFile source: 0.3.dZIZhRHDXv.exe.4250000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.5720000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.dZIZhRHDXv.exe.4030000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.dZIZhRHDXv.exe.4250000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.5500000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: dZIZhRHDXv.exe PID: 7624, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 7684, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02902F400_3_02902F40
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_029026400_3_02902640
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02901A400_3_02901A40
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02901FA00_3_02901FA0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_029017100_3_02901710
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DEA0B00_2_00DEA0B0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DFEFB00_2_00DFEFB0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E1A0800_2_00E1A080
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E300200_2_00E30020
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E3037E0_2_00E3037E
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E306EB0_2_00E306EB
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E1A6200_2_00E1A620
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E009E00_2_00E009E0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E5690C0_2_00E5690C
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E1AA700_2_00E1AA70
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E30A490_2_00E30A49
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2EC1F0_2_00E2EC1F
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E30E3D0_2_00E30E3D
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2EF610_2_00E2EF61
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2F2B20_2_00E2F2B2
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E312400_2_00E31240
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E5F21D0_2_00E5F21D
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E173E00_2_00E173E0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E554EF0_2_00E554EF
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2F5F40_2_00E2F5F4
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D839870_2_00D83987
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2F9530_2_00E2F953
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E2FCC10_2_00E2FCC1
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E0DFC90_2_00E0DFC9
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E17F770_2_00E17F77
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057D35731_2_057D3573
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E35241_2_057E3524
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057DC4581_2_057DC458
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057DBC111_2_057DBC11
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E2CBD1_2_057E2CBD
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057CD73D1_2_057CD73D
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E27211_2_057E2721
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057DC7EB1_2_057DC7EB
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E7FA21_2_057E7FA2
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E3F8C1_2_057E3F8C
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057C86531_2_057C8653
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E20091_2_057E2009
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057D38DB1_2_057D38DB
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057C834D1_2_057C834D
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E3BC51_2_057E3BC5
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E5BA41_2_057E5BA4
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E22B41_2_057E22B4
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: String function: 00E09F70 appears 52 times
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: String function: 00E49B2C appears 34 times
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: String function: 00D9C0C3 appears 111 times
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 708
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1792273411.00000000041A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1794274856.0000000002986000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlashDevelop.exe vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1792865220.00000000042FD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002A90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000000.1757297443.0000000000E82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameminipath.exeD vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004431000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1757931236.0000000002880000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlashDevelop.exe vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1792472803.00000000043A6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002B22000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793169848.00000000040B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1792713277.0000000004153000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exe, 00000000.00000003.1793169848.0000000004100000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exeBinary or memory string: OriginalFilenameminipath.exeD vs dZIZhRHDXv.exe
                      Source: dZIZhRHDXv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal80.troj.evad.winEXE@5/0@0/1
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DF86E0 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalFree,GetFocus,MessageBoxExW,LocalFree,LocalFree,0_2_00DF86E0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DFB810 CoCreateInstance,lstrcpyW,ExpandEnvironmentStringsW,lstrcpynW,0_2_00DFB810
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DFD1D0 FindResourceW,LoadResource,LockResource,SizeofResource,LocalAlloc,FreeResource,lstrlenW,lstrlenW,FreeResource,0_2_00DFD1D0
                      Source: C:\Windows\SysWOW64\dialer.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\302c6948-e75b-4b17-9040-ca23feb115aeJump to behavior
                      Source: dZIZhRHDXv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: dZIZhRHDXv.exeReversingLabs: Detection: 47%
                      Source: unknownProcess created: C:\Users\user\Desktop\dZIZhRHDXv.exe "C:\Users\user\Desktop\dZIZhRHDXv.exe"
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 708
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 704
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: tapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: dZIZhRHDXv.exeStatic file information: File size 1374208 > 1048576
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_CURSOR
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_BITMAP
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_ICON
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_MENU
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_DIALOG
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_STRING
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_ACCELERATOR
                      Source: dZIZhRHDXv.exeStatic PE information: section name: RT_GROUP_ICON
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: dZIZhRHDXv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: dZIZhRHDXv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wkernel32.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002A90000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793169848.00000000040B0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796451170.0000000003460000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796547390.0000000005580000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1792273411.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792472803.0000000004220000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795816573.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795591609.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1792713277.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792865220.00000000041D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796048912.0000000005500000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796213656.00000000056A0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1792273411.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792472803.0000000004220000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795816573.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1795591609.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: dZIZhRHDXv.exe, 00000000.00000003.1792713277.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1792865220.00000000041D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796048912.0000000005500000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796213656.00000000056A0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\minipath.pdb source: dZIZhRHDXv.exe
                      Source: Binary string: wkernel32.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1793076231.0000000002A90000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793169848.00000000040B0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796451170.0000000003460000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796547390.0000000005580000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: dZIZhRHDXv.exe, 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, dZIZhRHDXv.exe, 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp
                      Source: dZIZhRHDXv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: dZIZhRHDXv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: dZIZhRHDXv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: dZIZhRHDXv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: dZIZhRHDXv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E009E0 SendMessageW,LoadLibraryW,GetProcAddress,FreeLibrary,CreateWindowExW,SendMessageW,LoadImageW,CopyImage,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetSysColor,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetObjectW,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetObjectW,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetSysColor,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetSysColor,ImageList_Create,ImageList_AddMasked,SendMessageW,DeleteObject,wsprintfW,lstrcmpiW,lstrcmpiW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,CreateWindowExW,SystemParametersInfoW,SystemParametersInfoW,CreateWindowExW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,SystemParametersInfoW,SendMessageW,SystemParametersInfoW,GetSysColor,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,SystemParametersInfoW,SystemParametersInfoW,GetSysColor,SendMessageW,SetWindowPos,GetWindowRect,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,0_2_00E009E0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02914285 push F693B671h; retf 0_3_0291428A
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02913AF4 pushad ; retf 0_3_02913B03
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02914F48 push es; ret 0_3_02914F49
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02910F4E push eax; retf 0_3_02910F4F
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02913DCE push edi; iretd 0_3_02913DD5
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_0291212F pushad ; ret 0_3_02912137
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_0291457C push esi; ret 0_3_02914580
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_0291216F push ecx; iretd 0_3_0291217B
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D861D5 push 9D679010h; ret 0_2_00D861EE
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D861EF push 9D679010h; ret 0_2_00D861EE
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E605E7 push ecx; ret 0_2_00E605FA
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D84A01 push ebx; retf 0_2_00D84A14
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D8546E push cs; ret 0_2_00D854B8
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D83400 push ebp; retf 0_2_00D83406
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D8383E push ebx; iretd 0_2_00D83840
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00D83901 push ebx; iretd 0_2_00D83983
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03074305 push F693B671h; retf 1_3_0307430A
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03073B74 pushad ; retf 1_3_03073B83
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_030721AF pushad ; ret 1_3_030721B7
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03070FCE push eax; retf 1_3_03070FCF
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03074FC8 push es; ret 1_3_03074FC9
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_030721EF push ecx; iretd 1_3_030721FB
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_030745FC push esi; ret 1_3_03074600
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03073E4E push edi; iretd 1_3_03073E55
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03075CD2 push dword ptr [edx+ebp+3Bh]; retf 1_3_03075CDF
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057E98F0 push eax; ret 1_2_057E991E
                      Source: dZIZhRHDXv.exeStatic PE information: section name: .text entropy: 7.308659196103948
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E06140 GetSysColor,EnumWindows,IsWindowEnabled,IsIconic,ShowWindowAsync,IsWindowVisible,SendMessageW,SendMessageW,SendMessageW,SetForegroundWindow,GlobalSize,PathIsRelativeW,GetCurrentDirectoryW,PathAppendW,lstrcpyW,GlobalSize,SendMessageW,GlobalFree,LoadStringW,LoadStringW,LoadStringW,StrChrW,MessageBoxW,0_2_00E06140
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DFEFB0 DefWindowProcW,SendMessageW,DefWindowProcW,WaitForSingleObject,FindNextChangeNotification,SendMessageW,SetWindowPos,SetWindowPos,DefWindowProcW,ShowOwnedPopups,ShowOwnedPopups,SystemParametersInfoW,GetWindowRect,DrawAnimatedRects,ShowWindow,SetBkColor,SetTextColor,SendMessageW,SetWindowPos,RedrawWindow,IsIconic,ShowWindow,DragQueryFileW,DragQueryFileW,DragQueryFileW,DragFinish,GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,SetWindowPos,SendMessageW,SendMessageW,SendMessageW,DestroyWindow,DestroyWindow,DestroyWindow,DestroyWindow,GetClientRect,SendMessageW,SendMessageW,UpdateWindow,IsWindowVisible,LoadMenuW,GetSubMenu,SetForegroundWindow,GetCursorPos,SetMenuDefaultItem,TrackPopupMenu,PostMessageW,DestroyMenu,PostMessageW,ShowOwnedPopups,0_2_00DFEFB0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E066D0 lstrcpyW,lstrcpyW,EnumWindows,IsWindowEnabled,IsIconic,ShowWindowAsync,SetForegroundWindow,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,PostMessageW,StrChrW,MessageBoxW,GetShortPathNameW,StrCatBuffW,StrCpyNW,StrCatBuffW,StrCatBuffW,lstrcpyW,ShellExecuteExW,lstrcpynW,wsprintfW,DdeInitializeW,DdeCreateStringHandleW,DdeCreateStringHandleW,DdeCreateStringHandleW,DdeFreeStringHandle,DdeConnect,lstrlenW,DdeClientTransaction,DdeDisconnect,DdeFreeStringHandle,DdeFreeStringHandle,DdeFreeStringHandle,DdeUninitialize,GetShortPathNameW,StrCatBuffW,StrCpyNW,StrCatBuffW,StrCatBuffW,lstrcpyW,ExpandEnvironmentStringsW,lstrcpynW,ShellExecuteExW,DialogBoxIndirectParamW,LocalFree,0_2_00E066D0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeAPI/Special instruction interceptor: Address: 7FFE2220D044
                      Source: C:\Windows\SysWOW64\dialer.exeAPI/Special instruction interceptor: Address: 7FFE2220D044
                      Source: C:\Windows\SysWOW64\dialer.exeAPI/Special instruction interceptor: Address: 57F483A
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EXEWINDANR.EXE
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EVERYWHERE.EXEFIDDLER.EXEIDA.EXEIDA64.EXEIMMU
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHA
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TORUNS.EXEDUMPCAP.EXEDE4
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDANR.EXE
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeAPI coverage: 6.4 %
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E4CEA5 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00E4CEA5
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E0874A VirtualQuery,GetSystemInfo,0_2_00E0874A
                      Source: dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: dialer.exe, 00000001.00000002.3000293279.00000000032D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: dialer.exe, 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_029102CC VirtualAlloc,VirtualAlloc,VirtualProtect,LdrInitializeThunk,VirtualFree,0_3_029102CC
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E503BC IsDebuggerPresent,OutputDebugStringW,0_2_00E503BC
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E009E0 SendMessageW,LoadLibraryW,GetProcAddress,FreeLibrary,CreateWindowExW,SendMessageW,LoadImageW,CopyImage,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetSysColor,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetObjectW,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetObjectW,ImageList_Create,ImageList_AddMasked,DeleteObject,SendMessageW,GetSysColor,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetObjectW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetSysColor,ImageList_Create,ImageList_AddMasked,SendMessageW,DeleteObject,wsprintfW,lstrcmpiW,lstrcmpiW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,CreateWindowExW,SystemParametersInfoW,SystemParametersInfoW,CreateWindowExW,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,SystemParametersInfoW,SendMessageW,SystemParametersInfoW,GetSysColor,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,SystemParametersInfoW,SystemParametersInfoW,GetSysColor,SendMessageW,SetWindowPos,GetWindowRect,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,0_2_00E009E0
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_3_02910277 mov eax, dword ptr fs:[00000030h]0_3_02910277
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_0307027F mov eax, dword ptr fs:[00000030h]1_3_0307027F
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E0934F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E0934F
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E377CE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E377CE
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E09D68 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E09D68
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"Jump to behavior
                      Source: dZIZhRHDXv.exe, 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmp, dZIZhRHDXv.exe, 00000000.00000000.1757261691.0000000000E65000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: uxtheme.dllIsAppThemed - []\]%i %i%CSIDL:MYDOCUMENTS%.lnk"...%1%.2i"%s"Segoe UIMicrosoft JhengHei UIMicrosoft YaHei UIYu Gothic UIMalgun GothicWINDOWSTYLE;WINDOWShell_TrayWndTrayNotifyWndaf-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-TR vi-VN zh-CN zh-TW,; :en-USlng/mplng.dllTaskbarCreatedMinPathNotepad3...sdgfdhgfddgnhgsdfsdfggdhffdAutoRefreshRateSysListView32ComboBoxEx32ToolbarWindow32Toolbar Labels%02i(none)msctls_statusbar32ReBarWindow32Toolbar -f0 -n -p %i,%i,%i,%iok\A-RHS%s | %s %s | %s%u-/%i,%i,%i,%iNotepad3.exe
                      Source: dZIZhRHDXv.exeBinary or memory string: Shell_TrayWnd
                      Source: dZIZhRHDXv.exeBinary or memory string: Guxtheme.dllIsAppThemed - []\]%i %i%CSIDL:MYDOCUMENTS%.lnk"...%1%.2i"%s"Segoe UIMicrosoft JhengHei UIMicrosoft YaHei UIYu Gothic UIMalgun GothicWINDOWSTYLE;WINDOWShell_TrayWndTrayNotifyWndaf-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-TR vi-VN zh-CN zh-TW,; :en-USlng/mplng.dllTaskbarCreatedMinPathNotepad3...sdgfdhgfddgnhgsdfsdfggdhffdAutoRefreshRateSysListView32ComboBoxEx32ToolbarWindow32Toolbar Labels%02i(none)msctls_statusbar32ReBarWindow32Toolbar -f0 -n -p %i,%i,%i,%iok\A-RHS%s | %s %s | %s%u-/%i,%i,%i,%iNotepad3.exe
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E09B84 cpuid 0_2_00E09B84
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetUserPreferredUILanguages,GetUserPreferredUILanguages,LocalAlloc,GetUserPreferredUILanguages,LocalFree,GetLocaleInfoEx,0_2_00DFE070
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: EnumSystemLocalesW,0_2_00E52DDB
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: EnumSystemLocalesW,0_2_00E52D72
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: EnumSystemLocalesW,0_2_00E52E76
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00E52F01
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,0_2_00E53154
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,0_2_00E0710F
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00E5327D
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,0_2_00E53383
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: LCIDToLocaleName,GetLocaleInfoEx,0_2_00E07391
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00E53459
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: EnumSystemLocalesW,0_2_00E49502
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: EnumSystemLocalesW,0_2_00E496A1
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: ResolveLocaleName,GetLocaleInfoEx,0_2_00DFDD80
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoEx,SendMessageW,lstrlenW,ResetEvent,lstrlenW,CharPrevW,lstrlenW,CharPrevW,lstrlenW,0_2_00DFBE60
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: GetLocaleInfoW,0_2_00E49FE8
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00E4A027 GetSystemTimeAsFileTime,0_2_00E4A027
                      Source: C:\Users\user\Desktop\dZIZhRHDXv.exeCode function: 0_2_00DFE360 GetVersion,SetErrorMode,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,GetSysColor,OleInitialize,InitCommonControlsEx,RegisterWindowMessageW,GetSysColor,CreateSolidBrush,CreateSolidBrush,GetSysColor,CreateSolidBrush,StrStrIW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,#381,#381,#381,LoadCursorW,RegisterClassW,LoadAcceleratorsW,GetMessageW,GetMessageW,TranslateAcceleratorW,TranslateAcceleratorW,TranslateMessage,DispatchMessageW,GetMessageW,OleUninitialize,SetThreadPreferredUILanguages,CreateSolidBrush,SetThreadUILanguage,lstrcmpW,CreateSolidBrush,CreateSolidBrush,InitMUILanguage,0_2_00DFE360
                      Source: dialer.exe, 00000001.00000002.3000441616.0000000003510000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000000.00000003.1791313957.00000000006A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1822087119.0000000005475000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1794640183.00000000033E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1798820760.0000000003B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000000.00000003.1791313957.00000000006A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1822087119.0000000005475000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1794640183.00000000033E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1798820760.0000000003B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_2_057C9A57 socket,WSAGetLastError,SetHandleInformation,GetLastError,closesocket,bind,WSAGetLastError,1_2_057C9A57
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      12
                      Process Injection
                      2
                      Virtualization/Sandbox Evasion
                      21
                      Input Capture
                      1
                      System Time Discovery
                      Remote Services21
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      12
                      Process Injection
                      LSASS Memory241
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Clipboard Data
                      1
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                      Obfuscated Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput Capture1
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Software Packing
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync125
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      dZIZhRHDXv.exe47%ReversingLabsWin32.Trojan.Generic
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://138.201.226.224:9292/bcacc1e7778c536b694/6wlh52ro.x0plptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.rizonesoft.comdZIZhRHDXv.exefalse
                          unknown
                          https://www.flos-freeware.chopenmailto:florian.balmerdZIZhRHDXv.exefalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            138.201.226.224
                            unknownGermany
                            24940HETZNER-ASDEtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1543219
                            Start date and time:2024-10-27 13:33:04 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 21s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:11
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:dZIZhRHDXv.exe
                            renamed because original name is a hash value
                            Original Sample Name:e5a12459a39aa142a12c58d9afbe5b0d.exe
                            Detection:MAL
                            Classification:mal80.troj.evad.winEXE@5/0@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: dZIZhRHDXv.exe
                            No simulations
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            HETZNER-ASDEnklmpsl.elfGet hashmaliciousUnknownBrowse
                            • 5.75.234.236
                            splppc.elfGet hashmaliciousUnknownBrowse
                            • 144.77.227.183
                            nabmpsl.elfGet hashmaliciousUnknownBrowse
                            • 78.46.37.121
                            nklmips.elfGet hashmaliciousUnknownBrowse
                            • 46.4.109.36
                            SecuriteInfo.com.Trojan.Agent.GMXD.11819.15970.exeGet hashmaliciousUnknownBrowse
                            • 95.217.6.16
                            la.bot.mips.elfGet hashmaliciousUnknownBrowse
                            • 136.243.215.170
                            http://www.wattpad.comGet hashmaliciousUnknownBrowse
                            • 148.251.20.73
                            botnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
                            • 95.216.40.126
                            https://developmentltd.online/Get hashmaliciousCaptcha PhishBrowse
                            • 78.46.40.242
                            https://developmentltd.online/Get hashmaliciousCaptcha PhishBrowse
                            • 78.46.40.242
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.058694163921743
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:dZIZhRHDXv.exe
                            File size:1'374'208 bytes
                            MD5:e5a12459a39aa142a12c58d9afbe5b0d
                            SHA1:bebd558572194c56815a2fbaf016d1d4d0922ed3
                            SHA256:a45e9fae49d4af114a252f3cd5b69f33cb5994915a75cb51983910c9f21d81e5
                            SHA512:471c88d109ebabc6d288a19f604ccabdc6ad6709acabc5bee1f3885ac917870f4349a98b03ec62d89b3c40e9f8477dfc1faf735484dc750ecb6111dcbd824086
                            SSDEEP:24576:E/Pa9WKjYx31wk3AKLbTuruhXaJYKwcC4nS/AildFu8hod/zodlY:KQWKjc1wk3AKLbCZYKwcC4nSZFadkd
                            TLSH:7955D041B580C032D9B66570443AEBB5497EBC708B261ACF6BC4793B6F325C19A36B1F
                            File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$...................................C....$.......$.......$.......................$..........................I....$.......$........o....
                            Icon Hash:3fc7a3c665f3c37d
                            Entrypoint:0x489903
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x65C782C5 [Sat Feb 10 14:05:57 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:c18bcc1175f8fcf1adc36bc1ee87c82a
                            Instruction
                            call 00007F7BC8B5B7C3h
                            jmp 00007F7BC8B5AE78h
                            retn 0000h
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov eax, dword ptr [eax]
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov eax, dword ptr [eax]
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+0Ch]
                            mov ecx, dword ptr [ebp+08h]
                            xchg dword ptr [ecx], eax
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov edx, 004F5980h
                            mov ecx, 004F5980h
                            sub eax, edx
                            sub ecx, edx
                            cmp eax, ecx
                            jnbe 00007F7BC8B5B053h
                            int3
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov edx, 004F5980h
                            mov ecx, 004F5980h
                            sub eax, edx
                            sub ecx, edx
                            cmp eax, ecx
                            jnbe 00007F7BC8B5B057h
                            push 00000041h
                            pop ecx
                            int 29h
                            pop ebp
                            ret
                            retn 0000h
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov edx, 004F5980h
                            mov ecx, 004F5980h
                            sub eax, edx
                            sub ecx, edx
                            cmp eax, ecx
                            jnbe 00007F7BC8B5B05Eh
                            mov eax, dword ptr [004E5644h]
                            test eax, eax
                            je 00007F7BC8B5B055h
                            pop ebp
                            jmp eax
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [004E5644h]
                            test eax, eax
                            je 00007F7BC8B5B055h
                            pop ebp
                            jmp eax
                            pop ebp
                            ret
                            push ebp
                            mov ebp, esp
                            mov eax, dword ptr [ebp+08h]
                            mov edx, 004F5980h
                            mov ecx, 004F5980h
                            sub eax, edx
                            sub ecx, edx
                            cmp eax, ecx
                            jnbe 00007F7BC8B5B06Ch
                            push esi
                            mov esi, dword ptr [004FC194h]
                            test esi, esi
                            je 00007F7BC8B5B060h
                            push dword ptr [ebp+08h]
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf82100xf0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1020000x502e8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1530000x51d8.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xf58d00x70.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xf59c00x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xec5f80x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xe50000x63c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xf80000x40.rdata
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xe379a0xe3800b44216b9d2fe6c289604c8df6be3b335False0.6444013993818681data7.308659196103948IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xe50000x155040x15600356232fdefb6b47702c1b772e1c7f498False0.5792443347953217data6.150072189047563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xfb0000x6d100x100095cc1f43963611e0dc709b32d9d6a0e9False0.201904296875data2.8247194529459554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1020000x502e80x504002e7224c2f3367da182f384150418a77fFalse0.5011378017912772data5.821073929631435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1530000x51d80x52001cd1efc4664cbefcafddbec54260c8d1False0.7885861280487805data6.787527296370238IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_CURSOR0x12b5880x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4935064935064935
                            RT_BITMAP0x12b6d80x3c28Device independent bitmap graphic, 240 x 16 x 32, image size 15360, resolution 3779 x 3779 px/mEnglishUnited States0.3574675324675325
                            RT_BITMAP0x12f3000x428Device independent bitmap graphic, 16 x 16 x 32, image size 1024, resolution 3779 x 3779 px/mEnglishUnited States0.46522556390977443
                            RT_ICON0x102c000x1011aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9996657449329971
                            RT_ICON0x112d200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.3587927363066367
                            RT_ICON0x1235480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.49120217288615964
                            RT_ICON0x1277700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5267634854771784
                            RT_ICON0x129d180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6088180112570356
                            RT_ICON0x12adc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.775709219858156
                            RT_ICON0x12b2880x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.1303763440860215
                            RT_ICON0x12faf80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.35873358570921565
                            RT_ICON0x1403200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.4910840812470477
                            RT_ICON0x1445480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.5263485477178423
                            RT_ICON0x146af00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6074108818011257
                            RT_ICON0x147b980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.7695035460992907
                            RT_ICON0x1480500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.31636960600375236
                            RT_ICON0x1491100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.17659474671669795
                            RT_ICON0x14a1d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2598499061913696
                            RT_ICON0x14b2900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2298311444652908
                            RT_ICON0x14c3500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.34139784946236557
                            RT_ICON0x14c6500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3334896810506567
                            RT_ICON0x14d7100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.21370967741935484
                            RT_MENU0x14da100x53edataEnglishUnited States0.39046199701937406
                            RT_DIALOG0x14df500x1a8dataEnglishUnited States0.46226415094339623
                            RT_DIALOG0x14e0f80x1b0dataEnglishUnited States0.5393518518518519
                            RT_DIALOG0x14e4800x1dcdataEnglishUnited States0.5315126050420168
                            RT_DIALOG0x14e6600x1dcdataEnglishUnited States0.5294117647058824
                            RT_DIALOG0x14e8400x130dataEnglishUnited States0.569078947368421
                            RT_DIALOG0x14eaa00x210dataEnglishUnited States0.48295454545454547
                            RT_DIALOG0x14e2a80x1d4dataEnglishUnited States0.5512820512820513
                            RT_DIALOG0x14e9700x130dataEnglishUnited States0.5756578947368421
                            RT_DIALOG0x14fbe00x560dataEnglishUnited States0.375
                            RT_DIALOG0x1501400x244dataEnglishUnited States0.5017241379310344
                            RT_DIALOG0x14ecb00x4a2dataEnglishUnited States0.3979763912310287
                            RT_DIALOG0x14f1580x4aedataEnglishUnited States0.43906510851419034
                            RT_DIALOG0x14f6080x3badataEnglishUnited States0.40146750524109015
                            RT_DIALOG0x14f9c80x218dataEnglishUnited States0.5093283582089553
                            RT_STRING0x1509280xa6dataEnglishUnited States0.6204819277108434
                            RT_STRING0x1515100x1e0Matlab v4 mat-file (little endian) i, numeric, rows 0, columns 0EnglishUnited States0.40625
                            RT_STRING0x1517380x1b0dataEnglishUnited States0.41203703703703703
                            RT_STRING0x1508000x124dataEnglishUnited States0.6027397260273972
                            RT_STRING0x1509d00xb3edataEnglishUnited States0.24009728978457262
                            RT_STRING0x1503880x478dataEnglishUnited States0.388986013986014
                            RT_STRING0x1516f00x48dataEnglishUnited States0.6111111111111112
                            RT_ACCELERATOR0x12f7280x1a0dataEnglishUnited States0.5913461538461539
                            RT_GROUP_CURSOR0x12b6c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_ICON0x12b2280x5aTarga image data - Map 32 x 282 x 1 +1EnglishUnited States0.7777777777777778
                            RT_GROUP_ICON0x1490f80x14dataEnglishUnited States1.2
                            RT_GROUP_ICON0x14c6380x14dataEnglishUnited States1.25
                            RT_GROUP_ICON0x14b2780x14dataEnglishUnited States1.2
                            RT_GROUP_ICON0x14c3380x14dataEnglishUnited States1.2
                            RT_GROUP_ICON0x14d6f80x14dataEnglishUnited States1.2
                            RT_GROUP_ICON0x14a1b80x14dataEnglishUnited States1.2
                            RT_GROUP_ICON0x14d9f80x14dataEnglishUnited States1.25
                            RT_GROUP_ICON0x12b5700x14dataEnglishUnited States1.25
                            RT_GROUP_ICON0x1480000x4cdataEnglishUnited States0.8157894736842105
                            RT_VERSION0x12f8c80x22cdataEnglishUnited States0.5269784172661871
                            RT_MANIFEST0x1518e80x9fbXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (2495), with CRLF line terminatorsEnglishUnited States0.30176125244618396
                            DLLImport
                            SHLWAPI.dllPathGetDriveNumberW, StrCmpNIW, StrDupW, StrChrA, PathRelativePathToW, PathIsPrefixW, PathUnExpandEnvStringsW, PathIsRootW, PathCanonicalizeW, PathFindExtensionW, PathFindFileNameW, PathCommonPrefixW, PathCompactPathExW, PathRemoveExtensionW, StrStrIW, StrFormatByteSizeW, PathStripPathW, PathRemoveBackslashW, StrRetToBufW, PathMatchSpecW, StrCatBuffW, PathUnquoteSpacesW, StrChrW, StrTrimW, SHAutoComplete, StrCpyNW, PathQuoteSpacesW, PathRenameExtensionW, PathIsDirectoryW, StrRChrW, PathAppendW, PathIsRelativeW, PathFileExistsW, PathAddBackslashW, PathRemoveFileSpecW, PathIsSameRootW
                            PSAPI.DLLEnumProcessModules, GetModuleFileNameExW
                            USER32.dllLoadAcceleratorsW, DeleteMenu, ShowOwnedPopups, CopyImage, MessageBoxW, EqualRect, IsWindowVisible, ShowWindowAsync, GetMessagePos, LoadMenuW, CharUpperW, GetKeyState, DefWindowProcW, GetMenuItemInfoW, DeferWindowPos, GetMessageW, GetSubMenu, BeginDeferWindowPos, OpenClipboard, OffsetRect, SetTimer, CloseClipboard, SetMenuItemInfoW, EmptyClipboard, RegisterClassW, SetWindowPlacement, FrameRect, SetMenuDefaultItem, EnumWindows, GetMessageTime, CreateWindowExA, IntersectRect, SetFocus, BringWindowToTop, TranslateAcceleratorW, GetWindowDC, EndDeferWindowPos, SetClipboardData, CheckMenuItem, IsZoomed, KillTimer, PostQuitMessage, GetSysColorBrush, EnableMenuItem, RegisterWindowMessageW, UpdateWindow, IsIconic, GetWindowThreadProcessId, DrawAnimatedRects, FindWindowExW, GetDC, MonitorFromRect, SetActiveWindow, LoadStringA, TrackPopupMenu, SetWindowCompositionAttribute, SystemParametersInfoW, SetPropW, RedrawWindow, SendMessageW, wsprintfW, GetSysColor, CharPrevW, GetWindowPlacement, GetSystemMetrics, SetWindowTextW, LoadStringW, DdeCreateStringHandleW, DdeConnect, GetMonitorInfoW, DdeInitializeW, DdeUninitialize, DialogBoxIndirectParamW, DdeClientTransaction, SetLayeredWindowAttributes, CharUpperBuffW, DdeDisconnect, DdeFreeStringHandle, SetForegroundWindow, LoadImageW, ReleaseDC, GetPropW, RemovePropW, DispatchMessageW, PeekMessageW, TranslateMessage, GetWindowLongW, GetWindowTextLengthW, GetSystemMenu, AdjustWindowRectEx, PostMessageW, CheckMenuRadioItem, GetWindowRect, GetFocus, DestroyWindow, SetWindowPos, CheckRadioButton, MessageBoxExW, CreateWindowExW, EndDialog, MessageBeep, CreatePopupMenu, WindowFromPoint, DestroyCursor, ShowWindow, DestroyIcon, GetDlgCtrlID, SetDlgItemTextW, MapWindowPoints, GetDlgItemTextW, SendDlgItemMessageW, IsWindowEnabled, IsDlgButtonChecked, DestroyMenu, GetMenuStringW, CharNextW, LoadIconW, LoadCursorW, GetClassNameW, SetCapture, InsertMenuW, SetCursor, SetWindowLongW, TrackPopupMenuEx, GetComboBoxInfo, GetClientRect, GetDlgItem, AppendMenuW, CheckDlgButton, GetParent, ReleaseCapture, InvalidateRect, ChildWindowFromPoint, GetCursorPos, EnableWindow, GetWindowTextW, SetRect
                            KERNEL32.dllRaiseException, GetSystemInfo, VirtualQuery, GetModuleHandleW, LoadLibraryExA, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, DecodePointer, WakeAllConditionVariable, SleepConditionVariableSRW, UnhandledExceptionFilter, ReadConsoleW, GetConsoleMode, VirtualProtect, CompareStringOrdinal, FreeLibrary, LoadLibraryExW, ReadFile, lstrlenW, WriteFile, lstrcpynW, ExpandEnvironmentStringsW, GetModuleFileNameW, SetFilePointer, SetEndOfFile, UnlockFileEx, CreateFileW, GetSystemDirectoryW, MultiByteToWideChar, lstrcatW, CloseHandle, LockFileEx, GetFileSize, WideCharToMultiByte, lstrcpyW, lstrcmpiW, lstrcmpW, FlushFileBuffers, GetShortPathNameW, LocalAlloc, GetFileAttributesW, SetFileAttributesW, FormatMessageW, GetLastError, GetCurrentDirectoryW, LocalFree, WaitForSingleObject, CreateEventW, SetEvent, GlobalAlloc, GlobalFree, ResetEvent, SizeofResource, SearchPathW, GetLocaleInfoEx, FreeResource, OpenProcess, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetWindowsDirectoryW, GetProcAddress, GlobalLock, GlobalUnlock, MulDiv, CreateDirectoryW, FindFirstFileW, GetCommandLineW, SetThreadUILanguage, SetErrorMode, FindClose, GetUserPreferredUILanguages, FindFirstChangeNotificationW, GetVersion, ResolveLocaleName, GlobalSize, FileTimeToSystemTime, FindCloseChangeNotification, FileTimeToLocalFileTime, FindNextChangeNotification, SetCurrentDirectoryW, GetTimeFormatW, VerSetConditionMask, CopyFileW, VerifyVersionInfoW, SetThreadPreferredUILanguages, IsValidLocaleName, GetDateFormatW, MapViewOfFile, CreateFileMappingW, LocaleNameToLCID, FindResourceExW, LCIDToLocaleName, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, SetLastError, SetUnhandledExceptionFilter, GetConsoleOutputCP, HeapReAlloc, HeapSize, SetFilePointerEx, GetFileSizeEx, GetStringTypeW, SetStdHandle, OutputDebugStringW, SetConsoleCtrlHandler, GetProcessHeap, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, GetTempPathW, GetFileType, HeapAlloc, HeapFree, GetCurrentThread, GetStdHandle, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ResumeThread, ExitThread, CreateThread, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, EncodePointer, InterlockedFlushSList, InterlockedPushEntrySList, RtlUnwind, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, WriteConsoleW
                            GDI32.dllGetStockObject, SetBkColor, ExtTextOutW, EnumFontsW, GetDeviceCaps, SetTextColor, GetObjectW, DeleteObject, CreateSolidBrush, CreateFontIndirectW
                            COMDLG32.dllGetOpenFileNameW, ChooseColorW, GetSaveFileNameW
                            ADVAPI32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                            SHELL32.dllSHGetFolderPathW, SHGetSpecialFolderPathW, ShellExecuteW, SHCreateDirectoryExW, SHFileOperationW, SHBrowseForFolderW, SHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetDesktopFolder, SHAppBarMessage, DragQueryFileW, Shell_NotifyIconW, DragAcceptFiles, DragFinish, SHGetDataFromIDListW
                            ole32.dllOleUninitialize, CoCreateInstance, OleInitialize, CoUninitialize, CoTaskMemAlloc, CoTaskMemFree, CoInitialize, DoDragDrop
                            ntdll.dllRtlGetNtVersionNumbers
                            COMCTL32.dllImageList_Create, PropertySheetW, ImageList_Destroy, InitCommonControlsEx, InitMUILanguage, ImageList_AddMasked
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 27, 2024 13:34:11.783355951 CET497309292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:11.789092064 CET929249730138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:11.789196014 CET497309292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:11.789288044 CET497309292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:11.794573069 CET929249730138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:16.787244081 CET497309292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:16.833224058 CET929249730138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:20.280524969 CET929249730138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:20.280611992 CET497309292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:21.799123049 CET497329292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:21.805236101 CET929249732138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:21.805329084 CET497329292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:21.805419922 CET497329292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:21.810806036 CET929249732138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:26.819540024 CET497329292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:26.869214058 CET929249732138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:30.277496099 CET929249732138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:30.277601004 CET497329292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:31.814790964 CET572859292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:31.820261955 CET929257285138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:31.820384979 CET572859292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:31.826812983 CET572859292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:31.832305908 CET929257285138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:36.817424059 CET572859292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:36.864985943 CET929257285138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:40.304459095 CET929257285138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:40.304517984 CET572859292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:41.830601931 CET616139292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:41.836396933 CET929261613138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:41.836488008 CET616139292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:41.836597919 CET616139292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:41.841995001 CET929261613138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:46.835638046 CET616139292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:46.885063887 CET929261613138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:50.330899954 CET929261613138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:50.330985069 CET616139292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:51.846118927 CET616149292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:51.851573944 CET929261614138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:51.851684093 CET616149292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:51.851799965 CET616149292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:51.857112885 CET929261614138.201.226.224192.168.2.4
                            Oct 27, 2024 13:34:56.864299059 CET616149292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:34:56.916925907 CET929261614138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:00.346184015 CET929261614138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:00.346270084 CET616149292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:01.861726999 CET616569292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:01.867188931 CET929261656138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:01.867331028 CET616569292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:01.869628906 CET616569292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:01.875085115 CET929261656138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:06.864937067 CET616569292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:06.912849903 CET929261656138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:10.350969076 CET929261656138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:10.351082087 CET616569292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:11.861601114 CET617039292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:11.868324995 CET929261703138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:11.868417978 CET617039292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:11.868556023 CET617039292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:11.874031067 CET929261703138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:16.880661011 CET617039292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:16.932826042 CET929261703138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:20.352214098 CET929261703138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:20.352279902 CET617039292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:21.877628088 CET617639292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:21.883035898 CET929261763138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:21.883117914 CET617639292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:21.885938883 CET617639292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:21.891283989 CET929261763138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:26.879899025 CET617639292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:26.928884983 CET929261763138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:30.373018026 CET929261763138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:30.373071909 CET617639292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:31.877552986 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:31.883064032 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:31.883183002 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:31.883372068 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:31.888717890 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:36.895448923 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:36.944798946 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:40.615582943 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:40.615657091 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:40.615808964 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:40.615875006 CET618159292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:40.621521950 CET929261815138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:41.908468962 CET618709292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:41.913906097 CET929261870138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:41.914000988 CET618709292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:41.914097071 CET618709292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:41.919430017 CET929261870138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:46.926808119 CET618709292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:46.972876072 CET929261870138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:50.421715021 CET929261870138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:50.421792984 CET618709292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:51.924335957 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:52.008287907 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:52.008548021 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:52.008642912 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:52.014027119 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:35:56.943942070 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:35:56.992861032 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:00.754256010 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:00.754374027 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:00.754688978 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:00.754750013 CET618869292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:00.760144949 CET929261886138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:01.956406116 CET618879292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:01.961944103 CET929261887138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:01.962044954 CET618879292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:01.962173939 CET618879292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:01.967758894 CET929261887138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:06.959000111 CET618879292192.168.2.4138.201.226.224
                            Oct 27, 2024 13:36:07.005232096 CET929261887138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:10.440973043 CET929261887138.201.226.224192.168.2.4
                            Oct 27, 2024 13:36:10.441144943 CET618879292192.168.2.4138.201.226.224
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 27, 2024 13:34:25.540486097 CET53510591.1.1.1192.168.2.4
                            Oct 27, 2024 13:34:39.244575977 CET53543821.1.1.1192.168.2.4

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:08:34:03
                            Start date:27/10/2024
                            Path:C:\Users\user\Desktop\dZIZhRHDXv.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\dZIZhRHDXv.exe"
                            Imagebase:0xd80000
                            File size:1'374'208 bytes
                            MD5 hash:E5A12459A39AA142A12C58D9AFBE5B0D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000003.1791313957.00000000006A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1793547768.0000000004250000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1793351393.0000000004030000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000002.1798820760.0000000003B30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:08:34:07
                            Start date:27/10/2024
                            Path:C:\Windows\SysWOW64\dialer.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\system32\dialer.exe"
                            Imagebase:0x340000
                            File size:32'256 bytes
                            MD5 hash:E4BD77FB64DDE78F1A95ECE09F6A9B85
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000001.00000003.1822087119.0000000005475000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000001.00000003.1794640183.00000000033E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000003.1796910103.0000000005720000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000003.1796719456.0000000005500000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:false

                            Target ID:4
                            Start time:08:34:07
                            Start date:27/10/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 708
                            Imagebase:0x570000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:08:34:07
                            Start date:27/10/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 704
                            Imagebase:0x570000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:1.2%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:42.3%
                              Total number of Nodes:787
                              Total number of Limit Nodes:17
                              execution_graph 47332 dfefb0 47333 dffa49 47332->47333 47334 dfeff0 47332->47334 47337 dffa55 47333->47337 47338 dffcb0 47333->47338 47335 dffa26 47334->47335 47336 dfeff6 47334->47336 47478 e02050 428 API calls 3 library calls 47335->47478 47342 dff004 47336->47342 47350 dfffa9 IsWindowVisible 47336->47350 47351 dff366 DefWindowProcW 47336->47351 47343 dffa5b 47337->47343 47344 dffcd4 47337->47344 47339 dffcbc 47338->47339 47340 dffd71 47338->47340 47347 dffcbe 47339->47347 47365 dffd25 47339->47365 47348 dffd7d 47340->47348 47349 dfff95 47340->47349 47342->47351 47345 dffb2d 47343->47345 47346 dffa68 47343->47346 47352 dfffbe 47344->47352 47485 de7010 SystemParametersInfoW 47344->47485 47355 dffb39 47345->47355 47356 dffbe4 47345->47356 47357 dffa6d 47346->47357 47358 dffa99 WaitForSingleObject 47346->47358 47347->47336 47347->47344 47359 dffe47 GetWindowLongW 47348->47359 47360 dffd83 47348->47360 47349->47336 47361 dfffd6 47349->47361 47350->47352 47362 dfffb4 47350->47362 47471 e08e39 47351->47471 47364 e08e39 _ValidateLocalCookies 5 API calls 47352->47364 47353 dffa30 47366 e08e39 _ValidateLocalCookies 5 API calls 47353->47366 47370 dffb3f 47355->47370 47371 dffc25 ShowOwnedPopups 47355->47371 47356->47371 47376 dffbec 47356->47376 47357->47336 47377 dffa76 47357->47377 47358->47352 47381 dffaaf 47358->47381 47368 dffe5f 47359->47368 47369 dffe83 GetWindowLongW SetWindowLongW SetWindowPos SendMessageW 47359->47369 47378 dffd8b 47360->47378 47379 dffdca IsIconic 47360->47379 47383 e0009c 47361->47383 47384 dfffe2 47361->47384 47494 e06360 8 API calls 2 library calls 47362->47494 47382 dfffd0 47364->47382 47365->47352 47373 dffd3f 47365->47373 47374 dff386 SendMessageW 47365->47374 47375 dffa43 47366->47375 47367 dff380 47488 de7010 SystemParametersInfoW 47368->47488 47490 e0ba00 47369->47490 47386 dffb7b 47370->47386 47387 dffb48 47370->47387 47396 dffc3b SystemParametersInfoW 47371->47396 47397 dff756 DefWindowProcW 47371->47397 47372 dffce6 47372->47352 47390 dffcee SetBkColor SetTextColor 47372->47390 47373->47352 47392 dffd48 SendMessageW 47373->47392 47388 e08e39 _ValidateLocalCookies 5 API calls 47374->47388 47376->47351 47393 dffbf8 DefWindowProcW ShowOwnedPopups 47376->47393 47479 e01dd0 36 API calls _ValidateLocalCookies 47377->47479 47378->47336 47395 dffd97 SetWindowPos RedrawWindow 47378->47395 47398 dffdde DragQueryFileW 47379->47398 47399 dffdd5 ShowWindow 47379->47399 47480 df9480 11 API calls _ValidateLocalCookies 47381->47480 47498 e06360 8 API calls 2 library calls 47383->47498 47384->47352 47401 dfffe7 8 API calls 47384->47401 47408 dffb8e SetWindowPos 47386->47408 47409 dffbb9 SetWindowPos 47386->47409 47387->47351 47403 dffb51 47387->47403 47404 dff3a9 47388->47404 47407 e08e39 _ValidateLocalCookies 5 API calls 47390->47407 47411 e08e39 _ValidateLocalCookies 5 API calls 47392->47411 47412 e08e39 _ValidateLocalCookies 5 API calls 47393->47412 47414 e000b5 47395->47414 47415 dffc5b GetWindowRect 47396->47415 47416 dffc83 ShowWindow 47396->47416 47405 e08e39 _ValidateLocalCookies 5 API calls 47397->47405 47486 e05aa0 132 API calls 2 library calls 47398->47486 47399->47398 47419 e00068 47401->47419 47420 e0007d 47401->47420 47402 dffe64 47489 de70f0 SystemParametersInfoW RtlGetNtVersionNumbers SetPropW SetWindowCompositionAttribute 47402->47489 47482 dfd3f0 27 API calls 47403->47482 47423 dff776 47405->47423 47406 e000a5 47499 dfd650 18 API calls _ValidateLocalCookies 47406->47499 47425 dffd1f 47407->47425 47426 e08e39 _ValidateLocalCookies 5 API calls 47408->47426 47429 e08e39 _ValidateLocalCookies 5 API calls 47409->47429 47410 dffee4 SendMessageW 47492 dfb090 17 API calls 2 library calls 47410->47492 47430 dffd6b 47411->47430 47431 dffc1f 47412->47431 47413 dffa7e 47432 e08e39 _ValidateLocalCookies 5 API calls 47413->47432 47428 e08e39 _ValidateLocalCookies 5 API calls 47414->47428 47483 dfd430 12 API calls _ValidateLocalCookies 47415->47483 47484 e06360 8 API calls 2 library calls 47416->47484 47418 dffad1 FindNextChangeNotification SendMessageW 47418->47352 47436 dffb01 47418->47436 47495 e06360 8 API calls 2 library calls 47419->47495 47420->47414 47497 e06360 8 API calls 2 library calls 47420->47497 47442 dffbb3 47426->47442 47444 e000ca 47428->47444 47445 dffbde 47429->47445 47446 dffa93 47432->47446 47434 dffe0b DragQueryFileW 47448 dffe19 47434->47448 47449 dffe28 DragFinish 47434->47449 47481 df98d0 19 API calls 2 library calls 47436->47481 47439 dffb60 47454 e08e39 _ValidateLocalCookies 5 API calls 47439->47454 47441 e00078 ShowOwnedPopups 47441->47414 47443 dfff09 DestroyWindow DestroyWindow DestroyWindow 47493 e009e0 179 API calls 2 library calls 47443->47493 47447 dffc70 DrawAnimatedRects 47447->47416 47487 df8540 58 API calls 2 library calls 47448->47487 47460 e08e39 _ValidateLocalCookies 5 API calls 47449->47460 47450 dffc98 47458 e08e39 _ValidateLocalCookies 5 API calls 47450->47458 47452 e00071 47496 dfd650 18 API calls _ValidateLocalCookies 47452->47496 47453 e0008d PostMessageW 47453->47414 47462 dffb75 47454->47462 47465 dffcaa 47458->47465 47459 dffb12 47466 e08e39 _ValidateLocalCookies 5 API calls 47459->47466 47467 dffe41 47460->47467 47463 dfff39 GetClientRect SendMessageW SendMessageW UpdateWindow 47468 e08e39 _ValidateLocalCookies 5 API calls 47463->47468 47464 dffe25 47464->47449 47469 dffb27 47466->47469 47470 dfff8f 47468->47470 47472 e08e41 47471->47472 47473 e08e42 IsProcessorFeaturePresent 47471->47473 47472->47367 47475 e0938c 47473->47475 47500 e0934f SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47475->47500 47477 e0946f 47477->47367 47478->47353 47479->47413 47480->47418 47481->47459 47482->47439 47483->47447 47484->47450 47485->47372 47486->47434 47487->47464 47488->47402 47489->47369 47491 e0ba17 47490->47491 47491->47410 47491->47491 47492->47443 47493->47463 47494->47352 47495->47452 47496->47441 47497->47453 47498->47406 47499->47441 47500->47477 47501 dfe360 GetVersion SetErrorMode 47571 de7440 47501->47571 47503 dfe3bd 14 API calls 47588 e055e0 GetCommandLineW 47503->47588 47507 dfe4ab 47686 de9c80 lstrcmpiW 47507->47686 47509 dfe4b0 47714 de95b0 47509->47714 47511 dfe4b5 47728 de9f30 47511->47728 47515 dfe4bf 47516 dfe4c7 OleInitialize InitCommonControlsEx RegisterWindowMessageW 47515->47516 47517 dfe822 47515->47517 47776 dea0b0 47516->47776 47519 e08e39 _ValidateLocalCookies 5 API calls 47517->47519 47521 dfe835 47519->47521 47522 de7440 65 API calls 47523 dfe511 47522->47523 47524 dfe52a GetSysColor 47523->47524 48050 de7010 SystemParametersInfoW 47523->48050 47526 dfe52e CreateSolidBrush 47524->47526 47528 dfe555 GetSysColor 47526->47528 47529 dfe545 47526->47529 47527 dfe51f 47527->47524 47530 dfe523 47527->47530 47532 dfe559 CreateSolidBrush StrStrIW 47528->47532 48051 de7010 SystemParametersInfoW 47529->48051 47530->47526 47533 dfe579 47532->47533 47545 dfe71d __FrameHandler3::FrameUnwindToState 47532->47545 47535 dfe59a 47533->47535 47536 dfe583 47533->47536 47534 dfe54a 47534->47528 47537 dfe54e 47534->47537 48053 dfe010 9 API calls 47535->48053 48052 de8ae0 82 API calls 47536->48052 47537->47532 47540 dfe597 47540->47535 47541 dfe59f 47542 dfe5a1 GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics 47541->47542 47543 dfe5ef 47542->47543 47544 dfe5dc #381 47542->47544 47546 dfe60c LoadCursorW RegisterClassW 47543->47546 47547 dfe5f8 #381 47543->47547 47544->47543 47935 dfde20 47545->47935 47546->47517 47549 dfe670 47546->47549 47547->47546 47900 dfe910 MonitorFromRect GetMonitorInfoW 47549->47900 47552 dfe79f SetThreadPreferredUILanguages 47552->47535 47554 dfe7c4 47552->47554 47554->47535 47940 dfdd80 47554->47940 47555 dfe688 LoadAcceleratorsW GetMessageW 47556 dfe6ac 47555->47556 47557 dfe6e9 47555->47557 47558 dfe6b2 TranslateAcceleratorW 47556->47558 47559 dfe6fc OleUninitialize 47557->47559 48054 e076e0 FreeLibrary 47557->48054 47561 dfe6d8 GetMessageW 47558->47561 47562 dfe6c2 TranslateMessage DispatchMessageW 47558->47562 47564 e08e39 _ValidateLocalCookies 5 API calls 47559->47564 47561->47557 47561->47558 47562->47561 47566 dfe717 47564->47566 47565 dfe7d9 SetThreadUILanguage lstrcmpW 47567 dfe7ff 47565->47567 47568 dfe7f7 47565->47568 47950 e077e6 47567->47950 47568->47533 47570 dfe816 InitMUILanguage 47568->47570 47570->47542 47572 de747e 47571->47572 47573 de7452 RtlGetNtVersionNumbers 47571->47573 48055 de6e90 47572->48055 47573->47572 47579 de75aa 47573->47579 47575 de748a 47576 de74b8 LoadLibraryExW 47575->47576 47575->47579 48070 de6fc0 SystemParametersInfoW 47575->48070 47576->47579 47582 de74f3 47576->47582 47579->47503 47580 de75a2 FreeLibrary 47580->47579 47582->47580 47583 de753d 47582->47583 47584 de7530 FreeLibrary 47582->47584 48060 e1501d 47582->48060 47585 de7569 VirtualProtect 47583->47585 47586 de75a1 47583->47586 47584->47503 47585->47586 47587 de757f VirtualProtect 47585->47587 47586->47580 47587->47586 47589 e055f5 47588->47589 47590 dfe4a6 47588->47590 47589->47590 47591 e05600 StrChrW 47589->47591 47642 de9990 GetModuleFileNameW 47590->47642 47592 e05614 StrChrW 47591->47592 47593 e05625 lstrlenW LocalAlloc lstrlenW LocalAlloc lstrcpyW 47591->47593 47592->47592 47592->47593 47594 e05661 47593->47594 48120 dfbb00 5 API calls CatchIt 47594->48120 47596 e0566d 47597 e05686 StrChrW 47596->47597 47622 e056b7 47596->47622 48121 dfbb00 5 API calls CatchIt 47596->48121 47601 e056b9 47597->47601 47602 e05699 47597->47602 47598 e056d3 lstrcpyW 47598->47622 48124 dfbb00 5 API calls CatchIt 47601->48124 47602->47601 47603 e056a2 lstrcpyW 47602->47603 48122 dfbb00 5 API calls CatchIt 47603->48122 47605 e05a61 LocalFree LocalFree 47605->47590 47607 e056c0 47607->47598 48125 dfbb00 5 API calls CatchIt 47607->48125 47608 e056b0 48123 dfbb00 5 API calls CatchIt 47608->48123 47611 e0570a StrChrW 47611->47622 47612 e0571a lstrcpyW 48126 dfbb00 5 API calls CatchIt 47612->48126 47614 dfbb00 CharNextW lstrlenW lstrlenW CharPrevW CharPrevW 47614->47622 47615 e05774 StrTrimW CharUpperW 47615->47598 47615->47622 47616 e05752 GlobalFree 47617 e05759 GlobalAlloc lstrcpyW 47616->47617 47617->47598 47618 e059c3 lstrcpyW 47618->47622 47619 e0588e CharUpperW 47619->47622 47623 e058a2 CharUpperW 47619->47623 47620 e057d8 CharUpperW 47621 e0587d lstrcpyW 47620->47621 47624 e057e9 lstrcpyW 47620->47624 47621->47598 47622->47598 47622->47605 47622->47611 47622->47612 47622->47614 47622->47615 47622->47616 47622->47617 47622->47618 47622->47619 47622->47620 47622->47621 47626 e059fa StrChrW 47622->47626 47627 e05a0a lstrcpyW 47622->47627 47628 e058f0 StrChrW 47622->47628 47629 e05820 StrChrW 47622->47629 47631 e05900 lstrcpyW 47622->47631 47632 e05830 lstrcpyW 47622->47632 47635 e05a35 GlobalFree 47622->47635 47636 e05a3c lstrlenW GlobalAlloc lstrcpyW 47622->47636 47637 e05852 StrCpyNW 47622->47637 48128 dfbb00 5 API calls CatchIt 47622->48128 48131 dfa630 47 API calls 47622->48131 47623->47622 47625 e058b3 lstrcpyW 47623->47625 47624->47622 47625->47622 47626->47622 48132 dfbb00 5 API calls CatchIt 47627->48132 47628->47622 47629->47622 48130 dfbb00 5 API calls CatchIt 47631->48130 48127 dfbb00 5 API calls CatchIt 47632->48127 47635->47636 47636->47598 48129 dfbb00 5 API calls CatchIt 47637->48129 47641 e0586d PathUnquoteSpacesW 47641->47598 47643 de99ca lstrcmpiW 47642->47643 47644 de9aa7 PathFindFileNameW lstrcpyW PathRenameExtensionW 47642->47644 47646 de99de 47643->47646 47647 de99f6 47643->47647 47645 de96a0 30 API calls 47644->47645 47648 de9ae7 47645->47648 47649 e08e39 _ValidateLocalCookies 5 API calls 47646->47649 48133 de96a0 ExpandEnvironmentStringsW PathIsRelativeW 47647->48133 47651 de9aeb lstrcpyW 47648->47651 47652 de9b28 47648->47652 47653 de99ef 47649->47653 47655 de96a0 30 API calls 47651->47655 48152 de9860 105 API calls _ValidateLocalCookies 47652->48152 47653->47507 47660 de9b07 47655->47660 47657 de9a8a 47659 e08e39 _ValidateLocalCookies 5 API calls 47657->47659 47658 de9a0b ExpandEnvironmentStringsW 47662 de9a3f PathIsRelativeW 47658->47662 47663 de9a27 lstrcpynW 47658->47663 47665 de9aa0 47659->47665 47660->47652 47666 de9b0b lstrcpyW PathRenameExtensionW 47660->47666 47661 de9b44 47667 de9b6a lstrcpyW 47661->47667 48153 de9860 105 API calls _ValidateLocalCookies 47661->48153 47662->47657 47664 de9a4e lstrcpyW PathRemoveFileSpecW PathAppendW lstrcpyW 47662->47664 47663->47662 47664->47657 47665->47507 47668 de9b76 PathRemoveFileSpecW lstrcatW PathFindFileNameW lstrcpyW PathRenameExtensionW 47666->47668 47667->47668 47671 de96a0 30 API calls 47668->47671 47670 de9b67 47670->47667 47672 de9bc5 47671->47672 47673 de9c0a 47672->47673 47674 de9bcb lstrcpyW 47672->47674 48154 de9860 105 API calls _ValidateLocalCookies 47673->48154 47675 de96a0 30 API calls 47674->47675 47677 de9be7 47675->47677 47677->47673 47679 de9bed lstrcpyW PathRenameExtensionW 47677->47679 47678 de9c26 47680 de9c4c lstrcpyW 47678->47680 48155 de9860 105 API calls _ValidateLocalCookies 47678->48155 47681 de9c58 47679->47681 47680->47681 47683 e08e39 _ValidateLocalCookies 5 API calls 47681->47683 47685 de9c70 47683->47685 47684 de9c49 47684->47680 47685->47507 47687 de9cdf PathIsDirectoryW 47686->47687 47688 de9ca9 lstrcpyW lstrcpyW 47686->47688 47690 de9d2d GetModuleFileNameW PathFindFileNameW PathAppendW PathRenameExtensionW PathFileExistsW 47687->47690 47691 de9d05 lstrlenW CharPrevW 47687->47691 47689 e08e39 _ValidateLocalCookies 5 API calls 47688->47689 47692 de9cd8 47689->47692 47694 de9d6d PathIsDirectoryW 47690->47694 47695 de9d78 PathFindFileNameW lstrcpyW PathFileExistsW 47690->47695 47691->47690 47693 de9dc7 PathIsDirectoryW 47691->47693 47692->47509 47698 de9dfa 7 API calls 47693->47698 47699 de9dd2 lstrlenW CharPrevW 47693->47699 47694->47693 47694->47695 47696 de9d9d PathFindFileNameW PathFindFileNameW lstrcpyW PathRenameExtensionW 47695->47696 47697 de9d92 PathIsDirectoryW 47695->47697 47696->47693 47697->47693 47697->47696 47700 de9e55 PathIsDirectoryW 47698->47700 47701 de9e60 PathFindFileNameW lstrcpyW PathFileExistsW 47698->47701 47699->47698 47702 de9ea9 PathFileExistsW 47699->47702 47700->47701 47700->47702 47703 de9e7a PathIsDirectoryW 47701->47703 47704 de9e85 PathFindFileNameW PathFindFileNameW lstrcpyW PathRenameExtensionW 47701->47704 47705 de9eba PathIsDirectoryW 47702->47705 47706 de9ed0 lstrcpyW 47702->47706 47703->47702 47703->47704 47704->47702 47705->47706 47707 de9ec5 PathIsDirectoryW 47705->47707 47708 de9edc PathFileExistsW 47706->47708 47707->47706 47707->47708 47709 de9ef9 lstrcpyW lstrcpyW 47708->47709 47710 de9ee7 PathIsDirectoryW 47708->47710 47711 de9ef2 47709->47711 47710->47709 47710->47711 47712 e08e39 _ValidateLocalCookies 5 API calls 47711->47712 47713 de9f25 47712->47713 47713->47509 47715 de9698 47714->47715 47716 de95c1 StrRChrW 47714->47716 47715->47511 47717 de95d6 SHCreateDirectoryExW 47716->47717 47718 de95f0 PathFileExistsW 47716->47718 47717->47718 47719 de95ff PathIsDirectoryW 47718->47719 47720 de965a CreateFileW 47718->47720 47719->47720 47721 de960e CreateFileW 47719->47721 47722 de967c CloseHandle 47720->47722 47723 de9683 47720->47723 47721->47715 47725 de9630 GetFileSize CloseHandle 47721->47725 47722->47723 48159 de8ae0 82 API calls 47723->48159 47725->47723 47727 de9651 47725->47727 47726 de9691 47726->47511 47727->47511 48160 de7e40 47728->48160 47730 de9f72 48171 de8010 47730->48171 47732 de9f8d 47733 de9fc4 47732->47733 47734 de9f94 47732->47734 47737 de8100 48 API calls 47733->47737 47740 de9fde 47733->47740 48185 dfe070 10 API calls 2 library calls 47734->48185 47736 de9f9f 48186 de89e0 73 API calls 47736->48186 47737->47740 48182 de8100 47740->48182 47742 de9fc1 47742->47733 47743 de8100 48 API calls 47744 dea022 47743->47744 47745 de8100 48 API calls 47744->47745 47746 dea044 47745->47746 47747 e08e39 _ValidateLocalCookies 5 API calls 47746->47747 47748 dea08b 47747->47748 47749 e06140 47748->47749 47750 e0616a 47749->47750 47751 e0633e 47749->47751 47750->47751 47753 e06177 EnumWindows 47750->47753 47752 e08e39 _ValidateLocalCookies 5 API calls 47751->47752 47754 e0634f 47752->47754 47753->47751 47755 e06193 IsWindowEnabled 47753->47755 47754->47515 47756 e061a2 IsIconic 47755->47756 47757 e062ba LoadStringW 47755->47757 47760 e061b0 ShowWindowAsync 47756->47760 47761 e061bc IsWindowVisible 47756->47761 47758 e062f2 StrChrW 47757->47758 47759 e062db LoadStringW 47757->47759 47762 e06303 47758->47762 47763 e0630b MessageBoxW 47758->47763 47759->47758 47760->47761 47764 e061d0 SendMessageW SendMessageW 47761->47764 47765 e061f4 SetForegroundWindow 47761->47765 47762->47763 47763->47751 47766 e06323 47763->47766 47764->47765 47765->47766 47767 e0620b GlobalSize 47765->47767 47769 e08e39 _ValidateLocalCookies 5 API calls 47766->47769 48215 dfbd10 7 API calls _ValidateLocalCookies 47767->48215 47771 e06337 47769->47771 47770 e06221 PathIsRelativeW 47772 e06231 GetCurrentDirectoryW PathAppendW lstrcpyW 47770->47772 47773 e06263 GlobalSize SendMessageW GlobalFree 47770->47773 47771->47515 47772->47773 47774 e08e39 _ValidateLocalCookies 5 API calls 47773->47774 47775 e062b3 47774->47775 47775->47515 47777 de7e40 73 API calls 47776->47777 47778 dea0f2 47777->47778 48216 de82f0 47778->48216 47781 de82f0 45 API calls 47782 dea126 47781->47782 47783 de82f0 45 API calls 47782->47783 47784 dea144 47783->47784 47785 de82f0 45 API calls 47784->47785 47786 dea162 47785->47786 47787 de82f0 45 API calls 47786->47787 47788 dea180 47787->47788 47789 de82f0 45 API calls 47788->47789 47790 dea19e 47789->47790 47791 de82f0 45 API calls 47790->47791 47792 dea1bc 47791->47792 47793 de82f0 45 API calls 47792->47793 47794 dea1da 47793->47794 47795 de82f0 45 API calls 47794->47795 47796 dea1f8 47795->47796 47797 de82f0 45 API calls 47796->47797 47798 dea216 47797->47798 47799 de82f0 45 API calls 47798->47799 47800 dea234 47799->47800 47801 de82f0 45 API calls 47800->47801 47802 dea252 47801->47802 47803 de8100 48 API calls 47802->47803 47804 dea275 47803->47804 47805 de8100 48 API calls 47804->47805 47806 dea2ab 47805->47806 47807 de8010 46 API calls 47806->47807 47808 dea2e7 47807->47808 47809 dea32c 47808->47809 47810 dea2fc 47808->47810 47811 dea33c SHGetFolderPathW 47809->47811 47812 dea351 47809->47812 48219 de89e0 73 API calls 47810->48219 47814 dea363 47811->47814 48220 dfb620 21 API calls _ValidateLocalCookies 47812->48220 47816 de8010 46 API calls 47814->47816 47819 dea389 47816->47819 47817 dea329 47817->47809 47818 dea360 47818->47814 47820 dea3bd 47819->47820 47821 dea390 GetSystemDirectoryW PathAddBackslashW lstrcatW 47819->47821 48221 dfb620 21 API calls _ValidateLocalCookies 47820->48221 47822 dea3cf 47821->47822 47825 de7c00 2 API calls 47822->47825 47824 dea3cc 47824->47822 47826 dea3d9 47825->47826 47827 de8010 46 API calls 47826->47827 47828 dea404 lstrcpyW 47827->47828 47829 de8010 46 API calls 47828->47829 47830 dea437 47829->47830 47831 dea43e 47830->47831 47832 dea464 47830->47832 48222 de89e0 73 API calls 47831->48222 47833 dea487 47832->47833 47834 dea474 SHGetSpecialFolderPathW 47832->47834 48223 dfb620 21 API calls _ValidateLocalCookies 47833->48223 47836 dea499 47834->47836 47840 de8100 48 API calls 47836->47840 47838 dea461 47838->47832 47839 dea496 47839->47836 47841 dea4b7 47840->47841 47842 de8100 48 API calls 47841->47842 47843 dea4f0 47842->47843 47844 de82f0 45 API calls 47843->47844 47845 dea520 lstrcpyW 47844->47845 47846 dea542 47845->47846 47847 dea560 lstrcpynW 47845->47847 47848 de8010 46 API calls 47846->47848 47849 dea55b 47847->47849 47848->47849 47851 de82f0 45 API calls 47849->47851 47852 dea5a1 47851->47852 47853 de82f0 45 API calls 47852->47853 47854 dea5bf 47853->47854 47855 de82f0 45 API calls 47854->47855 47856 dea5dd GetSysColor 47855->47856 47857 de8100 48 API calls 47856->47857 47858 dea604 GetSysColor 47857->47858 47859 de8100 48 API calls 47858->47859 47860 dea62c lstrcpyW 47859->47860 47861 de8010 46 API calls 47860->47861 47862 dea665 47861->47862 47863 dea66c lstrcpyW 47862->47863 47864 dea678 47862->47864 47863->47864 47865 de82f0 45 API calls 47864->47865 47866 dea68e 47865->47866 47867 de82f0 45 API calls 47866->47867 47868 dea6ac 47867->47868 47869 de82f0 45 API calls 47868->47869 47870 dea6ca 47869->47870 47871 de8100 48 API calls 47870->47871 47872 dea6ed 47871->47872 47873 de8100 48 API calls 47872->47873 47874 dea712 47873->47874 47875 de8100 48 API calls 47874->47875 47876 dea737 47875->47876 47877 de8100 48 API calls 47876->47877 47878 dea75c GetSystemMetrics GetSystemMetrics 47877->47878 47879 de8010 46 API calls 47878->47879 47880 dea79a 47879->47880 47881 de8010 46 API calls 47880->47881 47882 dea7bb 47881->47882 47883 de8010 46 API calls 47882->47883 47884 dea7dc 47883->47884 47885 dea7ec wsprintfW wsprintfW wsprintfW wsprintfW 47884->47885 47886 dea89f 47884->47886 47887 de8100 48 API calls 47885->47887 47889 de8100 48 API calls 47886->47889 47888 dea845 47887->47888 47890 de8100 48 API calls 47888->47890 47892 dea8d6 47889->47892 47891 dea863 47890->47891 47893 de8100 48 API calls 47891->47893 47896 de8100 48 API calls 47892->47896 47894 dea881 47893->47894 47895 de8100 48 API calls 47894->47895 47895->47886 47897 dea902 47896->47897 47898 e08e39 _ValidateLocalCookies 5 API calls 47897->47898 47899 dea93c 47898->47899 47899->47522 47901 dfe9b5 47900->47901 47902 dfeaf3 SystemParametersInfoW 47900->47902 47901->47902 47913 dfe9d9 SetRect IntersectRect 47901->47913 47903 dfeaab 47902->47903 47904 dfeb35 CreateWindowExW 47903->47904 47905 dfeb6b SetWindowPos 47904->47905 47906 dfeb84 47904->47906 47905->47906 47907 dfebce GetWindowLongW SetWindowLongW 47906->47907 47908 dfeb96 GetWindowLongW SetWindowLongW MulDiv SetLayeredWindowAttributes 47906->47908 47909 dfebe3 47907->47909 47908->47909 47911 dfebec ShowWindow UpdateWindow 47909->47911 47912 dfec10 ShowWindow 47909->47912 47914 dfeca4 47911->47914 47915 dfec2e LoadImageW 47912->47915 47916 dfec4b __FrameHandler3::FrameUnwindToState 47912->47916 47913->47903 47913->47904 47917 dfecae 47914->47917 47918 dfecc6 47914->47918 47915->47916 47919 dfec5c lstrcpyW Shell_NotifyIconW 47916->47919 48238 e05aa0 132 API calls 2 library calls 47917->48238 47921 dfeccf 47918->47921 47924 dfed01 47918->47924 47919->47914 47921->47924 48239 de89e0 73 API calls 47921->48239 47922 dfed3f SendMessageW 47925 dfed6f 47922->47925 47926 dfed58 PostMessageW 47922->47926 47923 dfecb8 GlobalFree 47923->47922 47924->47922 48241 e05aa0 132 API calls 2 library calls 47924->48241 47928 e08e39 _ValidateLocalCookies 5 API calls 47925->47928 47926->47925 47932 dfe67b 47928->47932 47929 dfecfa 47929->47924 47930 dfed0f 47929->47930 48240 df8540 58 API calls 2 library calls 47930->48240 47932->47517 47932->47555 47934 dfed1b 47934->47922 47936 dfde3c _vsnprintf 47935->47936 47937 dfdfc5 47935->47937 47936->47937 47938 dfdeaa StrChrW 47936->47938 47939 dfdeed IsValidLocaleName 47936->47939 47937->47535 47937->47552 47938->47936 47939->47936 47941 dfdd98 47940->47941 47942 dfddab ResolveLocaleName 47941->47942 47943 dfddf9 47941->47943 47942->47943 47945 dfddbd GetLocaleInfoEx 47942->47945 47944 e08e39 _ValidateLocalCookies 5 API calls 47943->47944 47946 dfde0c 47944->47946 47945->47943 47947 dfdde0 47945->47947 47946->47565 47948 e08e39 _ValidateLocalCookies 5 API calls 47947->47948 47949 dfddf2 47948->47949 47949->47565 47951 e07820 47950->47951 47996 e07ed0 47950->47996 47951->47996 48242 e07219 47951->48242 47952 e08e39 _ValidateLocalCookies 5 API calls 47953 e07eec 47952->47953 47953->47568 47956 e07860 47957 e0786d SearchPathW 47956->47957 47956->47996 47958 e07893 47957->47958 47959 e07ed6 FreeLibrary 47957->47959 48250 e07557 FindResourceExW 47958->48250 47959->47996 47961 e078c1 47962 e07c7e 47961->47962 47965 e07ce5 47961->47965 47966 e078df GetUserDefaultUILanguage 47961->47966 47967 e07e33 47961->47967 47963 e07c93 47962->47963 48266 e07557 FindResourceExW 47962->48266 47964 e07c9c FreeLibrary 47963->47964 47963->47996 47969 e07219 7 API calls 47964->47969 47965->47962 48269 e0716c 48 API calls _ValidateLocalCookies 47965->48269 47970 e078f2 47966->47970 47971 e078f7 47966->47971 47967->47962 47972 e07e7d 47967->47972 47973 e07e5d 47967->47973 47994 e07ea9 FreeLibrary 47967->47994 47975 e07ca8 47969->47975 48251 e0710f 6 API calls 2 library calls 47970->48251 48003 e07917 47971->48003 48019 e07aa6 47971->48019 48280 e07594 47 API calls 47972->48280 48279 e07391 47 API calls 47973->48279 47974 e07c8b 47974->47959 47974->47963 47981 e07cb0 47975->47981 47982 e07eb4 47975->47982 47980 e07e73 47980->47962 47983 e07e7b 47980->47983 48267 e07594 47 API calls 47981->48267 47987 e07219 7 API calls 47982->47987 47983->47994 47984 e07cee 48033 e07d7d 47984->48033 48270 e07391 47 API calls 47984->48270 47990 e07eb9 LoadLibraryExW 47987->47990 47988 e07c6e 47988->47994 47995 e07c78 47988->47995 47989 e07ccd 48268 e074cf 6 API calls 47989->48268 47990->47996 47994->47996 47995->47962 47996->47952 47997 e07daf 48275 e07325 60 API calls 47997->48275 47998 e07d1c 47998->47962 48271 e07325 60 API calls 47998->48271 47999 e07ce0 47999->47996 48001 e07dc6 48001->47994 48276 e07391 47 API calls 48001->48276 48003->47988 48003->47994 48006 e07325 60 API calls 48003->48006 48018 e079bb GetSystemDefaultUILanguage 48003->48018 48252 e07391 47 API calls 48003->48252 48005 e07d38 48005->47994 48272 e07325 60 API calls 48005->48272 48006->48003 48008 e07afc LocaleNameToLCID 48008->48019 48009 e07b69 GetSystemDefaultUILanguage 48012 e07b85 48009->48012 48036 e07a94 48009->48036 48010 e07dea 48010->47967 48013 e07dee LocaleNameToLCID 48010->48013 48259 e07594 47 API calls 48012->48259 48013->47967 48017 e07e08 48013->48017 48014 e07d56 48014->47994 48014->48033 48273 e07325 60 API calls 48014->48273 48015 e07594 47 API calls 48015->48019 48277 e07594 47 API calls 48017->48277 48024 e079d7 48018->48024 48047 e07a53 48018->48047 48019->47994 48019->48008 48019->48009 48019->48015 48023 e07325 60 API calls 48019->48023 48258 e07391 47 API calls 48019->48258 48020 e07b9c 48260 e07325 60 API calls 48020->48260 48023->48019 48253 e07391 47 API calls 48024->48253 48026 e07e1c 48278 e07325 60 API calls 48026->48278 48029 e079f2 48029->47995 48254 e07325 60 API calls 48029->48254 48031 e07bb3 48031->47994 48261 e07391 47 API calls 48031->48261 48033->47994 48274 e07594 47 API calls 48033->48274 48034 e07c55 48034->47994 48265 e07325 60 API calls 48034->48265 48036->47994 48036->48034 48264 e07325 60 API calls 48036->48264 48039 e07a0e 48039->47994 48255 e07325 60 API calls 48039->48255 48040 e07bd7 48040->48036 48041 e07bdb LocaleNameToLCID 48040->48041 48041->48036 48043 e07bf5 48041->48043 48262 e07594 47 API calls 48043->48262 48044 e07a2c 48044->47994 48044->48047 48256 e07325 60 API calls 48044->48256 48046 e07c09 48263 e07325 60 API calls 48046->48263 48047->47994 48047->48034 48257 e07391 47 API calls 48047->48257 48050->47527 48051->47534 48052->47540 48053->47541 48056 de6ec8 48055->48056 48057 de6f44 48055->48057 48056->48057 48071 e08b69 48056->48071 48057->47575 48061 e15054 48060->48061 48062 e1502b 48060->48062 48119 e15066 44 API calls 3 library calls 48061->48119 48069 e14fcd 48062->48069 48117 e4676b 14 API calls __dosmaperr 48062->48117 48064 e15061 48064->47582 48066 e15036 48118 e379f2 44 API calls __get_errno 48066->48118 48068 e15041 48068->47582 48069->47582 48070->47576 48073 e08b7f ___FUnloadDelayLoadedDLL2@4 48071->48073 48072 de6eeb 48072->47575 48073->48072 48075 e08bca 48073->48075 48101 e08662 48075->48101 48077 e08bda 48078 e08c37 48077->48078 48086 e08c5b 48077->48086 48110 e088a2 6 API calls 3 library calls 48078->48110 48080 e08c42 RaiseException 48096 e08e30 48080->48096 48081 e08cd3 LoadLibraryExA 48082 e08d34 48081->48082 48083 e08ce6 GetLastError 48081->48083 48084 e08d46 48082->48084 48085 e08d3f FreeLibrary 48082->48085 48087 e08cf9 48083->48087 48088 e08d0f 48083->48088 48089 e08da4 GetProcAddress 48084->48089 48090 e08e02 48084->48090 48085->48084 48086->48081 48086->48082 48086->48084 48086->48090 48087->48082 48087->48088 48111 e088a2 6 API calls 3 library calls 48088->48111 48089->48090 48092 e08db4 GetLastError 48089->48092 48113 e088a2 6 API calls 3 library calls 48090->48113 48094 e08dc7 48092->48094 48093 e08d1a RaiseException 48093->48096 48094->48090 48112 e088a2 6 API calls 3 library calls 48094->48112 48096->48073 48098 e08de8 RaiseException 48099 e08662 DloadAcquireSectionWriteAccess 6 API calls 48098->48099 48100 e08dff 48099->48100 48100->48090 48102 e08694 48101->48102 48103 e0866e 48101->48103 48102->48077 48114 e0870b GetModuleHandleW GetProcAddress GetProcAddress DloadAcquireSectionWriteAccess 48103->48114 48105 e08673 48106 e0868f 48105->48106 48115 e08834 VirtualQuery GetSystemInfo VirtualProtect DloadProtectSection 48105->48115 48116 e08695 GetModuleHandleW GetProcAddress GetProcAddress 48106->48116 48109 e088dd 48109->48077 48110->48080 48111->48093 48112->48098 48113->48096 48114->48105 48115->48106 48116->48109 48117->48066 48118->48068 48119->48064 48120->47596 48121->47597 48122->47608 48123->47622 48124->47607 48125->47622 48126->47622 48127->47622 48128->47637 48129->47641 48130->47622 48131->47622 48132->47622 48134 de96e6 lstrcpyW PathFindFileNameW lstrcpyW PathFileExistsW 48133->48134 48135 de9804 PathFileExistsW 48133->48135 48136 de972e lstrcpyW PathRemoveFileSpecW lstrcatW lstrcatW PathFileExistsW 48134->48136 48137 de971f PathIsDirectoryW 48134->48137 48138 de983e 48135->48138 48139 de9816 PathIsDirectoryW 48135->48139 48141 de977c SHGetFolderPathW 48136->48141 48142 de9771 PathIsDirectoryW 48136->48142 48137->48136 48140 de97f5 lstrcpyW 48137->48140 48144 e08e39 _ValidateLocalCookies 5 API calls 48138->48144 48139->48138 48143 de9828 lstrcpyW 48139->48143 48140->48138 48145 de9795 PathAppendW PathFileExistsW 48141->48145 48146 de97c2 SHGetFolderPathW 48141->48146 48142->48140 48142->48141 48143->48138 48147 de9852 48144->48147 48145->48146 48148 de97b7 PathIsDirectoryW 48145->48148 48146->48138 48149 de97d5 PathAppendW 48146->48149 48147->47657 48147->47658 48148->48140 48148->48146 48156 de7c00 PathFileExistsW 48149->48156 48152->47661 48153->47670 48154->47678 48155->47684 48157 de7c0e PathIsDirectoryW 48156->48157 48158 de7c19 48156->48158 48157->48158 48158->48138 48158->48140 48159->47726 48161 de7ef2 48160->48161 48162 de7e52 PathFileExistsW 48160->48162 48161->47730 48162->48161 48163 de7e65 PathIsDirectoryW 48162->48163 48163->48161 48164 de7e74 48163->48164 48187 de7cf0 60 API calls 2 library calls 48164->48187 48166 de7eaf 48166->48161 48188 deb710 52 API calls 48166->48188 48168 de7ec1 48189 de7de0 FlushFileBuffers UnlockFileEx CloseHandle 48168->48189 48170 de7ee8 48170->47730 48172 de8022 48171->48172 48179 de80cf 48171->48179 48172->48179 48190 df07f0 45 API calls 48172->48190 48174 de80eb lstrlenW 48174->47732 48175 de8052 48176 de8065 48175->48176 48191 e151cd 45 API calls 2 library calls 48175->48191 48176->48179 48192 deee20 45 API calls 48176->48192 48179->48174 48180 de809f 48180->48179 48193 e151cd 45 API calls 2 library calls 48180->48193 48194 debc00 48182->48194 48185->47736 48186->47742 48187->48166 48188->48168 48189->48170 48190->48175 48191->48176 48192->48180 48193->48179 48195 debc27 48194->48195 48209 debd95 48195->48209 48210 df07f0 45 API calls 48195->48210 48197 e08e39 _ValidateLocalCookies 5 API calls 48198 de811b 48197->48198 48198->47743 48199 debc6d 48199->48209 48211 e151cd 45 API calls 2 library calls 48199->48211 48201 debc84 48201->48209 48212 deee20 45 API calls 48201->48212 48203 debcfb __FrameHandler3::FrameUnwindToState 48204 debd28 WideCharToMultiByte 48203->48204 48203->48209 48207 debd53 48204->48207 48204->48209 48205 debcbc 48205->48203 48205->48209 48213 e151cd 45 API calls 2 library calls 48205->48213 48207->48209 48214 e1d6f7 46 API calls 2 library calls 48207->48214 48209->48197 48210->48199 48211->48201 48212->48205 48213->48203 48214->48209 48215->47770 48224 dec170 48216->48224 48219->47817 48220->47818 48221->47824 48222->47838 48223->47839 48225 dec185 48224->48225 48232 de8317 48225->48232 48234 df07f0 45 API calls 48225->48234 48227 dec1cc 48227->48232 48235 e151cd 45 API calls 2 library calls 48227->48235 48229 dec1e3 48229->48232 48236 deee20 45 API calls 48229->48236 48231 dec21b 48231->48232 48237 e151cd 45 API calls 2 library calls 48231->48237 48232->47781 48234->48227 48235->48229 48236->48231 48237->48232 48238->47923 48239->47929 48240->47934 48241->47922 48243 e07312 48242->48243 48244 e0723d __FrameHandler3::FrameUnwindToState 48242->48244 48245 e08e39 _ValidateLocalCookies 5 API calls 48243->48245 48247 e0724f GetVersionExW 48244->48247 48246 e0731f LoadLibraryExW 48245->48246 48246->47956 48246->47996 48248 e0726d GetVersionExW 48247->48248 48249 e07284 48247->48249 48248->48249 48249->48243 48250->47961 48251->47971 48252->48003 48253->48029 48254->48039 48255->48044 48256->48047 48257->48036 48258->48019 48259->48020 48260->48031 48261->48040 48262->48046 48263->48036 48264->48034 48265->47988 48266->47974 48267->47989 48268->47999 48269->47984 48270->47998 48271->48005 48272->48014 48273->48033 48274->47997 48275->48001 48276->48010 48277->48026 48278->47967 48279->47980 48280->47983

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 dea0b0-dea27f call de7e40 call de82f0 * 12 call de8100 29 dea285-dea288 0->29 30 dea281-dea283 0->30 31 dea28b-dea2b0 call de8100 29->31 30->31 34 dea2b6-dea2b9 31->34 35 dea2b2-dea2b4 31->35 36 dea2bc-dea2ec call de8010 34->36 35->36 39 dea2ee-dea2fa 36->39 40 dea32c-dea33a 36->40 39->40 41 dea2fc-dea329 call de89e0 39->41 42 dea33c-dea34f SHGetFolderPathW 40->42 43 dea351-dea360 call dfb620 40->43 41->40 45 dea363-dea38e call de8010 42->45 43->45 51 dea3bd-dea3cc call dfb620 45->51 52 dea390-dea3bb GetSystemDirectoryW PathAddBackslashW lstrcatW 45->52 53 dea3cf-dea43c call de7c00 call de8010 lstrcpyW call de8010 51->53 52->53 62 dea43e-dea461 call de89e0 53->62 63 dea464-dea472 53->63 62->63 64 dea487-dea496 call dfb620 63->64 65 dea474-dea485 SHGetSpecialFolderPathW 63->65 67 dea499-dea4bd call de8100 64->67 65->67 73 dea4bf-dea4c4 67->73 74 dea4c6-dea4cd 67->74 75 dea4d0-dea4f5 call de8100 73->75 74->75 78 dea4fb-dea502 75->78 79 dea4f7-dea4f9 75->79 80 dea505-dea540 call de82f0 lstrcpyW 78->80 79->80 83 dea542-dea55e call de8010 80->83 84 dea560-dea564 80->84 90 dea58b-dea66a call de82f0 * 3 GetSysColor call de8100 GetSysColor call de8100 lstrcpyW call de8010 83->90 86 dea566-dea573 84->86 87 dea575 84->87 89 dea57f-dea585 lstrcpynW 86->89 87->89 89->90 103 dea66c-dea676 lstrcpyW 90->103 104 dea678-dea7e6 call de82f0 * 3 call de8100 * 4 GetSystemMetrics * 2 call de8010 * 3 90->104 103->104 125 dea7ec-dea8a2 wsprintfW * 4 call de8100 * 4 104->125 126 dea8a7 104->126 125->126 127 dea8a9-dea8b2 126->127 129 dea8b4-dea8c3 127->129 130 dea8c5-dea8e0 call de8100 127->130 129->127 137 dea8e6-dea8e9 130->137 138 dea8e2-dea8e4 130->138 140 dea8ec-dea907 call de8100 137->140 138->140 145 dea90d-dea910 140->145 146 dea909-dea90b 140->146 147 dea913-dea93f call dea940 call e08e39 145->147 146->147
                              APIs
                                • Part of subcall function 00DE7E40: PathFileExistsW.SHLWAPI(00E7D538,?,?,00DE9F72,98D825DA), ref: 00DE7E57
                                • Part of subcall function 00DE7E40: PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE7E6A
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,C:\Users\user\Documents), ref: 00DEA349
                              • GetSystemDirectoryW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,00000104), ref: 00DEA39A
                              • PathAddBackslashW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DEA3A5
                              • lstrcatW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,Viewers\Quikview.exe), ref: 00DEA3B5
                              • lstrcpyW.KERNEL32(00E7F77C,%USERPROFILE%\Desktop), ref: 00DEA417
                                • Part of subcall function 00DFB620: StrCmpNIW.SHLWAPI(C:\Users\user\Documents,%CSIDL:MYDOCUMENTS%,00000013,?,00000002), ref: 00DFB643
                                • Part of subcall function 00DFB620: SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?,?,00000002), ref: 00DFB663
                                • Part of subcall function 00DFB620: PathAppendW.SHLWAPI(?,?,?,00000002), ref: 00DFB675
                                • Part of subcall function 00DFB620: ExpandEnvironmentStringsW.KERNEL32(?,?,00000138,?,00000002), ref: 00DFB69B
                                • Part of subcall function 00DFB620: lstrcpynW.KERNEL32(?,?,00000104,?,00000002), ref: 00DFB6BA
                                • Part of subcall function 00DFB620: PathIsRelativeW.SHLWAPI(?,?,00000002), ref: 00DFB6C4
                                • Part of subcall function 00DFB620: GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,?,00000002), ref: 00DFB6DA
                                • Part of subcall function 00DFB620: PathRemoveFileSpecW.SHLWAPI(?,?,00000002), ref: 00DFB6E5
                                • Part of subcall function 00DFB620: PathAppendW.SHLWAPI(?,?,?,00000002), ref: 00DFB6F8
                                • Part of subcall function 00DFB620: PathCanonicalizeW.SHLWAPI(?,?,?,00000002), ref: 00DFB71C
                                • Part of subcall function 00DFB620: lstrcpyW.KERNEL32(?,?,?,00000002), ref: 00DFB733
                                • Part of subcall function 00DFB620: PathGetDriveNumberW.SHLWAPI(?,?,00000002), ref: 00DFB73E
                                • Part of subcall function 00DFB620: CharUpperBuffW.USER32(00000001,00000001,?,00000002), ref: 00DFB750
                                • Part of subcall function 00DFB620: lstrcpynW.KERNEL32(C:\Users\user\Documents,00000104,00000104,?,00000002), ref: 00DFB776
                                • Part of subcall function 00DFB620: lstrcpynW.KERNEL32(?,C:\Users\user\Documents,00000104,?,00000002), ref: 00DFB684
                                • Part of subcall function 00DFB620: lstrcpynW.KERNEL32(?,?,00000104,?,00000002), ref: 00DFB70D
                                • Part of subcall function 00DE89E0: lstrlenW.KERNEL32(?,00000000,Settings2,?,?,?), ref: 00DE8A9D
                              • SHGetSpecialFolderPathW.SHELL32(00000000,C:\Users\user\Desktop,00000010,00000001), ref: 00DEA47F
                              • lstrcpyW.KERNEL32(*.*,*.*), ref: 00DEA532
                              • lstrcpynW.KERNEL32(00E81AFC,00000000,00000100), ref: 00DEA585
                              • GetSysColor.USER32(00000008), ref: 00DEA5ED
                              • GetSysColor.USER32(0000000D), ref: 00DEA615
                              • lstrcpyW.KERNEL32(00E7F984,1 2 3 4 5 0 8), ref: 00DEA645
                              • lstrcpyW.KERNEL32(00E810E4,00E7F984), ref: 00DEA676
                              • GetSystemMetrics.USER32(00000000), ref: 00DEA772
                              • GetSystemMetrics.USER32(00000001), ref: 00DEA778
                              • wsprintfW.USER32 ref: 00DEA7FD
                              • wsprintfW.USER32 ref: 00DEA80D
                              • wsprintfW.USER32 ref: 00DEA81D
                              • wsprintfW.USER32 ref: 00DEA82D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$lstrcpylstrcpyn$wsprintf$FileFolderSystem$AppendColorDirectoryMetrics$BackslashBuffCanonicalizeCharDriveEnvironmentExistsExpandModuleNameNumberRelativeRemoveSpecSpecialStringsUpperlstrcatlstrlen
                              • String ID: %USERPROFILE%\Desktop$%ix%i PosX$%ix%i PosY$%ix%i SizeX$%ix%i SizeY$*.*$*.*$1 2 3 4 5 0 8$AlwaysOnTop$BitmapDefault$BitmapDisabled$BitmapHot$C:\Users\user\Desktop$C:\Users\user\Documents$C:\Windows\system32\Viewers\Quikview.exe$ClearReadOnly$ColorFilter$ColorNoFilter$CopyMoveDlgSizeX$DefColorFilter$DefColorNoFilter$EscFunction$Favorites$FileFilter$FillMask$FocusEdit$FocusLostOpacity$FullRowSelect$GotoDlgSizeX$MinimizeToTray$NegativeFilter$NoConfirmDelete$OpacityLevel$OpenWithDir$OpenWithDlgSizeX$OpenWithDlgSizeY$Quikview.exe$QuikviewParams$RenameOnCollision$SaveSettings$Settings$Settings2$ShowDriveBox$ShowStatusbar$ShowToolbar$SingleClick$SortOptions$SortReverse$StartupDirectory$Toolbar Images$ToolbarButtons$TrackSelect$TransparentMode$UseRecycleBin$Viewers\Quikview.exe$Window
                              • API String ID: 3534769242-206820148
                              • Opcode ID: c45982efb6fb56da558438e38bfff7c967d83064b110490a6178714f87af22de
                              • Instruction ID: 9e3c1b3f78e7a8afe4df86cd7eb48a377968fab0aeaaeddafbd1ed4065b92e5a
                              • Opcode Fuzzy Hash: c45982efb6fb56da558438e38bfff7c967d83064b110490a6178714f87af22de
                              • Instruction Fuzzy Hash: 9D1290F1A403819FEB54FB66BC037163691EB84704F109439E60DBA3D1FBB198499B76

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 152 dfe360-dfe4c1 GetVersion SetErrorMode call de7440 GetSysColor * 14 call e055e0 call de9990 call de9c80 call de95b0 call de9f30 call e06140 167 dfe4c7-dfe518 OleInitialize InitCommonControlsEx RegisterWindowMessageW call dea0b0 call de7440 152->167 168 dfe822-dfe838 call e08e39 152->168 175 dfe52a-dfe52c GetSysColor 167->175 176 dfe51a-dfe521 call de7010 167->176 178 dfe52e-dfe543 CreateSolidBrush 175->178 176->175 182 dfe523-dfe528 176->182 180 dfe555-dfe557 GetSysColor 178->180 181 dfe545-dfe54c call de7010 178->181 184 dfe559-dfe573 CreateSolidBrush StrStrIW 180->184 181->180 191 dfe54e-dfe553 181->191 182->178 185 dfe71d-dfe741 call e0ba00 184->185 186 dfe579-dfe581 184->186 197 dfe743-dfe74b 185->197 188 dfe59a-dfe59f call dfe010 186->188 189 dfe583-dfe597 call de8ae0 186->189 198 dfe5a1-dfe5da GetSystemMetrics * 4 188->198 189->188 191->184 199 dfe74d-dfe754 197->199 200 dfe761-dfe799 call e0ba00 call dfde20 197->200 202 dfe5ef-dfe5f6 198->202 203 dfe5dc-dfe5eb #381 198->203 199->200 204 dfe756-dfe75f 199->204 200->188 212 dfe79f-dfe7be SetThreadPreferredUILanguages 200->212 206 dfe60c-dfe66a LoadCursorW RegisterClassW 202->206 207 dfe5f8-dfe607 #381 202->207 203->202 204->197 204->200 206->168 209 dfe670-dfe676 call dfe910 206->209 207->206 213 dfe67b-dfe682 209->213 212->188 214 dfe7c4-dfe7c9 212->214 213->168 215 dfe688-dfe6aa LoadAcceleratorsW GetMessageW 213->215 214->188 218 dfe7cf-dfe7f5 call dfdd80 SetThreadUILanguage lstrcmpW 214->218 216 dfe6ac 215->216 217 dfe6e9-dfe6f4 215->217 219 dfe6b2-dfe6c0 TranslateAcceleratorW 216->219 220 dfe6fc-dfe71a OleUninitialize call e08e39 217->220 221 dfe6f6-dfe6f7 call e076e0 217->221 229 dfe7ff-dfe807 call e077e6 218->229 230 dfe7f7-dfe7fd 218->230 223 dfe6d8-dfe6e7 GetMessageW 219->223 224 dfe6c2-dfe6d2 TranslateMessage DispatchMessageW 219->224 221->220 223->217 223->219 224->223 233 dfe80c 229->233 231 dfe80e-dfe810 230->231 231->186 234 dfe816-dfe81d InitMUILanguage 231->234 233->231 234->198
                              APIs
                              • GetVersion.KERNEL32 ref: 00DFE38D
                              • SetErrorMode.KERNELBASE(00008001), ref: 00DFE3B0
                                • Part of subcall function 00DE7440: RtlGetNtVersionNumbers.NTDLL ref: 00DE7461
                                • Part of subcall function 00DE7440: LoadLibraryExW.KERNEL32(comctl32.dll,00000000,00000800), ref: 00DE74E3
                                • Part of subcall function 00DE7440: FreeLibrary.KERNEL32(00000000), ref: 00DE7531
                              • GetSysColor.USER32(00000008), ref: 00DFE417
                              • GetSysColor.USER32(00000005), ref: 00DFE420
                              • GetSysColor.USER32(00000017), ref: 00DFE429
                              • GetSysColor.USER32(00000018), ref: 00DFE432
                              • GetSysColor.USER32(0000000E), ref: 00DFE43B
                              • GetSysColor.USER32(0000000D), ref: 00DFE444
                              • GetSysColor.USER32(00000002), ref: 00DFE44D
                              • GetSysColor.USER32(00000001), ref: 00DFE456
                              • GetSysColor.USER32(0000000F), ref: 00DFE45F
                              • GetSysColor.USER32(0000000F), ref: 00DFE468
                              • GetSysColor.USER32(0000000F), ref: 00DFE471
                              • GetSysColor.USER32(0000000F), ref: 00DFE47A
                              • GetSysColor.USER32(0000000F), ref: 00DFE483
                              • GetSysColor.USER32(0000000F), ref: 00DFE48C
                                • Part of subcall function 00E055E0: GetCommandLineW.KERNEL32(?,75BFCF90,?,?,?,00DFE4A6), ref: 00E055E5
                                • Part of subcall function 00E055E0: StrChrW.SHLWAPI(00000000,00000009,?,?,?,00DFE4A6), ref: 00E05609
                                • Part of subcall function 00E055E0: StrChrW.SHLWAPI(00000000,00000009,?,?,?,00DFE4A6), ref: 00E0561A
                                • Part of subcall function 00E055E0: lstrlenW.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E0562C
                                • Part of subcall function 00E055E0: LocalAlloc.KERNEL32(00000040,00000000,?,?,?,00DFE4A6), ref: 00E0563E
                                • Part of subcall function 00E055E0: lstrlenW.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E05643
                                • Part of subcall function 00E055E0: LocalAlloc.KERNEL32(00000040,00000000,?,?,?,00DFE4A6), ref: 00E0564F
                                • Part of subcall function 00E055E0: lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E0565B
                                • Part of subcall function 00E055E0: StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E05693
                                • Part of subcall function 00E055E0: lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E056A7
                                • Part of subcall function 00E055E0: lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E056D5
                                • Part of subcall function 00E055E0: StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E0570B
                                • Part of subcall function 00DE9990: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,75BFCF90), ref: 00DE99B6
                                • Part of subcall function 00DE9990: lstrcmpiW.KERNEL32(00E7D538,00E74724), ref: 00DE99D4
                                • Part of subcall function 00DE9C80: lstrcmpiW.KERNEL32(00E7D538,00E74724,75BFCF90), ref: 00DE9C9F
                                • Part of subcall function 00DE9C80: lstrcpyW.KERNEL32(C:\Users\user\Desktop\dZIZhRHDXv.ini,00E74520), ref: 00DE9CB9
                                • Part of subcall function 00DE9C80: lstrcpyW.KERNEL32(00E7D538,00E74520), ref: 00DE9CC5
                                • Part of subcall function 00DE95B0: StrRChrW.SHLWAPI(00E7D538,00000000,0000005C,?,?,?,00DEA9C3), ref: 00DE95CA
                                • Part of subcall function 00DE95B0: SHCreateDirectoryExW.SHELL32(00000000,00E7D538,00000000,?,?,?,00DEA9C3), ref: 00DE95E2
                                • Part of subcall function 00DE95B0: PathFileExistsW.SHLWAPI(00E7D538,?,?,?,00DEA9C3), ref: 00DE95F5
                                • Part of subcall function 00DE95B0: PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE9604
                                • Part of subcall function 00DE95B0: CreateFileW.KERNEL32(00E7D538,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,00DEA9C3), ref: 00DE9623
                                • Part of subcall function 00DE95B0: GetFileSize.KERNEL32(00000000,?), ref: 00DE963E
                                • Part of subcall function 00DE95B0: CloseHandle.KERNEL32(00000000), ref: 00DE9647
                                • Part of subcall function 00E06140: EnumWindows.USER32(00E060C0,00000000), ref: 00E06181
                                • Part of subcall function 00E06140: IsWindowEnabled.USER32(00000000), ref: 00E06194
                                • Part of subcall function 00E06140: IsIconic.USER32(00000000), ref: 00E061A6
                                • Part of subcall function 00E06140: ShowWindowAsync.USER32(00000009,00000009), ref: 00E061B6
                                • Part of subcall function 00E06140: IsWindowVisible.USER32(00000000), ref: 00E061C0
                                • Part of subcall function 00E06140: SendMessageW.USER32(00000400,00000400,00000000,00000203), ref: 00E061E0
                                • Part of subcall function 00E06140: SendMessageW.USER32(00000400,00000400,00000000,00000202), ref: 00E061F2
                                • Part of subcall function 00E06140: SetForegroundWindow.USER32(00000000), ref: 00E061F8
                                • Part of subcall function 00E06140: GlobalSize.KERNEL32(00000000), ref: 00E0620C
                                • Part of subcall function 00E06140: PathIsRelativeW.SHLWAPI ref: 00E06227
                                • Part of subcall function 00E06140: GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00E0623B
                                • Part of subcall function 00E06140: PathAppendW.SHLWAPI(?), ref: 00E0624C
                                • Part of subcall function 00E06140: lstrcpyW.KERNEL32(?), ref: 00E0625D
                                • Part of subcall function 00E06140: GlobalSize.KERNEL32 ref: 00E06271
                                • Part of subcall function 00E06140: SendMessageW.USER32(?,0000004A,00000000,?), ref: 00E06291
                                • Part of subcall function 00E06140: GlobalFree.KERNEL32 ref: 00E06299
                              • OleInitialize.OLE32(00000000), ref: 00DFE4C8
                              • InitCommonControlsEx.COMCTL32(?), ref: 00DFE4EB
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DFE4F6
                                • Part of subcall function 00DE7440: VirtualProtect.KERNELBASE(00000000,00000004,00000004,?,?), ref: 00DE7579
                                • Part of subcall function 00DE7440: VirtualProtect.KERNELBASE(00000000,00000004,?,?), ref: 00DE759F
                                • Part of subcall function 00DE7440: FreeLibrary.KERNEL32(00000000), ref: 00DE75A3
                              • GetSysColor.USER32(00000005), ref: 00DFE52C
                              • CreateSolidBrush.GDI32(00000000), ref: 00DFE535
                              • GetSysColor.USER32(0000000F), ref: 00DFE557
                              • CreateSolidBrush.GDI32(00000000), ref: 00DFE55A
                              • StrStrIW.SHLWAPI(af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T,en-US), ref: 00DFE56B
                              • GetSystemMetrics.USER32(0000000B), ref: 00DFE5AF
                              • GetSystemMetrics.USER32(0000000C), ref: 00DFE5B5
                              • GetSystemMetrics.USER32(00000031), ref: 00DFE5BD
                              • GetSystemMetrics.USER32(00000032), ref: 00DFE5C5
                              • #381.COMCTL32(?,00000064,00000000,?,00E7E444,?,?,00000400), ref: 00DFE5E9
                              • #381.COMCTL32(?,00000064,?,00000000,00E7D9F0,?,?,00000400), ref: 00DFE605
                              • LoadCursorW.USER32 ref: 00DFE63A
                              • RegisterClassW.USER32 ref: 00DFE661
                              • LoadAcceleratorsW.USER32(?,00000064), ref: 00DFE68B
                                • Part of subcall function 00DE7010: SystemParametersInfoW.USER32(00000042,0000000C,00000000), ref: 00DE7041
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DFE6A6
                              • TranslateAcceleratorW.USER32(00000000,?,?), ref: 00DFE6BC
                              • TranslateMessage.USER32(?), ref: 00DFE6C7
                              • DispatchMessageW.USER32(?), ref: 00DFE6D2
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DFE6E3
                              • OleUninitialize.OLE32(?,?,00000400), ref: 00DFE6FC
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 00DFE7B6
                              • SetThreadUILanguage.KERNEL32(75297340), ref: 00DFE7DD
                              • lstrcmpW.KERNEL32(en-US,en-US), ref: 00DFE7ED
                              • InitMUILanguage.COMCTL32(75297340,lng/mplng.dll,00000008,75297340), ref: 00DFE817
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Color$Message$lstrcpy$SystemWindow$CreateFileMetricsPath$DirectoryFreeGlobalLibraryLoadSendSize$#381AllocBrushInitLanguageLocalProtectRegisterSolidThreadTranslateVersionVirtuallstrcmpilstrlen$AcceleratorAcceleratorsAppendAsyncClassCloseCommandCommonControlsCurrentCursorDispatchEnabledEnumErrorExistsForegroundHandleIconicInfoInitializeLanguagesLineModeModuleNameNumbersParametersPreferredRelativeShowUninitializeVisibleWindowslstrcmp
                              • String ID: *.*$333$MiniPath$PreferredLanguageLocaleName$Settings2$TaskbarCreated$af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T$en-US$en-US$lng/mplng.dll
                              • API String ID: 1059946812-3937950211
                              • Opcode ID: 84adb6bcd0054141f2955a9dea3c18b88d9adb3f35d655ecda17c88b62927377
                              • Instruction ID: cef2a6803c84696637a09f7c1f455f376cee7b7f2b7acbf2d77eb3c9707bcd84
                              • Opcode Fuzzy Hash: 84adb6bcd0054141f2955a9dea3c18b88d9adb3f35d655ecda17c88b62927377
                              • Instruction Fuzzy Hash: 87C1A771A043449FD710EF72EC09B6B7BE5FF48744F04481AF648A72A1EBB59448CBA2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 264 dfefb0-dfefea 265 dffa49-dffa4f 264->265 266 dfeff0 264->266 269 dffa55 265->269 270 dffcb0-dffcb6 265->270 267 dffa26-dffa46 call e02050 call e08e39 266->267 268 dfeff6-dfeffe 266->268 274 dfff9d-dfffa3 268->274 275 dff004 268->275 276 dffa5b-dffa62 269->276 277 dffcd4-dffcdb 269->277 271 dffcbc 270->271 272 dffd71-dffd77 270->272 280 dffcbe-dffcc7 271->280 281 dffd25-dffd2d 271->281 282 dffd7d 272->282 283 dfff95-dfff9b 272->283 284 dfffa9-dfffb2 IsWindowVisible 274->284 285 dff366-dff37b DefWindowProcW call e08e39 274->285 275->285 278 dffb2d-dffb33 276->278 279 dffa68-dffa6b 276->279 286 dfffbe-dfffd3 call e08e39 277->286 287 dffce1-dffce8 call de7010 277->287 290 dffb39 278->290 291 dffbe4-dffbea 278->291 292 dffa6d-dffa70 279->292 293 dffa99-dffaa9 WaitForSingleObject 279->293 280->274 294 dffccd 280->294 281->286 301 dffd33-dffd39 281->301 295 dffe47-dffe5d GetWindowLongW 282->295 296 dffd83-dffd89 282->296 283->274 297 dfffd6-dfffdc 283->297 284->286 298 dfffb4-dfffb9 call e06360 284->298 303 dff380-dff383 285->303 287->286 326 dffcee-dffd22 SetBkColor SetTextColor call e08e39 287->326 306 dffb3f-dffb46 290->306 307 dffc25-dffc35 ShowOwnedPopups 290->307 291->307 312 dffbec-dffbf2 291->312 292->274 313 dffa76-dffa96 call e01dd0 call e08e39 292->313 293->286 317 dffaaf-dffafb call df9480 FindNextChangeNotification SendMessageW 293->317 294->274 294->277 304 dffe5f-dffe6f call de7010 295->304 305 dffe83-dfff92 GetWindowLongW SetWindowLongW SetWindowPos SendMessageW call e0ba00 SendMessageW call dfb090 DestroyWindow * 3 call e009e0 GetClientRect SendMessageW * 2 UpdateWindow call e08e39 295->305 314 dffd8b-dffd91 296->314 315 dffdca-dffdd3 IsIconic 296->315 319 e0009c-e000ae call e06360 call dfd650 297->319 320 dfffe2-dfffe5 297->320 298->286 309 dffd3f-dffd42 301->309 310 dff386-dff3ac SendMessageW call e08e39 301->310 358 dffe7c-dffe7e call de70f0 304->358 359 dffe71-dffe75 304->359 322 dffb7b-dffb8c 306->322 323 dffb48-dffb4b 306->323 332 dffc3b-dffc59 SystemParametersInfoW 307->332 333 dff756-dff779 DefWindowProcW call e08e39 307->333 309->286 328 dffd48-dffd6e SendMessageW call e08e39 309->328 312->285 329 dffbf8-dffc22 DefWindowProcW ShowOwnedPopups call e08e39 312->329 314->274 331 dffd97-dffdc5 SetWindowPos RedrawWindow 314->331 334 dffdde-dffe17 DragQueryFileW call e05aa0 DragQueryFileW 315->334 335 dffdd5-dffdd8 ShowWindow 315->335 317->286 374 dffb01-dffb2a call df98d0 call e08e39 317->374 393 e000af ShowOwnedPopups 319->393 320->286 337 dfffe7-e00066 LoadMenuW GetSubMenu SetForegroundWindow GetCursorPos SetMenuDefaultItem TrackPopupMenu PostMessageW DestroyMenu 320->337 344 dffb8e-dffbb6 SetWindowPos call e08e39 322->344 345 dffbb9-dffbe1 SetWindowPos call e08e39 322->345 323->285 339 dffb51-dffb78 call dfd3f0 call e08e39 323->339 350 e000b5-e000cd call e08e39 331->350 351 dffc5b-dffc7d GetWindowRect call dfd430 DrawAnimatedRects 332->351 352 dffc83-dffcad ShowWindow call e06360 call e08e39 332->352 386 dffe19-dffe25 call df8540 334->386 387 dffe28-dffe44 DragFinish call e08e39 334->387 335->334 355 e00068-e0007b call e06360 call dfd650 337->355 356 e0007d-e00082 337->356 351->352 355->393 356->350 357 e00084-e0009a call e06360 PostMessageW 356->357 357->350 358->305 359->358 386->387 393->350
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00DFFFAA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: VisibleWindow
                              • String ID:
                              • API String ID: 1208467747-0
                              • Opcode ID: c515f196704aa852c0b05469e71a6d5e3fa166f6989e7a6b456450c6aa170efb
                              • Instruction ID: 082dec3d87f95b3762d92b4daddf2bc2924f874ccef9bb37437fdea3d4da3568
                              • Opcode Fuzzy Hash: c515f196704aa852c0b05469e71a6d5e3fa166f6989e7a6b456450c6aa170efb
                              • Instruction Fuzzy Hash: EC022A323042089FD320AB25EC4AFBF77A9EF89711F04852AF646B61D1DFB4584597A2

                              Control-flow Graph

                              APIs
                              • EnumWindows.USER32(00E060C0,00000000), ref: 00E06181
                              • IsWindowEnabled.USER32(00000000), ref: 00E06194
                              • IsIconic.USER32(00000000), ref: 00E061A6
                              • ShowWindowAsync.USER32(00000009,00000009), ref: 00E061B6
                              • IsWindowVisible.USER32(00000000), ref: 00E061C0
                              • SendMessageW.USER32(00000400,00000400,00000000,00000203), ref: 00E061E0
                              • SendMessageW.USER32(00000400,00000400,00000000,00000202), ref: 00E061F2
                              • SetForegroundWindow.USER32(00000000), ref: 00E061F8
                              • GlobalSize.KERNEL32(00000000), ref: 00E0620C
                              • PathIsRelativeW.SHLWAPI ref: 00E06227
                              • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00E0623B
                              • PathAppendW.SHLWAPI(?), ref: 00E0624C
                              • lstrcpyW.KERNEL32(?), ref: 00E0625D
                              • GlobalSize.KERNEL32 ref: 00E06271
                              • SendMessageW.USER32(?,0000004A,00000000,?), ref: 00E06291
                              • GlobalFree.KERNEL32 ref: 00E06299
                              • LoadStringW.USER32(0000C35F,?,00000100), ref: 00E062D5
                              • LoadStringW.USER32(0000C35F,?,00000100), ref: 00E062F0
                              • StrChrW.SHLWAPI(?,0000000A), ref: 00E062F9
                              • MessageBoxW.USER32(00000000,00000000,?,00010024), ref: 00E06318
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageWindow$GlobalSend$LoadPathSizeString$AppendAsyncCurrentDirectoryEnabledEnumForegroundFreeIconicRelativeShowVisibleWindowslstrcpy
                              • String ID:
                              • API String ID: 648661597-0
                              • Opcode ID: 3ffd40735de35b8df09efedeb9c1ee96155a4865160fdf201b8c67703f018a05
                              • Instruction ID: e0ddd1563e58b362cf2d76fa97b54b592b5ab7dcc755567e4eca5ff54710b1d0
                              • Opcode Fuzzy Hash: 3ffd40735de35b8df09efedeb9c1ee96155a4865160fdf201b8c67703f018a05
                              • Instruction Fuzzy Hash: 9D517A31344305AFE710DF61EC09B5B3BE9EB58B84F404429F559BA2F0EBB49899CB52
                              APIs
                              • HeapCreate.KERNELBASE(00000000,00100000,01000000,?,00000000), ref: 02902F55
                                • Part of subcall function 029010D0: RtlAllocateHeap.NTDLL(00000000), ref: 029010E5
                                • Part of subcall function 029010D0: RtlFreeHeap.NTDLL(00000000,?,?,00000000), ref: 0290118C
                              • RtlAllocateHeap.NTDLL(00000000), ref: 02903728
                              • CloseHandle.KERNELBASE(?,?,000003E8), ref: 02903ABB
                              • VirtualFree.KERNELBASE(?,00000000,?,?,?,000003E8), ref: 02903B11
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Heap$AllocateFree$CloseCreateHandleVirtual
                              • String ID: 8
                              • API String ID: 2208713888-4194326291
                              • Opcode ID: dd4c42926a46e8288dd0f9414e768b2213c427a86a62db195dc2bc24e15ebdf9
                              • Instruction ID: b4507c01557f3548832410f436b336c8860ca6d54bbba6f46b1b665c6b452902
                              • Opcode Fuzzy Hash: dd4c42926a46e8288dd0f9414e768b2213c427a86a62db195dc2bc24e15ebdf9
                              • Instruction Fuzzy Hash: D25238B06083849FD774CF65C988BAFBBE5BBC9308F50896DE59997240DB309448CF96
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000000,?,?,?,0000000B), ref: 02910311
                                • Part of subcall function 02910098: VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 029100C1
                                • Part of subcall function 02910098: VirtualFree.KERNELBASE(00000000,00000000,?), ref: 0291026D
                              • VirtualAlloc.KERNELBASE(00000000,00400000,00001000,00000004,?,?,?,00000000,?,?,0000000B), ref: 02910363
                              • VirtualProtect.KERNELBASE(0000002C,?,00000040,0000002C,00000000,00000000,?,?,0000000B), ref: 029103BD
                              • VirtualFree.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,?,0000000B), ref: 029103F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000003.1791398308.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              • Associated: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Virtual$Alloc$Free$Protect
                              • String ID: ,
                              • API String ID: 1004437363-3772416878
                              • Opcode ID: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                              • Instruction ID: 1dc627fdcd98b1a5cc320a9488cf501e9c831883eeda3c23439fecd7c8311993
                              • Opcode Fuzzy Hash: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                              • Instruction Fuzzy Hash: 7541E8B5900709EFCB10DFA9C881B9EBBF8FF08354F10851AE959A7640D371E990CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 235 de9c80-de9ca7 lstrcmpiW 236 de9cdf-de9d03 PathIsDirectoryW 235->236 237 de9ca9-de9cde lstrcpyW * 2 call e08e39 235->237 239 de9d2d-de9d6b GetModuleFileNameW PathFindFileNameW PathAppendW PathRenameExtensionW PathFileExistsW 236->239 240 de9d05-de9d27 lstrlenW CharPrevW 236->240 243 de9d6d-de9d76 PathIsDirectoryW 239->243 244 de9d78-de9d90 PathFindFileNameW lstrcpyW PathFileExistsW 239->244 240->239 242 de9dc7-de9dd0 PathIsDirectoryW 240->242 247 de9dfa-de9e53 GetModuleFileNameW PathRemoveFileSpecW lstrcatW PathFindFileNameW PathAppendW PathRenameExtensionW PathFileExistsW 242->247 248 de9dd2-de9df4 lstrlenW CharPrevW 242->248 243->242 243->244 245 de9d9d-de9dc1 PathFindFileNameW * 2 lstrcpyW PathRenameExtensionW 244->245 246 de9d92-de9d9b PathIsDirectoryW 244->246 245->242 246->242 246->245 249 de9e55-de9e5e PathIsDirectoryW 247->249 250 de9e60-de9e78 PathFindFileNameW lstrcpyW PathFileExistsW 247->250 248->247 251 de9ea9-de9eb8 PathFileExistsW 248->251 249->250 249->251 252 de9e7a-de9e83 PathIsDirectoryW 250->252 253 de9e85-de9ea3 PathFindFileNameW * 2 lstrcpyW PathRenameExtensionW 250->253 254 de9eba-de9ec3 PathIsDirectoryW 251->254 255 de9ed0-de9eda lstrcpyW 251->255 252->251 252->253 253->251 254->255 256 de9ec5-de9ece PathIsDirectoryW 254->256 257 de9edc-de9ee5 PathFileExistsW 255->257 256->255 256->257 258 de9ef9-de9f11 lstrcpyW * 2 257->258 259 de9ee7-de9ef0 PathIsDirectoryW 257->259 261 de9f13-de9f2b call e08e39 258->261 259->258 260 de9ef2-de9ef7 259->260 260->261
                              APIs
                              • lstrcmpiW.KERNEL32(00E7D538,00E74724,75BFCF90), ref: 00DE9C9F
                              • lstrcpyW.KERNEL32(C:\Users\user\Desktop\dZIZhRHDXv.ini,00E74520), ref: 00DE9CB9
                              • lstrcpyW.KERNEL32(00E7D538,00E74520), ref: 00DE9CC5
                              • PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE9CED
                              • lstrlenW.KERNEL32(00E7D538), ref: 00DE9D0A
                              • CharPrevW.USER32(00E7D538,00000000), ref: 00DE9D1D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00DE9D39
                              • PathFindFileNameW.SHLWAPI(?), ref: 00DE9D44
                              • PathAppendW.SHLWAPI(00E7D538,00000000), ref: 00DE9D4C
                              • PathRenameExtensionW.SHLWAPI(00E7D538,.ini), ref: 00DE9D5C
                              • PathFileExistsW.SHLWAPI(00E7D538), ref: 00DE9D67
                              • PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE9D72
                              • PathFindFileNameW.SHLWAPI(00E7D538,minipath.ini), ref: 00DE9D82
                              • lstrcpyW.KERNEL32(00000000), ref: 00DE9D85
                              • PathFileExistsW.SHLWAPI(00E7D538), ref: 00DE9D8C
                              • PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE9D97
                              • PathFindFileNameW.SHLWAPI(?), ref: 00DE9DA2
                              • PathFindFileNameW.SHLWAPI(00E7D538), ref: 00DE9DAB
                              • lstrcpyW.KERNEL32(00000000,00000000), ref: 00DE9DAF
                              • PathRenameExtensionW.SHLWAPI(00E7D538,.ini), ref: 00DE9DBB
                              • PathIsDirectoryW.SHLWAPI(00E7D330), ref: 00DE9DCC
                              • lstrlenW.KERNEL32(00E7D330), ref: 00DE9DD7
                              • CharPrevW.USER32(00E7D330,00000000), ref: 00DE9DEA
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00DE9E06
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00DE9E11
                              • lstrcatW.KERNEL32(?,\Notepad3.exe), ref: 00DE9E21
                              • PathFindFileNameW.SHLWAPI(?), ref: 00DE9E2C
                              • PathAppendW.SHLWAPI(00E7D330,00000000), ref: 00DE9E34
                              • PathRenameExtensionW.SHLWAPI(00E7D330,.ini), ref: 00DE9E44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$File$Name$Find$Directorylstrcpy$ExtensionRename$AppendCharExistsModulePrevlstrlen$RemoveSpeclstrcatlstrcmpi
                              • String ID: .ini$C:\Users\user\Desktop\dZIZhRHDXv.ini$\Notepad3.exe$minipath.ini$notepad3.ini
                              • API String ID: 882991028-3868156248
                              • Opcode ID: 3c3c1a45d43ade137ba026d8c13f00b7765942f3b8618873a6086c8cee6826ff
                              • Instruction ID: 45510963693984f780a58c852c889f1624bc06a699e48298bf7a243b5549e45f
                              • Opcode Fuzzy Hash: 3c3c1a45d43ade137ba026d8c13f00b7765942f3b8618873a6086c8cee6826ff
                              • Instruction Fuzzy Hash: 4E5175A1785349FFD610BBB6AC46E2B7AB8EF44FC9B449015F548F61D0DBE0D8048A72

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 410 dfe910-dfe9af MonitorFromRect GetMonitorInfoW 411 dfe9b5-dfe9bb 410->411 412 dfeaf3-dfeb24 SystemParametersInfoW 410->412 411->412 414 dfe9c1-dfe9c7 411->414 413 dfeb29-dfeb31 412->413 416 dfeb35-dfeb69 CreateWindowExW 413->416 414->412 415 dfe9cd-dfe9d3 414->415 415->412 417 dfe9d9-dfea1b 415->417 418 dfeb6b-dfeb7e SetWindowPos 416->418 419 dfeb84-dfeb94 416->419 420 dfea1d-dfea2f 417->420 421 dfea39-dfea45 417->421 418->419 422 dfebce-dfebdd GetWindowLongW SetWindowLongW 419->422 423 dfeb96-dfebcc GetWindowLongW SetWindowLongW MulDiv SetLayeredWindowAttributes 419->423 420->421 425 dfea31-dfea35 420->425 426 dfea6d-dfeaa5 SetRect IntersectRect 421->426 427 dfea47-dfea63 421->427 424 dfebe3-dfebea 422->424 423->424 428 dfebec-dfec0b ShowWindow UpdateWindow 424->428 429 dfec10-dfec2c ShowWindow 424->429 425->421 426->416 431 dfeaab-dfeaf1 426->431 427->426 430 dfea65-dfea69 427->430 432 dfeca4-dfecac 428->432 433 dfec2e-dfec45 LoadImageW 429->433 434 dfec4b-dfec9e call e0ba00 lstrcpyW Shell_NotifyIconW 429->434 430->426 431->413 436 dfecae-dfecc4 call e05aa0 GlobalFree 432->436 437 dfecc6-dfeccd 432->437 433->434 434->432 442 dfed3f-dfed56 SendMessageW 436->442 440 dfeccf-dfecd2 437->440 441 dfed27-dfed2e 437->441 445 dfecd4-dfecff call de89e0 440->445 446 dfed20-dfed25 440->446 441->442 443 dfed30 441->443 448 dfed6f-dfed98 call e08e39 442->448 449 dfed58-dfed69 PostMessageW 442->449 447 dfed35 443->447 454 dfed0f-dfed1e call df8540 445->454 455 dfed01-dfed0d 445->455 446->447 451 dfed3a call e05aa0 447->451 449->448 451->442 454->442 455->451
                              APIs
                              • MonitorFromRect.USER32(?,00000002), ref: 00DFE989
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00DFE9A3
                              • SetRect.USER32(00000028,?,00000000,?,?), ref: 00DFEA7F
                              • IntersectRect.USER32(?,?,?), ref: 00DFEA9D
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00DFEB01
                              • CreateWindowExW.USER32(00000000,MiniPath,MinPath,82CC0000,?,?,00000110,00000280,00000000,00000000,?,00000000), ref: 00DFEB54
                              • SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000003), ref: 00DFEB78
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 00DFEB96
                              • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 00DFEBA5
                              • MulDiv.KERNEL32(0000004B,000000FF,00000064), ref: 00DFEBB3
                              • SetLayeredWindowAttributes.USER32(00000000,00000000,?,00000002), ref: 00DFEBC6
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 00DFEBCE
                              • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 00DFEBDD
                              • ShowWindow.USER32(?), ref: 00DFEBF9
                              • UpdateWindow.USER32 ref: 00DFEC05
                              • ShowWindow.USER32(00000000), ref: 00DFEC18
                              • LoadImageW.USER32(00000064,00000001,00000010,00000010,00000000), ref: 00DFEC3D
                              • lstrcpyW.KERNEL32(?,?,?,MiniPath), ref: 00DFEC91
                              • Shell_NotifyIconW.SHELL32(00000000,000003BC), ref: 00DFEC9E
                              • GlobalFree.KERNEL32 ref: 00DFECBE
                              • SendMessageW.USER32(00001004,00000000,00000000), ref: 00DFED4E
                              • PostMessageW.USER32(00000111,00019D0D,00000000), ref: 00DFED69
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Window$Long$Rect$InfoMessageMonitorShow$AttributesCreateFreeFromGlobalIconImageIntersectLayeredLoadNotifyParametersPostSendShell_SystemUpdatelstrcpy
                              • String ID: ($C:\Users\user\Documents$MRUDirectory$MinPath$MiniPath$Settings
                              • API String ID: 3277733087-429084358
                              • Opcode ID: a530787f1490b07fc1fef5a5c36004d5430daa98870901c1bc2b441736ebd848
                              • Instruction ID: 5dd1c14f7b28562d2814fe77d696497370e06cf1d092a7ad7b267db268aec447
                              • Opcode Fuzzy Hash: a530787f1490b07fc1fef5a5c36004d5430daa98870901c1bc2b441736ebd848
                              • Instruction Fuzzy Hash: 44C126716043499FD720CF15EC45BABB7E9FB84700F144A2DF649B72A0D7B0A948CB66

                              Control-flow Graph

                              APIs
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104,75B04E90,74E2F860,?,75B0A6F0), ref: 00DE96CA
                              • PathIsRelativeW.SHLWAPI(?,?,75B0A6F0), ref: 00DE96D8
                              • lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE96F2
                              • PathFindFileNameW.SHLWAPI(?,?,?,75B0A6F0), ref: 00DE9701
                              • lstrcpyW.KERNEL32(00000000,?,75B0A6F0), ref: 00DE9708
                              • PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE970F
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00DE9724
                              • lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE9734
                              • PathRemoveFileSpecW.SHLWAPI(?,?,75B0A6F0), ref: 00DE973B
                              • lstrcatW.KERNEL32(?,\np3\,?,75B0A6F0), ref: 00DE9751
                              • lstrcatW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE9760
                              • PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE9767
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00DE9776
                              • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?,?,75B0A6F0), ref: 00DE978F
                              • PathAppendW.SHLWAPI(?,?,?,75B0A6F0), ref: 00DE97A2
                              • PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE97AD
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00DE97BC
                              • SHGetFolderPathW.SHELL32(00000000,00000028,00000000,00000000,?,?,75B0A6F0), ref: 00DE97CF
                              • PathAppendW.SHLWAPI(?,?,?,75B0A6F0), ref: 00DE97E2
                              • lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE97FB
                              • PathFileExistsW.SHLWAPI(?,?,75B0A6F0), ref: 00DE980C
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00DE981E
                              • lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE9831
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$File$lstrcpy$DirectoryExists$AppendFolderlstrcat$EnvironmentExpandFindNameRelativeRemoveSpecStrings
                              • String ID: \np3\
                              • API String ID: 3472113900-578766168
                              • Opcode ID: 1d5f0514f9099267cf160a294a9c58bf929addc29a4d1fd48c6d7369ff5b8aea
                              • Instruction ID: 1c8fc91f91b5a609cf47cffe19b7eb5082cd93804b63030451f94ba20ee79460
                              • Opcode Fuzzy Hash: 1d5f0514f9099267cf160a294a9c58bf929addc29a4d1fd48c6d7369ff5b8aea
                              • Instruction Fuzzy Hash: AB410FB264434A9BD720EFA2EC88FABB7ECAF44780F040929F545D2150EBB4D50D8B71

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 507 e077e6-e0781a 508 e07820-e07827 507->508 509 e07edd 507->509 508->509 510 e0782d-e07830 508->510 511 e07edf-e07eed call e08e39 509->511 513 e07832-e07836 510->513 514 e0783c-e0785a call e07219 LoadLibraryExW 510->514 513->509 513->514 514->509 518 e07860-e07867 514->518 518->511 519 e0786d-e0788d SearchPathW 518->519 520 e07893-e0789b 519->520 521 e07ed6-e07ed7 FreeLibrary 519->521 522 e078ad-e078b5 520->522 523 e0789d-e078ab 520->523 521->509 524 e078b9-e078c3 call e07557 522->524 523->524 527 e078c9-e078cc 524->527 528 e07c7e-e07c82 524->528 529 e078d2-e078d9 527->529 530 e07e4a-e07e51 527->530 531 e07c93-e07c96 528->531 532 e07c84-e07c8d call e07557 528->532 535 e07ce5-e07ce7 529->535 536 e078df-e078f0 GetUserDefaultUILanguage 529->536 530->528 537 e07e57-e07e5b 530->537 533 e07ed2-e07ed4 531->533 534 e07c9c-e07caa FreeLibrary call e07219 531->534 532->521 532->531 533->511 555 e07cb0-e07ce0 call e07594 call e074cf 534->555 556 e07eb4-e07eca call e07219 LoadLibraryExW 534->556 535->528 540 e07ce9-e07cfb call e0716c 535->540 541 e078f2-e078f7 call e0710f 536->541 542 e078fa-e07911 536->542 543 e07e7d-e07e94 call e07594 537->543 544 e07e5d-e07e75 call e07391 537->544 567 e07d01-e07d1e call e07391 540->567 568 e07d98-e07dca call e07594 call e07325 540->568 541->542 550 e07aa6-e07ad8 call e07594 call e07325 542->550 551 e07917-e07934 call e07391 542->551 565 e07e97-e07ea3 543->565 544->528 562 e07e7b 544->562 579 e07ea9-e07eb2 FreeLibrary 550->579 586 e07ade-e07afa call e07391 550->586 569 e07c70-e07c72 551->569 570 e0793a-e07952 call e07325 551->570 581 e07ed0 555->581 556->581 562->565 565->579 567->528 584 e07d24-e07d3c call e07325 567->584 568->579 593 e07dd0-e07dec call e07391 568->593 569->579 580 e07c78 569->580 570->579 591 e07958-e07970 call e07325 570->591 579->511 580->528 581->533 584->579 598 e07d42-e07d5a call e07325 584->598 600 e07b4b-e07b57 586->600 601 e07afc-e07b14 LocaleNameToLCID 586->601 591->579 606 e07976-e0797d 591->606 610 e07e39-e07e3e 593->610 611 e07dee-e07e06 LocaleNameToLCID 593->611 598->579 620 e07d60-e07d67 598->620 602 e07b69-e07b7f GetSystemDefaultUILanguage 600->602 603 e07b59-e07b64 600->603 601->600 607 e07b16-e07b45 call e07594 call e07325 601->607 608 e07c30-e07c3c 602->608 609 e07b85-e07bb7 call e07594 call e07325 602->609 603->550 613 e0799d-e079a9 606->613 614 e0797f-e07997 call e07325 606->614 607->579 607->600 616 e07c3e-e07c41 608->616 617 e07c5f-e07c6e call e07325 608->617 609->579 651 e07bbd-e07bd9 call e07391 609->651 610->530 611->610 619 e07e08-e07e37 call e07594 call e07325 611->619 622 e079bb-e079d1 GetSystemDefaultUILanguage 613->622 623 e079ab-e079b6 613->623 614->579 614->613 616->617 625 e07c43-e07c49 616->625 617->569 619->579 619->610 628 e07d87-e07d8c 620->628 629 e07d69-e07d81 call e07325 620->629 633 e07a63-e07a6f 622->633 634 e079d7-e079f4 call e07391 622->634 623->551 635 e07c4e-e07c59 call e07325 625->635 628->568 629->579 629->628 633->617 640 e07a75-e07a78 633->640 634->580 649 e079fa-e07a12 call e07325 634->649 635->579 635->617 640->617 648 e07a7e-e07aa1 call e07391 640->648 648->635 649->579 659 e07a18-e07a30 call e07325 649->659 660 e07c2a 651->660 661 e07bdb-e07bf3 LocaleNameToLCID 651->661 659->579 666 e07a36-e07a3d 659->666 660->608 661->660 663 e07bf5-e07c24 call e07594 call e07325 661->663 663->579 663->660 668 e07a5d 666->668 669 e07a3f-e07a57 call e07325 666->669 668->633 669->579 669->668
                              APIs
                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T,75297340), ref: 00E07850
                              • SearchPathW.KERNEL32(00000000,?,00000000,00000104,?,00000000), ref: 00E07885
                              • GetUserDefaultUILanguage.KERNEL32(00000000,00000000), ref: 00E078DF
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,?,?,00000000,00000000,?,?,00000000,00000404,?,?,?), ref: 00E079BB
                              • LocaleNameToLCID.KERNEL32(?,08000000,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00000000), ref: 00E07B08
                              • GetSystemDefaultUILanguage.KERNEL32(?,?,?,00000000,00000000,?,?,00000000), ref: 00E07B69
                              • LocaleNameToLCID.KERNEL32(?,08000000,?,?,?,00000000,00000000,?,?,00000000), ref: 00E07BE7
                              • LocaleNameToLCID.KERNEL32(?,08000000,?,?,?,00000000,00000000,?,?,00000000,?,?,00000000,00000000), ref: 00E07DFA
                              • FreeLibrary.KERNEL32(00000000,00000000,00000000), ref: 00E07C9D
                                • Part of subcall function 00E07391: LCIDToLocaleName.KERNEL32(00000000,00000000,00000055,08000000,?,?,00E07E73,?,?), ref: 00E073B1
                                • Part of subcall function 00E07391: GetLocaleInfoEx.KERNEL32(00000000,0000006D,00000000,00000055,?,00E07E73,?,?), ref: 00E073C3
                              • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,00000000), ref: 00E07EAA
                              • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00E07ECA
                              • FreeLibrary.KERNEL32(00000000), ref: 00E07ED7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LibraryLocale$Name$DefaultFreeLanguage$LoadSystem$InfoPathSearchUser
                              • String ID: %s\%s$MUI\%04hx$MUI\0409$af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T
                              • API String ID: 383961474-2845549710
                              • Opcode ID: 4feb53cedeeef08f4206d85c157da1ec9c906127330e6ce1c178836631662b4e
                              • Instruction ID: 0e3f2c9f7621004456ec84a17fe9113e67f2b6c0a1c64d39ad28616a42b3e7fa
                              • Opcode Fuzzy Hash: 4feb53cedeeef08f4206d85c157da1ec9c906127330e6ce1c178836631662b4e
                              • Instruction Fuzzy Hash: 2E0296B2D0466DAADB319A60CC45FFB73BCAB44344F4460D9BAC5B61C1DB34AEC58B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 674 de7440-de7450 675 de747e-de748f call de6e90 674->675 676 de7452-de7478 RtlGetNtVersionNumbers 674->676 677 de75ab-de75ae 675->677 680 de7495-de74b1 675->680 676->675 676->677 684 de74b3-de74ba call de6fc0 680->684 685 de74c0 680->685 684->685 690 de74bc-de74be 684->690 687 de74c2-de74ed LoadLibraryExW 685->687 691 de75aa 687->691 692 de74f3-de7504 687->692 690->687 691->677 693 de750a 692->693 694 de75a2-de75a9 FreeLibrary 692->694 695 de7510-de7525 call e1501d 693->695 694->691 698 de753d-de754c 695->698 699 de7527-de752e 695->699 701 de754e 698->701 702 de7563 698->702 699->695 700 de7530-de753c FreeLibrary 699->700 703 de7556-de7561 701->703 704 de7550-de7554 701->704 705 de7565-de7567 702->705 703->701 703->702 704->703 704->705 706 de7569-de757d VirtualProtect 705->706 707 de75a1 705->707 706->707 708 de757f-de759f VirtualProtect 706->708 707->694 708->707
                              APIs
                              • RtlGetNtVersionNumbers.NTDLL ref: 00DE7461
                              • LoadLibraryExW.KERNEL32(comctl32.dll,00000000,00000800), ref: 00DE74E3
                              • FreeLibrary.KERNEL32(00000000), ref: 00DE7531
                              • VirtualProtect.KERNELBASE(00000000,00000004,00000004,?,?), ref: 00DE7579
                              • VirtualProtect.KERNELBASE(00000000,00000004,?,?), ref: 00DE759F
                              • FreeLibrary.KERNEL32(00000000), ref: 00DE75A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Library$FreeProtectVirtual$LoadNumbersVersion
                              • String ID: P#_t@~`t)^t$comctl32.dll$uxtheme.dll
                              • API String ID: 1860271146-4174337272
                              • Opcode ID: 834763b89896e766d3ab7c8b6f12547c01007bdc3962846c482715498f35845c
                              • Instruction ID: e7c71c21a9dfc16b8767c53e48025c0ef535ae8fae03950c0dc5ce3bcfb83f5e
                              • Opcode Fuzzy Hash: 834763b89896e766d3ab7c8b6f12547c01007bdc3962846c482715498f35845c
                              • Instruction Fuzzy Hash: 8F4123726083819FDB60EB6AEC84B6637A5AF40744F0C4468E949F7292E721D84DCB71

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 709 dfde20-dfde36 710 dfde3c-dfde4c call e415c0 709->710 711 dfe006-dfe00f 709->711 710->711 714 dfde52-dfde54 710->714 714->711 715 dfde5a-dfde69 714->715 716 dfde6b-dfde73 715->716 717 dfde79 715->717 716->717 718 dfde75-dfde77 716->718 719 dfde7e-dfde89 717->719 718->719 720 dfde8f 719->720 721 dfdff6-dfdffa 719->721 722 dfde90-dfde95 720->722 723 dfdfd2-dfdfdc 721->723 724 dfdffc-dfe005 722->724 725 dfde9b-dfde9d 722->725 723->724 726 dfdfde-dfdfee 723->726 724->711 727 dfdea2-dfdea8 725->727 728 dfdeaa-dfdeb4 StrChrW 727->728 729 dfdec5-dfdec7 727->729 730 dfdebe 728->730 731 dfdeb6-dfdeb8 728->731 732 dfdece-dfded0 729->732 733 dfdec9-dfdecb 729->733 737 dfdec0-dfdec3 730->737 736 dfdeba-dfdebc 731->736 731->737 734 dfdfb6-dfdfb8 732->734 735 dfded6-dfdee7 call e415c0 732->735 733->732 739 dfdfba-dfdfbf 734->739 740 dfdfc5-dfdfcb 734->740 735->734 743 dfdeed-dfdef6 IsValidLocaleName 735->743 736->730 736->737 737->727 737->729 739->722 739->740 740->724 742 dfdfcd 740->742 742->723 743->734 744 dfdefc-dfdf11 743->744 745 dfdfef-dfdff4 744->745 746 dfdf17-dfdf1d 744->746 748 dfdf9d-dfdfb2 745->748 746->745 747 dfdf23-dfdf25 746->747 749 dfdf27-dfdf2b 747->749 748->734 750 dfdf2d-dfdf33 749->750 751 dfdf35-dfdf4c 749->751 750->749 750->751 752 dfdf4e-dfdf59 751->752 753 dfdf99 751->753 754 dfdf5b-dfdf65 752->754 755 dfdf80-dfdf96 752->755 753->748 756 dfdf67-dfdf69 754->756 755->753 756->755 757 dfdf6b-dfdf72 756->757 757->755 758 dfdf74-dfdf7e 757->758 758->755 758->756
                              APIs
                              • StrChrW.SHLWAPI(00000001,00000002), ref: 00DFDEAC
                              • IsValidLocaleName.KERNELBASE(00000001,?,?,?,75297340,?,?,?,00DFE794,?,00000400), ref: 00DFDEEE
                              Strings
                              • ,; :, xrefs: 00DFDE9D
                              • af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T, xrefs: 00DFDE25
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LocaleNameValid
                              • String ID: ,; :$af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T
                              • API String ID: 3707212039-2850223807
                              • Opcode ID: f982424bd9002e755417c7b333b109d3fe210c688d4131eda7ff665fc7757bd6
                              • Instruction ID: 86676653d077ecd23dfa000b203858405bfbd9e8a124ddee818f984c402bb3f7
                              • Opcode Fuzzy Hash: f982424bd9002e755417c7b333b109d3fe210c688d4131eda7ff665fc7757bd6
                              • Instruction Fuzzy Hash: A951042170539A4BD7309E7C9C40A7B77D7AF90750F5EC62DEA86CB295EA24CC0883B1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 759 de6e90-de6ec6 760 de6ec8-de6ecf 759->760 761 de6f44 759->761 760->761 763 de6ed1-de6ed8 760->763 762 de6f46-de6f57 761->762 763->762 764 de6eda-de6ee6 call e08b69 763->764 766 de6eeb-de6f0d 764->766
                              APIs
                              • ___HrLoadAllImportsForDll@4.DELAYIMP ref: 00DE6EE6
                                • Part of subcall function 00E08B69: ___delayLoadHelper2@8.DELAYIMP ref: 00E08BB2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Load$Dll@4Helper2@8Imports___delay
                              • String ID: UxTheme.dll$cE
                              • API String ID: 138266689-328260853
                              • Opcode ID: e65997e9a48ba14e63f644f9e23f8520b65e914d19e129bca4eb07f4330eca44
                              • Instruction ID: c7afa820d262496c27acf519bacb0a7690e1a56025525126c047ec65c1ce6455
                              • Opcode Fuzzy Hash: e65997e9a48ba14e63f644f9e23f8520b65e914d19e129bca4eb07f4330eca44
                              • Instruction Fuzzy Hash: 8A0149726047489FCF14CF59ED41B9ABBB8FB01720F20016AE918A3680E3355404C764

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 767 de7c00-de7c0c PathFileExistsW 768 de7c0e-de7c17 PathIsDirectoryW 767->768 769 de7c20-de7c23 767->769 768->769 770 de7c19-de7c1f 768->770
                              APIs
                              • PathFileExistsW.KERNELBASE(C:\Windows\system32\Viewers\Quikview.exe,00000002,00DEA3D9), ref: 00DE7C04
                              • PathIsDirectoryW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DE7C0F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$DirectoryExistsFile
                              • String ID: C:\Windows\system32\Viewers\Quikview.exe
                              • API String ID: 1302732169-377476166
                              • Opcode ID: 64da0cadc302cefb2d208b839b8cd548b253f5b65843b7ec5d48183ea8b07da7
                              • Instruction ID: 0bf58ba76fe619190ba7c888cfe75a1001889b281876feff32a5d82eff83c878
                              • Opcode Fuzzy Hash: 64da0cadc302cefb2d208b839b8cd548b253f5b65843b7ec5d48183ea8b07da7
                              • Instruction Fuzzy Hash: 27C01232319D600AE7603B267D087DB125C8F016D1B1D046AF404D5144E6D4DC8246E4
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000), ref: 029010E5
                              • RtlFreeHeap.NTDLL(00000000,?,?,00000000), ref: 0290118C
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Heap$AllocateFree
                              • String ID:
                              • API String ID: 2488874121-0
                              • Opcode ID: 9846261888abe301b971d507e7da30d0043d3e4b9fa9ba8bff61949ba6e26eb8
                              • Instruction ID: 850a0ffb77103765e0883d97f5a96f4002b94a7a0ba327c4b0744859b92e0c29
                              • Opcode Fuzzy Hash: 9846261888abe301b971d507e7da30d0043d3e4b9fa9ba8bff61949ba6e26eb8
                              • Instruction Fuzzy Hash: 9921C332E843086FF7B42A746CC9F7B3B6C9B58745F064515FD0DD11C0EB698858C665
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 029100C1
                              • VirtualFree.KERNELBASE(00000000,00000000,?), ref: 0291026D
                              Memory Dump Source
                              • Source File: 00000000.00000003.1791398308.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              • Associated: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: c4e05415e69c24d916c032145dcef53eb47034c17d4a44e0f4697a572808d492
                              • Instruction ID: 61b94f78ed9eb6762eb9177acc17a98c797a031fd374b54da98011aec886e4af
                              • Opcode Fuzzy Hash: c4e05415e69c24d916c032145dcef53eb47034c17d4a44e0f4697a572808d492
                              • Instruction Fuzzy Hash: 3E718971A0424EDFDB45CF99C981BEEBBF0AB09314F144495E865FB241C339AA91CF64
                              APIs
                              • LoadLibraryW.KERNEL32(uxtheme.dll,98D825DA,75C05540,?), ref: 00E00A51
                              • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 00E00A63
                              • FreeLibrary.KERNEL32(00000000), ref: 00E00A76
                              • CreateWindowExW.USER32(00000080,ToolbarWindow32,00000000,54001D68,00000000,00000000,00000000,00000000,?,000000A1,?,00000000), ref: 00E00AC8
                              • SendMessageW.USER32(0000041E,00000014,00000000), ref: 00E00B1D
                              • LoadImageW.USER32(?,00000064,00000000,00000000,00000000,00002000), ref: 00E00B5F
                              • CopyImage.USER32(00000000,00000000,00000000,00000000,00002000), ref: 00E00B73
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00E00B89
                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 00E00BEE
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E00BF2
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E00BF6
                              • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00E00C20
                              • GetSysColor.USER32(0000000F), ref: 00E00C2C
                              • ImageList_Create.COMCTL32(?,?,?,00000021,00000000,00000000), ref: 00E00C63
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,FF000000), ref: 00E00C72
                              • DeleteObject.GDI32(00000000), ref: 00E00C79
                              • SendMessageW.USER32(00000430,00000000,00000000), ref: 00E00C8D
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00E00CBD
                              • ImageList_Create.COMCTL32(?,?,?,00000021,00000000,00000000), ref: 00E00CEB
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,FF000000), ref: 00E00CFA
                              • DeleteObject.GDI32(00000000), ref: 00E00D01
                              • SendMessageW.USER32(00000434,00000000,00000000), ref: 00E00D15
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00E00D45
                              • ImageList_Create.COMCTL32(?,?,?,00000021,00000000,00000000), ref: 00E00D73
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,FF000000), ref: 00E00D82
                              • DeleteObject.GDI32(00000000), ref: 00E00D89
                              • SendMessageW.USER32(00000436,00000000,00000000), ref: 00E00D9D
                              • GetSysColor.USER32(0000000F), ref: 00E00DC2
                              • GetObjectW.GDI32(?,00000018,?), ref: 00E00DDE
                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 00E00F33
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E00F37
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E00F3B
                              • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00E00F65
                              • GetObjectW.GDI32(?,00000018,?), ref: 00E00F8F
                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 00E010B2
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E010B6
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E010BA
                              • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00E010E4
                              • GetSysColor.USER32(0000000F), ref: 00E010F0
                              • ImageList_Create.COMCTL32(?,?,?,00000021,00000000,00000000), ref: 00E0112B
                              • ImageList_AddMasked.COMCTL32(00000000,?,FF000000), ref: 00E0113A
                              • SendMessageW.USER32(00000436,00000000,00000000), ref: 00E0114E
                              • DeleteObject.GDI32(?), ref: 00E0115F
                              • wsprintfW.USER32 ref: 00E011AF
                              • lstrcmpiW.KERNEL32(?,(none)), ref: 00E011EC
                              • lstrcmpiW.KERNEL32(?,(none)), ref: 00E0120C
                              • SendMessageW.USER32(0000044D,00000000,?), ref: 00E01243
                              • SendMessageW.USER32(00000455,00000000,00000000), ref: 00E01298
                              • SendMessageW.USER32(00000454,00000000,00000000), ref: 00E012AB
                              • SendMessageW.USER32(00000444,00000006,00E7B960), ref: 00E012BF
                              • SendMessageW.USER32(00000444,00000006,00E7B960), ref: 00E012E7
                              • SendMessageW.USER32(0000041D,00000000,?), ref: 00E012FD
                              • CreateWindowExW.USER32(02000000,msctls_statusbar32,00000000,44000000,00000000,00000000,00000000,00000000,?,000000A0,?,00000000), ref: 00E01331
                              • SystemParametersInfoW.USER32(00000042,0000000C,0000000C,00000000), ref: 00E01388
                              • CreateWindowExW.USER32(00000080,ReBarWindow32,00000000,?,00000000,00000000,00000000,00000000,?,000000A2,?,00000000), ref: 00E0142A
                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 00E01494
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E01498
                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E0149C
                              • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00E014C6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ConditionMask$MessageSend$Image$Object$List_$Create$Info$DeleteMaskedVerifyVersion$ColorWindow$LibraryLoadlstrcmpi$AddressCopyFreeParametersProcSystemwsprintf
                              • String ID: $%02i$(none)$3$333$Explorer$IsAppThemed$ReBarWindow32$Toolbar Labels$ToolbarWindow32$d$msctls_statusbar32$uxtheme.dll
                              • API String ID: 3633255068-3515688118
                              • Opcode ID: bce7c3b77d5b52a5238f898c97b6d9d404e6339bf082235e7f839255823ee7b1
                              • Instruction ID: 8897513ccb571d4cba4cc15e6b2ca5d831af24119873e0e56b5ef9662fa7b3b9
                              • Opcode Fuzzy Hash: bce7c3b77d5b52a5238f898c97b6d9d404e6339bf082235e7f839255823ee7b1
                              • Instruction Fuzzy Hash: B882B271A40718AEEB308B65DC45FAA7BB9EB44705F1450DAE608FA2D0DBB49EC4CF14
                              APIs
                              • DialogBoxIndirectParamW.USER32(00D80000,00000000,?,Function_00073400,00000000), ref: 00E022FE
                              • LocalFree.KERNEL32(00000000,?,Function_00073400,00000000), ref: 00E0230D
                              • ShellExecuteExW.SHELL32(?), ref: 00E023D6
                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00E0249C
                              • StrCatBuffW.SHLWAPI(?,00E80ACC,00000104,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E024C4
                              • StrCatBuffW.SHLWAPI(?,00E74F0C,00000104,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E024D8
                              • StrCatBuffW.SHLWAPI(?,?,00000104,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E024EF
                              • SendMessageW.USER32(?,00000111,00019D0E,00000000), ref: 00E043E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Buff$DialogExecuteFreeIndirectLocalMessageNameParamPathSendShellShort
                              • String ID: $$X$<$C:\Windows\system32\Viewers\Quikview.exe$S
                              • API String ID: 1759457118-3802859302
                              • Opcode ID: d771ab0aa91183aefb0ec807993e342682e084f6e1d30a4191765d878ead96e7
                              • Instruction ID: b1888812706547e8de33431f9470f558bf222379d8bf4ec70f261a9c177abe17
                              • Opcode Fuzzy Hash: d771ab0aa91183aefb0ec807993e342682e084f6e1d30a4191765d878ead96e7
                              • Instruction Fuzzy Hash: 8F62F5B16043449FE730AB71ED46FAB73E8EB94304F105519E749B62D1EBB095C8CB62
                              APIs
                              • lstrcpyW.KERNEL32(00E7E460,00E7DA00), ref: 00E0673D
                              • EnumWindows.USER32(00E06420,00000000), ref: 00E0674D
                              • IsWindowEnabled.USER32(00000000), ref: 00E06760
                              • IsIconic.USER32(00000000), ref: 00E06772
                              • ShowWindowAsync.USER32(00000009,00000009), ref: 00E06782
                              • SetForegroundWindow.USER32(00000000), ref: 00E06795
                              • lstrlenW.KERNEL32(?), ref: 00E067A4
                              • GlobalAlloc.KERNEL32(00002042,00000000), ref: 00E067B7
                              • GlobalLock.KERNEL32(00000000), ref: 00E067C4
                              • lstrcpyW.KERNEL32(-00000014,?), ref: 00E067F5
                              • GlobalUnlock.KERNEL32(00000000), ref: 00E067F8
                              • PostMessageW.USER32(00000233,00000233,00000000,00000000), ref: 00E0680A
                              • StrChrW.SHLWAPI(?,0000000A,?,?), ref: 00E0685A
                              • MessageBoxW.USER32(00000000,?,00010024), ref: 00E06880
                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00E068C2
                              • StrCpyNW.SHLWAPI(?,00E7E030,00000104), ref: 00E068E7
                              • StrCatBuffW.SHLWAPI(?,00E74F0C,00000104), ref: 00E068FC
                              • StrCatBuffW.SHLWAPI(?,?,00000104), ref: 00E06909
                              • lstrcpyW.KERNEL32(?,00E7DE20), ref: 00E06918
                              • ShellExecuteExW.SHELL32 ref: 00E06999
                                • Part of subcall function 00DFA770: LoadStringW.USER32(0000A411,?,00000000,00000001), ref: 00DFA782
                                • Part of subcall function 00DFA770: LoadStringW.USER32(0000A411,?,?), ref: 00DFA798
                              • lstrcpynW.KERNEL32(?,00E7E240,00000100), ref: 00E06A39
                              • wsprintfW.USER32 ref: 00E06A72
                              • DdeInitializeW.USER32(?,00DFC0C0,00000010,00000000), ref: 00E06A89
                              • DdeCreateStringHandleW.USER32(?,00E7D7F0,000004B0), ref: 00E06AAB
                              • DdeCreateStringHandleW.USER32(?,00E7DC10,000004B0), ref: 00E06ABD
                              • DdeConnect.USER32(?,00000000,00000000,00000000), ref: 00E06AD6
                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00004050,000000FF,00000000,?,?,?,?,?,?,?,?,?), ref: 00E06AFA
                              • DdeClientTransaction.USER32(?,00000000), ref: 00E06B10
                              • DdeDisconnect.USER32(?), ref: 00E06B1A
                              • DdeUninitialize.USER32(?), ref: 00E06B4F
                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00E06BA6
                              • StrCpyNW.SHLWAPI(?,00E7E030,00000104,?,?,?,?), ref: 00E06BCE
                              • StrCatBuffW.SHLWAPI(?,00E74F0C,00000104,?,?,?,?), ref: 00E06BE6
                              • StrCatBuffW.SHLWAPI(?,?,00000104,?,?,?,?), ref: 00E06BF6
                              • lstrcpyW.KERNEL32(?,00E7DE20,?,?,?,?), ref: 00E06C02
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000138,?,?,?,?), ref: 00E06C1A
                              • lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?), ref: 00E06C36
                              • ShellExecuteExW.SHELL32(0000003C), ref: 00E06CD2
                              • DialogBoxIndirectParamW.USER32(00D80000,00000000,?,Function_00077B90,00000000), ref: 00E06CFE
                              • LocalFree.KERNEL32(00000000), ref: 00E06D09
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: BuffStringlstrcpy$GlobalWindow$CreateExecuteHandleLoadMessageNamePathShellShortlstrcpynlstrlen$AllocAsyncClientConnectDialogDisconnectEnabledEnumEnvironmentExpandForegroundFreeIconicIndirectInitializeLocalLockParamPostShowStringsTransactionUninitializeUnlockWindowswsprintf
                              • String ID: <$<
                              • API String ID: 2206026705-213342407
                              • Opcode ID: 8b7a7550fa82cb4cbcbdf4387ea79f38e15892b0a5d78808f61024900aad8cff
                              • Instruction ID: 014f99719cd69c370ecccf5f6219ef7075cea2892dbf9f56093e53f13a97bf51
                              • Opcode Fuzzy Hash: 8b7a7550fa82cb4cbcbdf4387ea79f38e15892b0a5d78808f61024900aad8cff
                              • Instruction Fuzzy Hash: 99F1B0B1604345AFD720DF51EC48B6BB7E8FB84748F005919F545B61E0EBF19898CBA2
                              APIs
                              • DName::DName.LIBVCRUNTIME ref: 00E0E017
                              • operator+.LIBVCRUNTIME ref: 00E0E031
                              • DName::operator+.LIBCMT ref: 00E0E15F
                              • DName::operator+.LIBCMT ref: 00E0E17C
                                • Part of subcall function 00E0F395: DName::DName.LIBVCRUNTIME ref: 00E0F3D8
                              • DName::operator+.LIBCMT ref: 00E0E230
                              • DName::operator+.LIBCMT ref: 00E0E23F
                                • Part of subcall function 00E13B15: DName::operator+.LIBCMT ref: 00E13B59
                                • Part of subcall function 00E13B15: DName::operator+.LIBCMT ref: 00E13B65
                                • Part of subcall function 00E13B15: DName::operator+.LIBCMT ref: 00E13BE0
                                • Part of subcall function 00E13B15: DName::operator+=.LIBCMT ref: 00E13C23
                              • DName::operator+.LIBCMT ref: 00E0E1CB
                                • Part of subcall function 00E0DD87: DName::operator=.LIBVCRUNTIME ref: 00E0DDA8
                                • Part of subcall function 00E0DD2F: shared_ptr.LIBCMT ref: 00E0DD4B
                                • Part of subcall function 00E0FA91: shared_ptr.LIBCMT ref: 00E0FB37
                              • DName::operator+.LIBCMT ref: 00E0E7A9
                              • DName::operator+.LIBCMT ref: 00E0E7C5
                              • DName::operator+.LIBCMT ref: 00E0EA64
                                • Part of subcall function 00E0DC1E: DName::operator+.LIBCMT ref: 00E0DC3F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::shared_ptr$Name::operator+=Name::operator=operator+
                              • String ID: "7
                              • API String ID: 848932493-1693229498
                              • Opcode ID: 54b1b3c65d104a24c3a4b43f7f8a2ffed9cddb7758b5ed410153610956046431
                              • Instruction ID: 7f64a03c468999bc601c011adeae51526ff18f95967af690a4c5f4338af221fa
                              • Opcode Fuzzy Hash: 54b1b3c65d104a24c3a4b43f7f8a2ffed9cddb7758b5ed410153610956046431
                              • Instruction Fuzzy Hash: 94927D72E546099BEB18DAE8CC81BEDB7B8AB54304F18553DE512F73C0DA78D888CB50
                              APIs
                              • GetLastError.KERNEL32(?,00000000,?,?,00DE7DA3), ref: 00DF86E9
                                • Part of subcall function 00DFDD80: ResolveLocaleName.KERNEL32(en-US,?,00000055), ref: 00DFDDB3
                                • Part of subcall function 00DFDD80: GetLocaleInfoEx.KERNEL32(?,20000001,00000002), ref: 00DFDDD6
                              • FormatMessageW.KERNEL32 ref: 00DF8718
                              • lstrlenW.KERNEL32(00000000,00000000,00E7D538), ref: 00DF872F
                              • lstrlenW.KERNEL32(00000000), ref: 00DF8737
                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 00DF8747
                              • GetFocus.USER32 ref: 00DF8774
                              • MessageBoxExW.USER32(?,00000000,MiniPath - ERROR,00000010,?), ref: 00DF878F
                              • LocalFree.KERNEL32(00000000,?,?,00DE7DA3), ref: 00DF8796
                              • LocalFree.KERNEL32(?), ref: 00DF879C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Local$FreeLocaleMessagelstrlen$AllocErrorFocusFormatInfoLastNameResolve
                              • String ID: Error: '%s' failed with error id %d:%s.$MiniPath - ERROR$en-US
                              • API String ID: 2054022804-4186176330
                              • Opcode ID: 68dc4b57f09907936cd06f4b09fed2f71a735e443e30f47e6a84451fd8a5b19d
                              • Instruction ID: ae70b3741872c517f563733c34d923c73d8614850242a4a52346e1970e85f0e2
                              • Opcode Fuzzy Hash: 68dc4b57f09907936cd06f4b09fed2f71a735e443e30f47e6a84451fd8a5b19d
                              • Instruction Fuzzy Hash: DD11D6727007057FD3116B62AC05F2F7BE9EF84794F054829FA44B2250D6B5DC088AB6
                              APIs
                              • FindResourceW.KERNEL32(00D80000,?,00000005,?,00D80000), ref: 00DFD1E8
                              • LoadResource.KERNEL32(00D80000,00000000), ref: 00DFD1FA
                              • LockResource.KERNEL32(00000000), ref: 00DFD20B
                              • SizeofResource.KERNEL32(00D80000,00000000), ref: 00DFD21D
                              • LocalAlloc.KERNEL32(00000040,00000040), ref: 00DFD237
                              • FreeResource.KERNEL32(00000000), ref: 00DFD253
                              • lstrlenW.KERNEL32(?), ref: 00DFD2CA
                              • lstrlenW.KERNEL32(?), ref: 00DFD339
                              • FreeResource.KERNEL32(00000000), ref: 00DFD3C6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Resource$Freelstrlen$AllocFindLoadLocalLockSizeof
                              • String ID:
                              • API String ID: 2547741363-0
                              • Opcode ID: 68705589adfba2dd4eba98ab4479c4bc52d3f7327d338e76d60f0ffea3946527
                              • Instruction ID: 75dda509dacf0620e966463881993b6c3e84d3c7b96e3b19307a0e5bdb15bf10
                              • Opcode Fuzzy Hash: 68705589adfba2dd4eba98ab4479c4bc52d3f7327d338e76d60f0ffea3946527
                              • Instruction Fuzzy Hash: 1351357660070A8FC720AF54DC85B7B77E6EF99344F09882CFA4697241E774D909CBA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,|$,|
                              • API String ID: 0-1834556769
                              • Opcode ID: 125b6e84b09fc7b2cee96921ed18d23e2a4b473fc64f68efb4193e121a871f8e
                              • Instruction ID: d0ba4bda1325572d6fd967cd13e71bf87dfa0a02f72a3416d3473e8f2b1e1e1f
                              • Opcode Fuzzy Hash: 125b6e84b09fc7b2cee96921ed18d23e2a4b473fc64f68efb4193e121a871f8e
                              • Instruction Fuzzy Hash: 34020A71E012199BDB14CFA9D8806EEFBF1FF48314F28926AE519F7241D731A941CB91
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: a9bc457f7f7547a8bd23de6fa2d728ac8d2a48d55dbda2257dca40b858182be5
                              • Instruction ID: 501f75c6b33edbe32c86a2640bd76c95cfd8ae1fd73a5a3282267a17f8b4a9fc
                              • Opcode Fuzzy Hash: a9bc457f7f7547a8bd23de6fa2d728ac8d2a48d55dbda2257dca40b858182be5
                              • Instruction Fuzzy Hash: FED25C71E082288FDB65CE28DC407EAB7B5EB44306F1455EAD84DF7240EB74AE998F41
                              APIs
                              • GetLocaleInfoEx.KERNEL32(00000000,0000000F,00000008,00000008,00000000,?,?,?,?,?,00E05480), ref: 00DFBE8F
                              • lstrlenW.KERNEL32(?,74DF3070,75C05540,?,?,?,?,00E05480), ref: 00DFBEAC
                              • CharPrevW.USER32(?,00000000,?,?,?,?,00E05480), ref: 00DFBEB3
                              • lstrlenW.KERNEL32(00000000,?,?,?,?,00E05480), ref: 00DFBEC9
                              • CharPrevW.USER32(?,00000000,?,?,?,?,00E05480), ref: 00DFBEEA
                              • lstrlenW.KERNEL32(?,?,?,?,?,00E05480), ref: 00DFBEF7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: lstrlen$CharPrev$InfoLocale
                              • String ID:
                              • API String ID: 1002616787-0
                              • Opcode ID: 1cec91f48336e48f4914068f676e9ac101c1ca6fddb14c720e6bcb55c66dfb73
                              • Instruction ID: 977ab07f959f536a38a73eb519e8caa0b00b5d5da8f064ce18634ad4bb3c3f67
                              • Opcode Fuzzy Hash: 1cec91f48336e48f4914068f676e9ac101c1ca6fddb14c720e6bcb55c66dfb73
                              • Instruction Fuzzy Hash: 6A11D6B26002096BC720AF75EC85A7F77DCEFC9390F85482AFA5693111EB61884987A1
                              APIs
                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00E53316
                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 00E5333F
                              • GetACP.KERNEL32 ref: 00E53354
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: ab04864aa7d8edffe4ad0e910e56198bdf041e83e58cef1753dacbcb8af97444
                              • Instruction ID: 68e7a1e47ddf362712e140b48be52ef6d95242e4b1c24ff7c8c4312899766eef
                              • Opcode Fuzzy Hash: ab04864aa7d8edffe4ad0e910e56198bdf041e83e58cef1753dacbcb8af97444
                              • Instruction Fuzzy Hash: 7F210326B00500AADB358B35C901A9B73A6EB50BDAF56AD24FD1AF7110EB32DF48C350
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • GetUserDefaultLCID.KERNEL32 ref: 00E53561
                              • IsValidCodePage.KERNEL32(00000000), ref: 00E5359F
                              • IsValidLocale.KERNEL32(?,00000001), ref: 00E535B2
                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00E535FA
                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00E53615
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                              • String ID:
                              • API String ID: 415426439-0
                              • Opcode ID: e626c7637aa022b6b18497efaba8627bbc290944f54a92d82977b3c7c81dc2e1
                              • Instruction ID: 022243e9aca034c8b1f24560944ff3f21bcc6dbbd873228b6d41e41cf1816391
                              • Opcode Fuzzy Hash: e626c7637aa022b6b18497efaba8627bbc290944f54a92d82977b3c7c81dc2e1
                              • Instruction Fuzzy Hash: 0D51B171A00205AFDF11DFB5DC41ABEB7F8BF05746F142829E910F7291EBB09A088B60
                              APIs
                              • GetUserPreferredUILanguages.KERNEL32(00000008,?,00000000,00000000), ref: 00DFE0C1
                              • LocalAlloc.KERNEL32(00000040,?), ref: 00DFE0D9
                              • GetUserPreferredUILanguages.KERNEL32(00000008,?,00000000,?), ref: 00DFE0F6
                              • LocalFree.KERNEL32(00000000), ref: 00DFE148
                              • GetLocaleInfoEx.KERNEL32(00000000,0000005C,?,00000055), ref: 00DFE160
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LanguagesLocalPreferredUser$AllocFreeInfoLocale
                              • String ID:
                              • API String ID: 1113077726-0
                              • Opcode ID: bc792c1a2558f256da0a65510d9a9bfd8af95dd24a45b3e2b1b971ec99e343bc
                              • Instruction ID: 916d5b1c2cef0ed2dea6a6fc36f1d954174fd1ec5c32af8ccf71b1d6e9d57272
                              • Opcode Fuzzy Hash: bc792c1a2558f256da0a65510d9a9bfd8af95dd24a45b3e2b1b971ec99e343bc
                              • Instruction Fuzzy Hash: 39319A72208709AFE320DF15DC45B7BB7E8EB85350F45842EF699D6290EB74D908CB62
                              APIs
                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00E4CF40
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00E4CFBB
                              • FindClose.KERNEL32(00000000), ref: 00E4CFDD
                              • FindClose.KERNEL32(00000000), ref: 00E4D000
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: cb9ffacc01633a2f7b9f4baea3d82af7128424ece18ca2c701081880a49f46da
                              • Instruction ID: 78ae213834a70080a23533a78cd8d43895d866a2ee282de942a9e0d8c8b2d776
                              • Opcode Fuzzy Hash: cb9ffacc01633a2f7b9f4baea3d82af7128424ece18ca2c701081880a49f46da
                              • Instruction Fuzzy Hash: F1410971B01519AFCB20EFA4EC899BBB7BAEB84308F245195E405F7140F7349E88CB54
                              APIs
                              • CoCreateInstance.OLE32(00E6A89C,00000000,00000001,00E66D8C,?,0000C356,?), ref: 00DFB83F
                              • lstrcpyW.KERNEL32(?,?), ref: 00DFB86B
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000138), ref: 00DFB8F2
                              • lstrcpynW.KERNEL32(?,?,?), ref: 00DFB90C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CreateEnvironmentExpandInstanceStringslstrcpylstrcpyn
                              • String ID:
                              • API String ID: 4041286039-0
                              • Opcode ID: 746307afd77373ccbaf8770529233da127ceb46ffbbf85e83557943a8eabebab
                              • Instruction ID: f67f0d14666302ad4f842415dc275c1c41a99c7033eb4f838e0fb026bafdabea
                              • Opcode Fuzzy Hash: 746307afd77373ccbaf8770529233da127ceb46ffbbf85e83557943a8eabebab
                              • Instruction Fuzzy Hash: F33106B1204346AFD320DA68DC84E6BB7E9ABC8744F04892AFA49D7250DB71EC058B61
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00E09D74
                              • IsDebuggerPresent.KERNEL32 ref: 00E09E40
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E09E59
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00E09E63
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                              • String ID:
                              • API String ID: 254469556-0
                              • Opcode ID: a84915677f245bde69f6816b4a72f72faa4f42140eaaa418ce8c854a5294ae27
                              • Instruction ID: 1df715df894c6c7d9c0eb3948ba89d8a2789fb732fd02731c290bf2b3d29fa92
                              • Opcode Fuzzy Hash: a84915677f245bde69f6816b4a72f72faa4f42140eaaa418ce8c854a5294ae27
                              • Instruction Fuzzy Hash: B3311675D01219DBDB20DFA5D9497CDBBF8BF08300F1041AAE40DAB291EBB09A848F85
                              APIs
                              • VirtualQuery.KERNEL32(80000000,00E0868F,0000001C,00E08884,00000000,00000000,00000000,?,?,?,?,?,00E0868F,00000004,00E7BE44,00E08BDA), ref: 00E0875B
                              • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,00E0868F,00000004,00E7BE44,00E08BDA,?), ref: 00E08776
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoQuerySystemVirtual
                              • String ID: D
                              • API String ID: 401686933-2746444292
                              • Opcode ID: e09b00097f8855e69499e6cf8ee0ab42e75bf269512993645375ccf23bce654e
                              • Instruction ID: e29ce347875bc7214c3bc3ba8f0777e21b99eaf44f6bf3896157662c27d61fc3
                              • Opcode Fuzzy Hash: e09b00097f8855e69499e6cf8ee0ab42e75bf269512993645375ccf23bce654e
                              • Instruction Fuzzy Hash: 34012B33700109ABDB14DE39DD05BDE7BAAAFC4368F1CC225ED59EB284EA34D84586C0
                              APIs
                              • ResolveLocaleName.KERNEL32(en-US,?,00000055), ref: 00DFDDB3
                              • GetLocaleInfoEx.KERNEL32(?,20000001,00000002), ref: 00DFDDD6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Locale$InfoNameResolve
                              • String ID: en-US
                              • API String ID: 2669342117-1228076028
                              • Opcode ID: 49376812b425d54bfcf0d6c3fe7017098658f7686e4e29d8e6067866584e348e
                              • Instruction ID: 52ecf1354f38c1ef1614b3182fd23fd191a925e5d919147e94945b78acee6962
                              • Opcode Fuzzy Hash: 49376812b425d54bfcf0d6c3fe7017098658f7686e4e29d8e6067866584e348e
                              • Instruction Fuzzy Hash: 3301AD38604345ABE724EB25DC06B7B37E6BB44304F84882CAA45D6282F7B8C844CB53
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E52F55
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E52F9F
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E53065
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoLocale$ErrorLast
                              • String ID:
                              • API String ID: 661929714-0
                              • Opcode ID: 454e536b2ea0a8274136c8f61cd6e9a18b834c67bafb090b9ff7e1bb332e9ed4
                              • Instruction ID: 0a0dc66e6910d960b83a2b922c7f4c15c8e1fd1946691d1bc90fa8708ac2dc15
                              • Opcode Fuzzy Hash: 454e536b2ea0a8274136c8f61cd6e9a18b834c67bafb090b9ff7e1bb332e9ed4
                              • Instruction Fuzzy Hash: 7C61E3316016579FDB289F34CD82BBAB7E9EF04386F1054B9EC05E6181EB74DA89CB50
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00E378C6
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00E378D0
                              • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,?), ref: 00E378DD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 8e6ea0b40548a9f7ed7370f19866f276e1c1f088d22a4e89b0d2a85c9d697708
                              • Instruction ID: 98206b93ab19dd0c25c81a34bd212a4dffa284fc9ad967fbdc44aca1c2f995fc
                              • Opcode Fuzzy Hash: 8e6ea0b40548a9f7ed7370f19866f276e1c1f088d22a4e89b0d2a85c9d697708
                              • Instruction Fuzzy Hash: D831D27590122DABCB21DF64D988BCDBBB8BF08310F5051EAE41CA6291EB709F85CF45
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00E503C3
                              • OutputDebugStringW.KERNEL32(?), ref: 00E503DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: DebugDebuggerOutputPresentString
                              • String ID:
                              • API String ID: 4086329628-0
                              • Opcode ID: 6643378fc59e417e12d1f86517eb39fd8ab4a2107a190107b1874056540e68bd
                              • Instruction ID: 5e9fcefa037ce0d845ff1815be18ef2c4192f55994678b1a9b8c7689ec6d9e2b
                              • Opcode Fuzzy Hash: 6643378fc59e417e12d1f86517eb39fd8ab4a2107a190107b1874056540e68bd
                              • Instruction Fuzzy Hash: 6201D1321402166FDF202E51AC4ABEF3798DF003BAF187911FF64BA051C760C848D2A2
                              APIs
                              • LCIDToLocaleName.KERNEL32(00000000,00000000,00000055,08000000,?,?,00E07E73,?,?), ref: 00E073B1
                              • GetLocaleInfoEx.KERNEL32(00000000,0000006D,00000000,00000055,?,00E07E73,?,?), ref: 00E073C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Locale$InfoName
                              • String ID:
                              • API String ID: 3347482803-0
                              • Opcode ID: 25045531840856bc6a3898c594dd5b973060cc2de6defc7c5676722537fbd199
                              • Instruction ID: 6c050085d296f0d31c406c6326c848d55360a7964ab7455a3c693e1695e7983e
                              • Opcode Fuzzy Hash: 25045531840856bc6a3898c594dd5b973060cc2de6defc7c5676722537fbd199
                              • Instruction Fuzzy Hash: 49F0B431B09655BBEB205F259C49FAB379CEF05B86F041412BD51F60D0D7B4EC90E6A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0$X
                              • API String ID: 0-1267750158
                              • Opcode ID: 4cee062b66d79ec3217d05851b3ec36907ae62b258669f9b5c2a74d9760f5af4
                              • Instruction ID: 314b401c0a86d8d9c7b83d8307c8f04c2e52011b95b6573e4dab15bd0515634b
                              • Opcode Fuzzy Hash: 4cee062b66d79ec3217d05851b3ec36907ae62b258669f9b5c2a74d9760f5af4
                              • Instruction Fuzzy Hash: 51D1A030A006068FCB28CF69C5986BABFF1FF49318F14669DD556BB690C731AD82CB51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0$O
                              • API String ID: 0-3924424526
                              • Opcode ID: d30ce8f55bb34c6cd456ef2155929bead6c8d763273368801c729f0ded96f4f8
                              • Instruction ID: 40651892550eb8af0e0b74afd35de3e4252fe80894aaf34cbfd92b1cf841c12b
                              • Opcode Fuzzy Hash: d30ce8f55bb34c6cd456ef2155929bead6c8d763273368801c729f0ded96f4f8
                              • Instruction Fuzzy Hash: E1D1AD70A006069FCB24CF69C588ABABFF1FF48318F14669DD456BBA91D730AD41CB51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID:
                              • API String ID: 4168288129-0
                              • Opcode ID: 9d1c26b2772f91e86ee8da810d6fbf1e76dc981185104b3bdad62b061aa912f4
                              • Instruction ID: af6cd1335f6ecc582e246a857337176104634b3e7ae443f56d4a429a82d472dc
                              • Opcode Fuzzy Hash: 9d1c26b2772f91e86ee8da810d6fbf1e76dc981185104b3bdad62b061aa912f4
                              • Instruction Fuzzy Hash: FCB23A72E046298FDB25CE28DD507EAB3B5EB48306F5455EAD80DF7240E774AE898F40
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00E5F218,?,?,00000008,?,?,00E5ED06,00000000), ref: 00E5F44A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 6ae7c4541ce994a630f16e16a8b9b72c852f9d18d00a79812e65ef18b02c1c5d
                              • Instruction ID: 056684546ddec318cacd6732fbb38e1395eb6466fc1ff101435a2df263260508
                              • Opcode Fuzzy Hash: 6ae7c4541ce994a630f16e16a8b9b72c852f9d18d00a79812e65ef18b02c1c5d
                              • Instruction Fuzzy Hash: BDB16D31610609DFD715CF28C486BA57BE0FF0536AF259A68ECA9DF2A1C335D985CB40
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00E09B9A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-0
                              • Opcode ID: 26cf828cf9bd6bd52061c56e9c9fb42ba2247154064721da47aaf4af197bc9d2
                              • Instruction ID: 590c09be191eab43a9f2afe8c3b6637296e439b999ed4a8a68b727ed4234a5cc
                              • Opcode Fuzzy Hash: 26cf828cf9bd6bd52061c56e9c9fb42ba2247154064721da47aaf4af197bc9d2
                              • Instruction Fuzzy Hash: 6C5188B1A112058FEB18CF56D9857AEBBF4FB48314F24902AD519FB2A2D374DA84CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 1406dba0e739c3343c1bc1a856d4e8f1fc679c91f338cd629c133fa821335512
                              • Instruction ID: 570e692b35498e1ebb9004fd0d7d1a15641b5a6f40c1fa9643c3da3fe951e45c
                              • Opcode Fuzzy Hash: 1406dba0e739c3343c1bc1a856d4e8f1fc679c91f338cd629c133fa821335512
                              • Instruction Fuzzy Hash: 40D1AF70A006068FCB28DF68C5A8ABAFFF1FF44328F646659D456BB691D731AD41CB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 5fa2a45c25dc73c4ff4d9ed1cbe74adf589f7a27a67ff59fdf88cab1b54b9bff
                              • Instruction ID: f94f17290f5547bb84716f4c485ac3583bb4bdb60a2f5832737ccd17c28f941e
                              • Opcode Fuzzy Hash: 5fa2a45c25dc73c4ff4d9ed1cbe74adf589f7a27a67ff59fdf88cab1b54b9bff
                              • Instruction Fuzzy Hash: A9C113B050062A8FCB24CF68E5956BAFBF1FF45308F246639D856B7291C731AD45CB50
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E531A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast$InfoLocale
                              • String ID:
                              • API String ID: 3736152602-0
                              • Opcode ID: f1e574af45732aafe2c76828b9eede8d52008bbc141f53eb70c265f65c726b5a
                              • Instruction ID: 03e3276d9b20d1405f92ed72ed4b04bc05824af7a1f7ee7e4ec0e05fd0de405b
                              • Opcode Fuzzy Hash: f1e574af45732aafe2c76828b9eede8d52008bbc141f53eb70c265f65c726b5a
                              • Instruction Fuzzy Hash: 8721F536611A06ABDB289E35DD42EBA37E8EF05345F10247AFD11E7151EB34DE48CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 3bd43989d8f5b22b018a696a1944f34d9d5f84cc053b95d58d52eaa517c03109
                              • Instruction ID: f7d28a5d2d7be2a78096b4a3e7149a8ba50ffab12056a9e3e1b491202f9a27e4
                              • Opcode Fuzzy Hash: 3bd43989d8f5b22b018a696a1944f34d9d5f84cc053b95d58d52eaa517c03109
                              • Instruction Fuzzy Hash: 44C1E4349006668FCB28CF68E5847BABBB1FF45318F14663AD492B76A1C730ED45CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 540673a9e685daaebe13b3df50511fad71b3bde764995f9e54ec3ce1ded7c85c
                              • Instruction ID: 119011963ee5b5f1fbad2ca6fe73f5495b403f225d75c76f24a8f1fc0ad55bee
                              • Opcode Fuzzy Hash: 540673a9e685daaebe13b3df50511fad71b3bde764995f9e54ec3ce1ded7c85c
                              • Instruction Fuzzy Hash: F4B1C270A0060A9BCB24CF68C969ABEBFF1AF84318F10651DD5A6B7A50D731EE45CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 15b34f5e85098a6201162726d7e10b477c1700476c079222caea5730f98e6a4d
                              • Instruction ID: 9c9878b9f7734d37f24d98a978be772a60cbfcd28f40d9fc45d160d5d68a72f6
                              • Opcode Fuzzy Hash: 15b34f5e85098a6201162726d7e10b477c1700476c079222caea5730f98e6a4d
                              • Instruction Fuzzy Hash: 9AB1D270A0060A8BCB29CF68C9ACABFBFF5AF44304F14651DD456B7691C731AD45CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 238c5b1fbd78c3801aec3834910b75ad30f0b5c02f2d979a944838fe497d87dc
                              • Instruction ID: bff6f07f748fae9f05972876f1eab374f970d3fa4c21da83c65180947fcd26f3
                              • Opcode Fuzzy Hash: 238c5b1fbd78c3801aec3834910b75ad30f0b5c02f2d979a944838fe497d87dc
                              • Instruction Fuzzy Hash: CDB1B130A0060A8BCB28DF68C96DABFBFF1AF84318F14651ED496B7690D731AD45CB51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: bc9022557ffdde4da2c5c564d477ffd76f49cfdf06520c722d93622640c01a24
                              • Instruction ID: c2a9a8309d2ac3b20c2a246f643af9afe3d8bdd482aaaa7b22bbd5c3acf846e4
                              • Opcode Fuzzy Hash: bc9022557ffdde4da2c5c564d477ffd76f49cfdf06520c722d93622640c01a24
                              • Instruction Fuzzy Hash: 6DB1F535A0062ACBCF28CF68E955ABEBBB1AF05308F14263DD452B7292C731AD01CB51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 827375e929c0ef57e3052706124d51b3cf9ac97c9fefb2960550e9876c263e96
                              • Instruction ID: 86468f7303ddeb4c2391b2abb9e782233eb0249f30fc30bbe9379f868023c05e
                              • Opcode Fuzzy Hash: 827375e929c0ef57e3052706124d51b3cf9ac97c9fefb2960550e9876c263e96
                              • Instruction Fuzzy Hash: D8B1D470A0067A8BCB24CF78E5556BFBBE1AF41308F28261DD456BB791C731AE41CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 172b41ffccb8f59ef3d3d13daa70b9bde314e7628006f8d996b4ef28200202bf
                              • Instruction ID: 3076b3d636cc1d9b3b545795d1dcd5814c1e540e91992b7b3fff8ef937047733
                              • Opcode Fuzzy Hash: 172b41ffccb8f59ef3d3d13daa70b9bde314e7628006f8d996b4ef28200202bf
                              • Instruction Fuzzy Hash: 19B1907090062A8BCB24DF68E555ABFBBF1AF44308F14663DD462B7691C770EE41CB51
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • EnumSystemLocalesW.KERNEL32(00E52F01,00000001), ref: 00E52E4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem
                              • String ID:
                              • API String ID: 2417226690-0
                              • Opcode ID: d2288a4e9b138ed012dff8fdec2e7d88a6b4787b1ed1fc535274a231e74e2d9d
                              • Instruction ID: f98ebbc528af25f581c383d40c849f791f52422ab63d25b143ad6a3f817ae10d
                              • Opcode Fuzzy Hash: d2288a4e9b138ed012dff8fdec2e7d88a6b4787b1ed1fc535274a231e74e2d9d
                              • Instruction Fuzzy Hash: 7811023A2007015FDB189F39D8925BABBA1FB85369B18482CEE8797A40E771A946C740
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00E5311D,00000000,00000000,?), ref: 00E533AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast$InfoLocale
                              • String ID:
                              • API String ID: 3736152602-0
                              • Opcode ID: 882ac3483fe7936b60bb2e837e487f48bbd850a0123616c2efda16628a70310c
                              • Instruction ID: 571b54773d23ce06f1e04fcfaeb0bb3eb034c6fb4c17ad02b3e9b5907bb72573
                              • Opcode Fuzzy Hash: 882ac3483fe7936b60bb2e837e487f48bbd850a0123616c2efda16628a70310c
                              • Instruction Fuzzy Hash: 91012636600112AFDB285A348846ABA7BA8EF40399F051829EC52B3180EE74EE49C690
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • EnumSystemLocalesW.KERNEL32(00E53154,00000001), ref: 00E52EC0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem
                              • String ID:
                              • API String ID: 2417226690-0
                              • Opcode ID: 6c82256d65f6505b3a915c1d6987ac53a14ab398079abadf3df1114d18332fa0
                              • Instruction ID: 912fab63bd6d0c0b3f65c6cdb6905152fb60f23c7c9087d1e5615faf85987f88
                              • Opcode Fuzzy Hash: 6c82256d65f6505b3a915c1d6987ac53a14ab398079abadf3df1114d18332fa0
                              • Instruction Fuzzy Hash: 20F046323003045FCB259F35DC82A7B7B91EF823A8F05482DFE455B690CAB19C46C600
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000404,00000008,?,00000020,?), ref: 00E07134
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 365f93eea588c90bd9af48f0d4e910b758e7836697dd5d6d2f76f3ccdd31bc1a
                              • Instruction ID: a57d76871e348dac47ea7b1f6f170926958d83e05dcd53b74cf6b506beb40d61
                              • Opcode Fuzzy Hash: 365f93eea588c90bd9af48f0d4e910b758e7836697dd5d6d2f76f3ccdd31bc1a
                              • Instruction Fuzzy Hash: 68F0E2B2B80709AADB14EB749D06F9E77E89B01744F000220AA04F72C1EAA4AE098254
                              APIs
                                • Part of subcall function 00E4C509: EnterCriticalSection.KERNEL32(?,?,00E41EDA,00000000,00E77818,0000000C,00E41EA2,?,?,00E494C5,?,?,00E47189,00000001,00000364,?), ref: 00E4C518
                              • EnumSystemLocalesW.KERNEL32(Function_000C94EF,00000001,00E77B48,0000000C), ref: 00E4953A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 561e178f0a8a57a600f26774f4df623090e5dc31bb4c2003840cbb057df66212
                              • Instruction ID: 157a26ed1e88971348449dff18242d5338e0be82ec1f894b807904d26c83b8aa
                              • Opcode Fuzzy Hash: 561e178f0a8a57a600f26774f4df623090e5dc31bb4c2003840cbb057df66212
                              • Instruction Fuzzy Hash: 3FF01432A00204DFD700DF99E842B9A77E0FB49720F20916AE415FB2A2DBB95A848F50
                              APIs
                                • Part of subcall function 00E46FEB: GetLastError.KERNEL32(00000000,?,00E4F927), ref: 00E46FEF
                                • Part of subcall function 00E46FEB: SetLastError.KERNEL32(00000000,?,?,00000016,00E1D00B), ref: 00E47091
                              • EnumSystemLocalesW.KERNEL32(00E52CCB,00000001), ref: 00E52DA9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem
                              • String ID:
                              • API String ID: 2417226690-0
                              • Opcode ID: ac08b32fcc9c19ea6cc8d7b74005257aa9ff88964543ecf1cf2f2f0f1fbeb267
                              • Instruction ID: 1655bdeb93c190bc4a78df84c0ba0ed48af0139464def2f453efdcb7c71c2a94
                              • Opcode Fuzzy Hash: ac08b32fcc9c19ea6cc8d7b74005257aa9ff88964543ecf1cf2f2f0f1fbeb267
                              • Instruction Fuzzy Hash: E5F0553A30020557CB049F36E895AAABFA0EFC2725F0A045DEF06AB251C271984BCB90
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00E45A04,?,20001004,00000000,00000002,?,?,00E44D67), ref: 00E4A01C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: bf6c8719f7014db3ba2df45bf2416e02964d355fb5f90a002e1ff465212f47e1
                              • Instruction ID: 2c0ea74204bcf38ad17728a5b06cf90afb33c41d90d0a80849a72a64384b7d9a
                              • Opcode Fuzzy Hash: bf6c8719f7014db3ba2df45bf2416e02964d355fb5f90a002e1ff465212f47e1
                              • Instruction Fuzzy Hash: 15E04F32541628BBCF162F61FC04A9E3F5AEF487A0F045124FD0575121CBB28D20AAD5
                              APIs
                              • EnumSystemLocalesW.KERNEL32(Function_000C94EF,00000001), ref: 00E496BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: EnumLocalesSystem
                              • String ID:
                              • API String ID: 2099609381-0
                              • Opcode ID: 1d624c8cf2281a5d77252a08ea04bd23372de797b8e42f9b3fdf33a10f852477
                              • Instruction ID: d7da78336c62698c6479075c4768763c6cb1e654db3f7a53a2c09543ebd9f699
                              • Opcode Fuzzy Hash: 1d624c8cf2281a5d77252a08ea04bd23372de797b8e42f9b3fdf33a10f852477
                              • Instruction Fuzzy Hash: 74D0C731644304AFDB149F53FC469163BAAF781750B208019F51C77271EBB568C5CF51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 7h:
                              • API String ID: 0-3599125310
                              • Opcode ID: 9259aebd46366da3d5a874b03e05f6b4cf46f97374197f7dff82fe5362a2eaa2
                              • Instruction ID: 7f8840ff767cd49274a5c2471bf7b010d26bd17fb6ed1dd8c9355b40995caf36
                              • Opcode Fuzzy Hash: 9259aebd46366da3d5a874b03e05f6b4cf46f97374197f7dff82fe5362a2eaa2
                              • Instruction Fuzzy Hash: 3481A03590836ADFC7968F348D4A5D9BBB0FF0271871811AFCD808F267D721990ADB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: GetSystemTimePreciseAsFileTime
                              • API String ID: 0-595813830
                              • Opcode ID: ae57c0584c5828c291265e6e956f543461494575456fe4048ab48dcb3ad1b7cd
                              • Instruction ID: 4c27c88a2edf77cd5f4ace8f3741eed9d7f2ca53ba7e5d51e961f1f531f7f015
                              • Opcode Fuzzy Hash: ae57c0584c5828c291265e6e956f543461494575456fe4048ab48dcb3ad1b7cd
                              • Instruction Fuzzy Hash: 57E0C233B80728E7C23132A1BC06AAB7E84DB40BB1F047061FA08B5191A5A10951CAC9
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c9312f9e4bce9a142ace4b689672b0178d54afbb9146f6ae1d60a9b7b5f3a7bf
                              • Instruction ID: 2067d6f0a7bab462a7682f9904b9a0e8d05e3fb47eecb87716722674c2e61e01
                              • Opcode Fuzzy Hash: c9312f9e4bce9a142ace4b689672b0178d54afbb9146f6ae1d60a9b7b5f3a7bf
                              • Instruction Fuzzy Hash: 692267B7C156B816F3957EB59C4435AB08297C8680F6B8635CEBCB7290ECF40D329AD0
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1137f3e00d573dcb905e1adbf9c9653286b09371782d86a07b2b08473c00a92d
                              • Instruction ID: 96699aa74de0b72628e227cf4bc2b3e0db67c6dc20059ac0878b1bb23522c0c4
                              • Opcode Fuzzy Hash: 1137f3e00d573dcb905e1adbf9c9653286b09371782d86a07b2b08473c00a92d
                              • Instruction Fuzzy Hash: B62272726047545FE358DB79C890A3BF7E7AFC8240F4AC92DF59AC7281D974E8058BA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fde7e712caaa58c2ccb03d3cc01d2f78cdfcba05dedc2e35b7754399b697a7b5
                              • Instruction ID: 5fa6553b8533ff2e6db8cd2bd9e0b11fb31110a44006b53e981a1f9c2ec948bc
                              • Opcode Fuzzy Hash: fde7e712caaa58c2ccb03d3cc01d2f78cdfcba05dedc2e35b7754399b697a7b5
                              • Instruction Fuzzy Hash: 1D221A71A042258FDB2ACF18C880BEAB7B9BB45B05F1451EAE589FB244D7709FC18F41
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3611924c097cb277cc3f63066ba03265fd3062a75d4d92040193f8b3e17b1ec3
                              • Instruction ID: 47f50e0e3d8cadb9908a8f8451021d09ea92500d98b0b8176b4ce96b039618da
                              • Opcode Fuzzy Hash: 3611924c097cb277cc3f63066ba03265fd3062a75d4d92040193f8b3e17b1ec3
                              • Instruction Fuzzy Hash: 6C0231B16047445FE358DBB9C895A7BF7EAAFCC340F45892DB19AC7240DA74F8048BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 303e984645b886905797ab6da6454048eecbc84b3565a21ee2bcf27e6fdc6a9d
                              • Instruction ID: 6ff7db34cc9f7727f365f95e16f71d92feb251a53fbd5483e981f0214de1d52d
                              • Opcode Fuzzy Hash: 303e984645b886905797ab6da6454048eecbc84b3565a21ee2bcf27e6fdc6a9d
                              • Instruction Fuzzy Hash: 50F14F71A012289FDB25DF18C880BEAB7B9FF86714F1851EAD949B7241D7705EC18F82
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 579e12af7e22889dc389584b28326fb01b4247708c63ead6756fd5d910714bfd
                              • Instruction ID: 5f2968fa075364af249049be3dcd4b3cf52d00596f80592cc3f67fdd39eb96ce
                              • Opcode Fuzzy Hash: 579e12af7e22889dc389584b28326fb01b4247708c63ead6756fd5d910714bfd
                              • Instruction Fuzzy Hash: FEC1E33060062A8FDB25CF68E5947BABBB1BF05318F24663DD452B76A2C731ED45CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5dbc982b26241a00ab69ad152bf1aab28c24101ea20b8429fec881f55d967404
                              • Instruction ID: cdf3a97eb2f5509fa57c56b1f498b94e68d65da2f0d30f21d6078c1433bb6340
                              • Opcode Fuzzy Hash: 5dbc982b26241a00ab69ad152bf1aab28c24101ea20b8429fec881f55d967404
                              • Instruction Fuzzy Hash: 0DA13B75A012298BDB24DF18D890BEDB7B5FF89314F1951EAD909B7241D730AEC28F81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 95566b224d4007dce66983537732fde3e01ea63a137281dd6e23c407d0f8a82f
                              • Instruction ID: cf3b03f493aea300b9d2048284ed28cc23fc2c1aabc80233933984d11e3245a0
                              • Opcode Fuzzy Hash: 95566b224d4007dce66983537732fde3e01ea63a137281dd6e23c407d0f8a82f
                              • Instruction Fuzzy Hash: F7515F72D00119AFDF14CF98C941AEEBBB2FF88344F198059E955AB201D775AA81CB90
                              Memory Dump Source
                              • Source File: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f4daa5f43f06c6c4e6f2464679809b00dc069ad0256fb44b93428dc6f067f7ee
                              • Instruction ID: 0f22823596e13d9140a540f410c67d49f89f581d8971cc65a31f51c525bed80c
                              • Opcode Fuzzy Hash: f4daa5f43f06c6c4e6f2464679809b00dc069ad0256fb44b93428dc6f067f7ee
                              • Instruction Fuzzy Hash: 4121727ADA61638BD395CE25EC8073A3367EBC9320F2B4939CA1453155CB74E5269780
                              Memory Dump Source
                              • Source File: 00000000.00000003.1791398308.0000000002910000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                              • Associated: 00000000.00000003.1794274856.0000000002900000.00000040.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_3_2900000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                              • Instruction ID: 3a288e0f53ae63fd9e3ce195170818532134f91e12e866a1a6687d17ceaa9e67
                              • Opcode Fuzzy Hash: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                              • Instruction Fuzzy Hash: 71F06275A01208CF8728CF0AC648DA577FAEB857147654995D8049B221D3B2ED84CB50
                              APIs
                              • SetCurrentDirectoryW.KERNEL32(?,?,?), ref: 00E0500C
                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?), ref: 00E05028
                              • PathFileExistsW.SHLWAPI(?), ref: 00E05032
                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00E05049
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05057
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00E0507B
                              • SetCursor.USER32(00000000), ref: 00E05082
                              • DestroyCursor.USER32(00000000), ref: 00E05089
                              • SendMessageW.USER32(00001027,00000000,00000000), ref: 00E050A4
                              • GetCurrentDirectoryW.KERNEL32(0000012C,00E8066C), ref: 00E050B4
                              • PathIsRootW.SHLWAPI(00E8066C), ref: 00E050E6
                              • SHGetFileInfoW.SHELL32(00E8066C,00000000,?,000002B4,00000200), ref: 00E05120
                              • PathFindFileNameW.SHLWAPI(00E8066C), ref: 00E05138
                              • lstrcpyW.KERNEL32(?,00000000), ref: 00E05147
                              • lstrcpyW.KERNEL32(?,00E8066C), ref: 00E0516D
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00E05177
                              • lstrcatW.KERNEL32(?, - [), ref: 00E05190
                              • lstrcatW.KERNEL32(?,?), ref: 00E051A2
                              • lstrlenW.KERNEL32(00000000), ref: 00E051B7
                              • lstrcatW.KERNEL32(?,00E7538C), ref: 00E051D5
                              • SetWindowTextW.USER32(?,?), ref: 00E05202
                              • lstrcmpW.KERNEL32(00E81AFC,*.*,?,?), ref: 00E05212
                              • SendMessageW.USER32(00001024,00000000,00000000), ref: 00E05261
                              • SendMessageW.USER32(00000440,0000A41E,00000020), ref: 00E052EF
                              • GetPropW.USER32(00000000,DirListData), ref: 00E05338
                              • ResetEvent.KERNEL32(?,?,?,?,?,?,?), ref: 00E0534F
                              • ResetEvent.KERNEL32(?,?,?,?,?,?,?), ref: 00E05357
                              • GetPropW.USER32(DirListData), ref: 00E05374
                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00E05381
                              • lstrcpyW.KERNEL32(00E8066C,?,?,?,?,?,?,?,?,?,?), ref: 00E05398
                              • SetCurrentDirectoryW.KERNEL32(00E8066C,?,?,?,?,?,?,?,?,?), ref: 00E053A3
                              • SendMessageW.USER32(0000102B,00000000,?), ref: 00E053D3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Directory$CurrentPath$FileMessageSend$Cursorlstrcatlstrcpy$EventPropReset$DestroyExistsFindFromInfoListLoadNameRemoveRootSpecTextWindowWindowslstrcmplstrlen
                              • String ID: $ $ - [$($*.*$DirListData$\
                              • API String ID: 2993255122-80515274
                              • Opcode ID: 0f67edbe63c10803c1cb29d0f83090d8176858cefa13db3077ab0d6406566d9c
                              • Instruction ID: 8d989fccad4c15a979af0eb7bddc7466141c8169d644fc6e86a1b25a6d899896
                              • Opcode Fuzzy Hash: 0f67edbe63c10803c1cb29d0f83090d8176858cefa13db3077ab0d6406566d9c
                              • Instruction Fuzzy Hash: 7FE1C672640B04AFD720AF61EC49FAB7BA8FB48744F005819F649B61E1E7F0A588CF55
                              APIs
                              • GetDlgItemTextW.USER32(?,00000064,?,00000104), ref: 00DF4D00
                              • GetSystemDirectoryW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,00000104), ref: 00DF4D10
                              • PathAddBackslashW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DF4D1B
                              • lstrcatW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,Viewers\Quikview.exe), ref: 00DF4D2B
                              • PathQuoteSpacesW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DF4D36
                              • lstrcpyW.KERNEL32(00E80ACC,00E74520), ref: 00DF4D4C
                              • lstrcpyW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,?), ref: 00DF4D66
                              • StrChrW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe,00000020), ref: 00DF4DA8
                              • lstrcpyW.KERNEL32(00E80ACC,-00000002), ref: 00DF4DC0
                              • lstrcpyW.KERNEL32(?,C:\Users\user\Documents), ref: 00DF4DE3
                              • GetDlgItemTextW.USER32(?,00000066,C:\Users\user\Documents,00000104), ref: 00DF4DF2
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000005,?), ref: 00DF4E01
                              • SHGetPathFromIDListW.SHELL32(?,C:\Users\user\Documents), ref: 00DF4E14
                              • CoTaskMemFree.OLE32(?), ref: 00DF4E1E
                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\Documents,00000104), ref: 00DF4E30
                              • lstrcmpiW.KERNEL32(?,C:\Users\user\Documents), ref: 00DF4E55
                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00DF4E6E
                              • GetDlgItem.USER32(?,00000065), ref: 00DF4E82
                              • SendMessageW.USER32(00000000,00001603,00000000,?), ref: 00DF4E91
                              • ImageList_Destroy.COMCTL32(?), ref: 00DF4EA5
                              • GetDlgItem.USER32(?,00000067), ref: 00DF4EAA
                              • SendMessageW.USER32(00000000,00001603,00000000,?), ref: 00DF4EB9
                              • ImageList_Destroy.COMCTL32(?), ref: 00DF4EC7
                              • SendMessageW.USER32(?,00000080,00000000,0005047B), ref: 00DF4EF4
                              • lstrcpyW.KERNEL32(?,C:\Windows\system32\Viewers\Quikview.exe), ref: 00DF4F32
                              • PathQuoteSpacesW.SHLWAPI(?), ref: 00DF4F40
                              • StrCatBuffW.SHLWAPI(?,00E74F0C,00000104), ref: 00DF4F68
                              • StrCatBuffW.SHLWAPI(?,00E80ACC,00000104), ref: 00DF4F7C
                              • SendDlgItemMessageW.USER32(?,00000064,000000C5,00000102,00000000), ref: 00DF4F8D
                              • SetDlgItemTextW.USER32(?,00000064,?), ref: 00DF4FA4
                              • GetDlgItem.USER32(?,00000064), ref: 00DF4FB1
                              • SHAutoComplete.SHLWAPI(00000000), ref: 00DF4FBA
                              • SendDlgItemMessageW.USER32(?,00000066,000000C5,00000102,00000000), ref: 00DF4FCE
                              • SetDlgItemTextW.USER32(?,00000066,C:\Users\user\Documents), ref: 00DF4FDF
                              • GetDlgItem.USER32(?,00000066), ref: 00DF4FE9
                              • SHAutoComplete.SHLWAPI(00000000), ref: 00DF4FEC
                              • GetDlgItemTextW.USER32(?,00000066,?,00000104), ref: 00DF5020
                              • StrTrimW.SHLWAPI(?,00E750B0), ref: 00DF5033
                              • GetDlgItemTextW.USER32(?,00000064,?,00000104), ref: 00DF508A
                              • lstrcpyW.KERNEL32(?,?), ref: 00DF50A6
                              • StrChrW.SHLWAPI(?,00000020), ref: 00DF50F4
                              • lstrcpyW.KERNEL32(?,-00000002), ref: 00DF510F
                              • LoadStringW.USER32(00002AF9,?,00000020), ref: 00DF5144
                              • LoadStringW.USER32(00002AF9,?,00000020), ref: 00DF515F
                              • LoadStringW.USER32(00002AFD,?,00000100), ref: 00DF5179
                              • LoadStringW.USER32(00002AFD,?,00000100), ref: 00DF5197
                              • GetOpenFileNameW.COMDLG32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000058), ref: 00DF51E7
                              • StrCpyNW.SHLWAPI(?,?,00000104), ref: 00DF5206
                              • PathQuoteSpacesW.SHLWAPI(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000058), ref: 00DF5214
                              • StrCatBuffW.SHLWAPI(?,00E74F0C,00000104), ref: 00DF523D
                              • StrCatBuffW.SHLWAPI(?,?,00000104), ref: 00DF5254
                              • SetDlgItemTextW.USER32(?,00000064,?), ref: 00DF5261
                              • PostMessageW.USER32(?,00000028,00000001,00000000), ref: 00DF526E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Item$Textlstrcpy$Message$PathSend$BuffLoadString$QuoteSpaces$AutoCompleteDestroyDirectoryImageList_$BackslashFileFolderFreeFromListLocationLongNameOpenPostSpecialSystemTaskTrimWindowWindowslstrcatlstrcmpi
                              • String ID: "$C:\Users\user\Documents$C:\Windows\system32\Viewers\Quikview.exe$Viewers\Quikview.exe$X
                              • API String ID: 583393450-834333410
                              • Opcode ID: 0e418c57f1e308a001a480987bdc3b8cbab22af53cedfa3e4a2195b4f9dccfea
                              • Instruction ID: f65a26c0011ce9a4ff22406dcfbd6941421dc75f377aee082829ace677412850
                              • Opcode Fuzzy Hash: 0e418c57f1e308a001a480987bdc3b8cbab22af53cedfa3e4a2195b4f9dccfea
                              • Instruction Fuzzy Hash: E1E1B372744709AFE760EB61EC4AFAB77A8BB44740F04851AF749F61D0DBB09448CB62
                              APIs
                              • ReleaseCapture.USER32 ref: 00DF7771
                              • SendMessageW.USER32(?,00000202,00000000,00000000), ref: 00DF7781
                              • GetDlgItemTextW.USER32(?,00000066,?,00000104), ref: 00DF77D9
                              • PathQuoteSpacesW.SHLWAPI(?), ref: 00DF77F8
                              • GetParent.USER32(?), ref: 00DF7806
                              • SetDlgItemTextW.USER32(00000000), ref: 00DF780D
                              • GetDlgItemTextW.USER32(?,00000065,?,00000104), ref: 00DF7820
                              • DestroyCursor.USER32 ref: 00DF786B
                              • DestroyCursor.USER32 ref: 00DF7873
                              • DestroyCursor.USER32 ref: 00DF787B
                              • EndDialog.USER32(?,00000001), ref: 00DF7884
                              • LoadIconW.USER32(0000006B), ref: 00DF78BA
                              • LoadIconW.USER32(0000006C), ref: 00DF78C9
                              • LoadCursorW.USER32(00000064), ref: 00DF78D8
                              • SendMessageW.USER32(?,00000080,00000000,0005047B), ref: 00DF78F5
                              • ReleaseCapture.USER32 ref: 00DF7928
                              • GetCursorPos.USER32(?), ref: 00DF794F
                              • WindowFromPoint.USER32(?,?), ref: 00DF795D
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00DF796E
                              • GetParent.USER32(00000000), ref: 00DF7978
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00DF7983
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DF799F
                              • SetDlgItemTextW.USER32(?,00000064,?), ref: 00DF79B3
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00DF79C0
                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00DF79CE
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00DF79DE
                              • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00DF79EF
                              • EnumProcessModules.PSAPI(00000000,?,00000004,00000000), ref: 00DF7A04
                              • GetModuleFileNameExW.PSAPI(00000000,?,?,00000100), ref: 00DF7A19
                              • CloseHandle.KERNEL32(00000000), ref: 00DF7A20
                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00DF7A2E
                              • SetDlgItemTextW.USER32(?,00000064,00E74520), ref: 00DF7A43
                              • SetDlgItemTextW.USER32(?,00000065,00E74520), ref: 00DF7A4D
                              • SetDlgItemTextW.USER32(?,00000066,00E74520), ref: 00DF7A57
                              • LoadCursorW.USER32(?,00007F00), ref: 00DF7A78
                              • SetCursor.USER32(00000000), ref: 00DF7A7F
                              • SendDlgItemMessageW.USER32(?,00000067,00000170,00000000), ref: 00DF7A95
                              • ReleaseCapture.USER32 ref: 00DF7A9B
                              • GetDlgItemTextW.USER32(?,00000065,?,00000100), ref: 00DF7AB8
                              • GetDlgItem.USER32(?,00000001), ref: 00DF7AC8
                              • EnableWindow.USER32(00000000), ref: 00DF7ACB
                              • GetDlgItem.USER32(?,00000001), ref: 00DF7AD4
                              • IsWindowEnabled.USER32(00000000), ref: 00DF7AD7
                              • GetDlgItem.USER32(?,00000001), ref: 00DF7AE6
                              • PostMessageW.USER32(?,00000028,00000000), ref: 00DF7AEC
                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00DF7AFD
                              • GetDlgCtrlID.USER32(00000000), ref: 00DF7B04
                              • SetCapture.USER32(?), ref: 00DF7B10
                              • SetCursor.USER32 ref: 00DF7B26
                              • SendDlgItemMessageW.USER32(?,00000067,00000170,00000000), ref: 00DF7B3C
                                • Part of subcall function 00DFB430: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00DFB475
                                • Part of subcall function 00DFB430: PathRemoveFileSpecW.SHLWAPI(?), ref: 00DFB483
                                • Part of subcall function 00DFB430: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00DFB496
                                • Part of subcall function 00DFB430: SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?), ref: 00DFB4A9
                                • Part of subcall function 00DFB430: PathIsRelativeW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DFB4BE
                                • Part of subcall function 00DFB430: PathIsPrefixW.SHLWAPI(?,?), ref: 00DFB4DB
                                • Part of subcall function 00DFB430: PathIsPrefixW.SHLWAPI(?,C:\Windows\system32\Viewers\Quikview.exe), ref: 00DFB4E7
                                • Part of subcall function 00DFB430: PathRelativePathToW.SHLWAPI(?,?,00000010,C:\Windows\system32\Viewers\Quikview.exe,?), ref: 00DFB502
                                • Part of subcall function 00DFB430: lstrcpyW.KERNEL32(?,%CSIDL:MYDOCUMENTS%), ref: 00DFB51C
                                • Part of subcall function 00DFB430: PathAppendW.SHLWAPI(?,?), ref: 00DFB52B
                                • Part of subcall function 00DFB430: lstrcpyW.KERNEL32(?,?), ref: 00DFB53E
                                • Part of subcall function 00DFB430: PathUnExpandEnvStringsW.SHLWAPI(?,?,00000104), ref: 00DFB5AF
                                • Part of subcall function 00DFB430: lstrcpynW.KERNEL32(?,?,00000104), ref: 00DFB5CE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Item$Text$Path$CursorWindow$Message$CaptureLoadSend$DestroyFileNameProcessRelease$FromIconLongModuleParentPointPrefixRelativelstrcpy$AppendChildClassCloseCtrlDialogDirectoryEnableEnabledEnumExpandFolderHandleModulesOpenPostQuoteRemoveSpacesSpecStringsThreadWindowslstrcpyn
                              • String ID:
                              • API String ID: 4248756809-0
                              • Opcode ID: 01a8efdde9ea0a30b82ecef3a5310e1804bb8bef75cd3ce5da410eeaa76663e3
                              • Instruction ID: 3ea2f560d77162108bf9215ad089aaf620cceb26302df72139c24603b6548235
                              • Opcode Fuzzy Hash: 01a8efdde9ea0a30b82ecef3a5310e1804bb8bef75cd3ce5da410eeaa76663e3
                              • Instruction Fuzzy Hash: AAB1D072604305AFE7209F61EC4DFAB7BADFB08340F04451AF646BA1E1DBB59948CB61
                              APIs
                              • GetCommandLineW.KERNEL32(?,75BFCF90,?,?,?,00DFE4A6), ref: 00E055E5
                              • StrChrW.SHLWAPI(00000000,00000009,?,?,?,00DFE4A6), ref: 00E05609
                              • StrChrW.SHLWAPI(00000000,00000009,?,?,?,00DFE4A6), ref: 00E0561A
                              • lstrlenW.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E0562C
                              • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,00DFE4A6), ref: 00E0563E
                              • lstrlenW.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E05643
                              • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,00DFE4A6), ref: 00E0564F
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E0565B
                              • StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E05693
                              • lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E056A7
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E056D5
                              • StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E0570B
                              • lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E0571F
                              • GlobalFree.KERNEL32(00000000), ref: 00E05753
                              • GlobalAlloc.KERNEL32(00000040,0000020C,?,?,?,00DFE4A6), ref: 00E05760
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E0576D
                              • StrTrimW.SHLWAPI(00000000,00E75864,?,?,?,00DFE4A6), ref: 00E0577A
                              • CharUpperW.USER32(00000000,?,?,?,00DFE4A6), ref: 00E05781
                              • CharUpperW.USER32(00000002,?,?,?,00DFE4A6), ref: 00E057D9
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E057EB
                              • StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E05821
                              • lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E05835
                              • StrCpyNW.SHLWAPI(00E7D538,00000000,00000104,?,?,?,00DFE4A6), ref: 00E0585D
                              • PathUnquoteSpacesW.SHLWAPI(00E7D538,?,?,?,00DFE4A6), ref: 00E05872
                              • lstrcpyW.KERNEL32(00E7D538,00E74724,?,?,?,00DFE4A6), ref: 00E05887
                              • CharUpperW.USER32(00000002,00000022,?,?,?,00DFE4A6), ref: 00E05892
                              • CharUpperW.USER32(00000002,?,?,?,00DFE4A6), ref: 00E058A3
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E058BB
                              • StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E058F1
                              • lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E05905
                                • Part of subcall function 00DFBB00: CharNextW.USER32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB21
                                • Part of subcall function 00DFBB00: lstrlenW.KERNEL32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB32
                                • Part of subcall function 00DFBB00: lstrlenW.KERNEL32(?,?,?,00DF50BE), ref: 00DFBB47
                                • Part of subcall function 00DFBB00: CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB54
                                • Part of subcall function 00DFBB00: CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB67
                              • lstrcpyW.KERNEL32(00000000,00000000,00000022,?,?,?,00DFE4A6), ref: 00E059C5
                              • StrChrW.SHLWAPI(00000000,00000020,?,?,?,00DFE4A6), ref: 00E059FB
                              • lstrcpyW.KERNEL32(00000000,-00000002,?,?,?,00DFE4A6), ref: 00E05A0F
                              • GlobalFree.KERNEL32(00000000), ref: 00E05A36
                              • lstrlenW.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E05A3D
                              • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,00DFE4A6), ref: 00E05A4D
                              • lstrcpyW.KERNEL32(00000000,00000000,?,?,?,00DFE4A6), ref: 00E05A5A
                              • LocalFree.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E05A68
                              • LocalFree.KERNEL32(00000000,?,?,?,00DFE4A6), ref: 00E05A6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: lstrcpy$Char$lstrlen$AllocFreeGlobalLocalUpper$Prev$CommandLineNextPathSpacesTrimUnquote
                              • String ID: %i,%i,%i,%i
                              • API String ID: 792320778-2825437791
                              • Opcode ID: ef8c1102baded001d6ea4c0f907d09f904b30c619f82e9757cdea8bb7f331703
                              • Instruction ID: 5fffdb79e14ad8ac868193ce1eb93396065ed54ce7c4c5b20b455fb39fb2bfdb
                              • Opcode Fuzzy Hash: ef8c1102baded001d6ea4c0f907d09f904b30c619f82e9757cdea8bb7f331703
                              • Instruction Fuzzy Hash: 03B12A33700B09AFDB102B61AC95B3F26A8DF41354F58642AF605B72D5EBA4C884DF76
                              APIs
                              • CreatePopupMenu.USER32 ref: 00DF5682
                              • GetDlgItemTextW.USER32(?,00000064,00E7E6B8,00000200), ref: 00DF569A
                              • CheckMenuRadioItem.USER32(00000000,0000FFFF,00000400), ref: 00DF56C9
                              • GetDlgItem.USER32(?,00000065), ref: 00DF56E4
                              • GetWindowRect.USER32(00000000), ref: 00DF56EB
                              • TrackPopupMenuEx.USER32(00000102,?,?,?,00000000), ref: 00DF570B
                              • GetMenuStringW.USER32(00000000,?,00000100,00000000), ref: 00DF572F
                              • SetDlgItemTextW.USER32(?,00000064,00000000), ref: 00DF577A
                              • CheckDlgButton.USER32(?,00000066,00000001), ref: 00DF5785
                              • SetDlgItemTextW.USER32(?,00000064,0000002D), ref: 00DF5795
                              • CheckDlgButton.USER32(?,00000066,00000000), ref: 00DF57A0
                              • DestroyMenu.USER32 ref: 00DF57C7
                              • GetDlgItem.USER32(?,00000064), ref: 00DF57DC
                              • PostMessageW.USER32(?,00000028,00000000), ref: 00DF57E6
                              • EndDialog.USER32(?,00000002), ref: 00DF5809
                              • GetDlgItemTextW.USER32(?,00000064,00E81AFC,000000FF), ref: 00DF5836
                              • IsDlgButtonChecked.USER32(?,00000066), ref: 00DF5843
                              • EndDialog.USER32(?,00000001), ref: 00DF5857
                              • lstrcpyW.KERNEL32(00E81AFC,*.*), ref: 00DF5881
                              • EndDialog.USER32(?,00000001), ref: 00DF5894
                              • SendMessageW.USER32(?,00000080,00000000,0005047B), ref: 00DF58C6
                              • SendDlgItemMessageW.USER32(?,00000064,000000C5,000000FF,00000000), ref: 00DF58F1
                              • SetDlgItemTextW.USER32(?,00000064,00E81AFC), ref: 00DF58FF
                              • CheckDlgButton.USER32(?,00000066,00000000), ref: 00DF5914
                              • GetDlgItem.USER32(?,00000065), ref: 00DF593E
                              • SendMessageW.USER32(00000000,00001603,00000000,?), ref: 00DF5951
                              • ImageList_Destroy.COMCTL32(?), ref: 00DF595F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Item$MenuText$ButtonCheckMessage$DialogSend$DestroyPopup$CheckedCreateImageList_PostRadioRectStringTrackWindowlstrcpy
                              • String ID: *.*$-$Filters
                              • API String ID: 2651413375-1911857017
                              • Opcode ID: 8c1b9aa7a3bfa4933e21e0e782da934a6527bb29728cd0c08b059fd4136d7a86
                              • Instruction ID: 454c6ff811f5819a27b0c8f9636cb4c873b39a8cb351ff4d5fc16b3f2415063f
                              • Opcode Fuzzy Hash: 8c1b9aa7a3bfa4933e21e0e782da934a6527bb29728cd0c08b059fd4136d7a86
                              • Instruction Fuzzy Hash: 6F81BE32340A04AFE220AB65FC0EF7B3B99EB08741F004115F74AB91E1DBF599598B66
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,75BFCF90), ref: 00DE99B6
                              • lstrcmpiW.KERNEL32(00E7D538,00E74724), ref: 00DE99D4
                              • ExpandEnvironmentStringsW.KERNEL32(00E7D538,?,00000138), ref: 00DE9A1D
                              • lstrcpynW.KERNEL32(00E7D538,?,00000104), ref: 00DE9A39
                              • PathIsRelativeW.SHLWAPI(00E7D538), ref: 00DE9A44
                              • lstrcpyW.KERNEL32(?,?), ref: 00DE9A61
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00DE9A68
                              • PathAppendW.SHLWAPI(?,00E7D538), ref: 00DE9A78
                              • lstrcpyW.KERNEL32(00E7D538,?), ref: 00DE9A88
                              • PathFindFileNameW.SHLWAPI(?), ref: 00DE9AB5
                              • lstrcpyW.KERNEL32(?,00000000), ref: 00DE9AC3
                              • PathRenameExtensionW.SHLWAPI(?,.ini), ref: 00DE9AD5
                              • lstrcpyW.KERNEL32(?,minipath.ini), ref: 00DE9AF5
                              • lstrcpyW.KERNEL32(00E7D538,?), ref: 00DE9B18
                              • PathRenameExtensionW.SHLWAPI(00E7D538,.ini), ref: 00DE9B24
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00DE9B7E
                              • lstrcatW.KERNEL32(?,\Notepad3.exe), ref: 00DE9B91
                              • PathFindFileNameW.SHLWAPI(?), ref: 00DE9B9F
                              • lstrcpyW.KERNEL32(?,00000000), ref: 00DE9BA7
                              • PathRenameExtensionW.SHLWAPI(?,.ini), ref: 00DE9BB3
                              • lstrcpyW.KERNEL32(?,notepad3.ini), ref: 00DE9BD5
                              • lstrcpyW.KERNEL32(00E7D330,?), ref: 00DE9BFA
                              • PathRenameExtensionW.SHLWAPI(00E7D330,.ini), ref: 00DE9C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$lstrcpy$File$ExtensionRename$Name$FindRemoveSpec$AppendEnvironmentExpandModuleRelativeStringslstrcatlstrcmpilstrcpyn
                              • String ID: .ini$\Notepad3.exe$minipath$minipath.ini$notepad3$notepad3.ini
                              • API String ID: 3294106345-3709775904
                              • Opcode ID: 486b98d50d580801dd7fbacea66cc71dceedb7c899ad8bf0b1d0bb26aed511fa
                              • Instruction ID: 21b67493ab94d1a08c4c8db8c1e4ebec3e8d899789ed13cf47279ea49f68f0c9
                              • Opcode Fuzzy Hash: 486b98d50d580801dd7fbacea66cc71dceedb7c899ad8bf0b1d0bb26aed511fa
                              • Instruction Fuzzy Hash: 306183B2644349ABC614EF61EC85DDBB7ECEFD5744F40482AF549E2190EBB0D5088AB2
                              APIs
                                • Part of subcall function 00DFB810: CoCreateInstance.OLE32(00E6A89C,00000000,00000001,00E66D8C,?,0000C356,?), ref: 00DFB83F
                                • Part of subcall function 00DFB810: lstrcpyW.KERNEL32(?,?), ref: 00DFB86B
                                • Part of subcall function 00DFB810: ExpandEnvironmentStringsW.KERNEL32(?,?,00000138), ref: 00DFB8F2
                                • Part of subcall function 00DFB810: lstrcpynW.KERNEL32(?,?,?), ref: 00DFB90C
                              • PathFileExistsW.SHLWAPI(?,74E2F860), ref: 00E05D25
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00E05D30
                              • lstrcpyW.KERNEL32(?,?), ref: 00E05D68
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00E05D76
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05D84
                              • SendMessageW.USER32(00000111,00019D0D,00000000), ref: 00E05DA2
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000200), ref: 00E05DB6
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E05DDA
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000138,74E2F860), ref: 00E05DF8
                              • lstrcpynW.KERNEL32(?,?,00000104), ref: 00E05E14
                              • lstrcpyW.KERNEL32(?,?), ref: 00E05E4B
                              • GetFileAttributesW.KERNEL32(?), ref: 00E05E55
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05E70
                              • PostMessageW.USER32(00000111,00019D0D,00000000), ref: 00E05E90
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E05EA5
                              • lstrcpyW.KERNEL32(?,?), ref: 00E05EE4
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000200), ref: 00E05EFF
                              • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00E05F11
                              • PathIsRootW.SHLWAPI(?), ref: 00E05F2B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05F40
                              • SendMessageW.USER32 ref: 00E05F6E
                              • SendMessageW.USER32(00001053,000000FF,00000111), ref: 00E05F82
                              • SendMessageW.USER32(0000102B,00000000,?), ref: 00E05FAC
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E05FC2
                              • PathFileExistsW.SHLWAPI(?), ref: 00E05FE1
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00E05FEC
                              • lstrcpyW.KERNEL32(?,?), ref: 00E06024
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00E0602E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0603C
                              • SendMessageW.USER32(00000111,00019D0D,00000000), ref: 00E0605A
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000200), ref: 00E0606E
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E06092
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Message$Send$File$Path$Directory$lstrcpy$Current$Info$EnvironmentExistsExpandRemoveSpecStringslstrcpyn$AttributesCreateInstancePostRoot
                              • String ID:
                              • API String ID: 3952839607-0
                              • Opcode ID: 3f3952f57972af0c9464078c22ee897f61dee6fc094df36b1245991ff8870e76
                              • Instruction ID: 5303e4fdcfbceeeed7870fd207876f86757ec99700f2d28ac0d49c1a124fef6b
                              • Opcode Fuzzy Hash: 3f3952f57972af0c9464078c22ee897f61dee6fc094df36b1245991ff8870e76
                              • Instruction Fuzzy Hash: 91918F72644B44AFE730AB61EC49F9B77ACAF48B40F100829F645E61D1EBF4E6488F51
                              APIs
                              • SendMessageW.USER32(00001032,00000000,00000000,?), ref: 00E01DF9
                                • Part of subcall function 00DF9480: SendMessageW.USER32(00000000,00001032,00000000,00000000), ref: 00DF94B8
                                • Part of subcall function 00DF9480: SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 00DF94C8
                                • Part of subcall function 00DF9480: SendMessageW.USER32(?,?,00000000,0000104B), ref: 00DF94ED
                              • EnableMenuItem.USER32(?,00009C44,00000000), ref: 00E01E46
                              • EnableMenuItem.USER32(?,00009C44,00000001), ref: 00E01E58
                              • EnableMenuItem.USER32(?,00009C45,00000001), ref: 00E01E81
                              • EnableMenuItem.USER32(?,00009C46,00000000), ref: 00E01E91
                              • EnableMenuItem.USER32(?,00009C4A,00000000), ref: 00E01E9A
                              • EnableMenuItem.USER32(?,00009C4B,00000001), ref: 00E01EBA
                              • EnableMenuItem.USER32(?,00009C4C,00000000), ref: 00E01EC3
                              • EnableMenuItem.USER32(?,00009C4D,00000000), ref: 00E01ECC
                              • EnableMenuItem.USER32(?,00009C50,00000000), ref: 00E01ED5
                              • SendMessageW.USER32(00000147,00000000,00000000), ref: 00E01EE6
                              • EnableMenuItem.USER32(?,00009C53,00000000), ref: 00E01EFB
                              • CheckMenuItem.USER32(?,00009D0A,000000E0), ref: 00E01F15
                              • CheckMenuItem.USER32(?,00009D0B,000000E0), ref: 00E01F29
                              • CheckMenuItem.USER32(?,00009D0C,000000E0), ref: 00E01F3D
                              • lstrcmpW.KERNEL32(00E81AFC,*.*), ref: 00E01F49
                              • EnableMenuItem.USER32(?,00009D11,00000000), ref: 00E01F6B
                              • CheckMenuItem.USER32(?,00009D13,00000001), ref: 00E01F80
                              • EnableMenuItem.USER32(?,00009D14,00000000), ref: 00E01F94
                              • CheckMenuItem.USER32(?,00009D15,00000001), ref: 00E01FA9
                              • CheckMenuItem.USER32(?,00009D12,00000001), ref: 00E01FBE
                              • CheckMenuRadioItem.USER32(?,00009D6D,00009D70,-00009D6B,00000000), ref: 00E01FD8
                              • CheckMenuItem.USER32(?,00009D71,00000000), ref: 00E01FF1
                              • CheckMenuItem.USER32(?,0000EA61,00000000), ref: 00E02006
                              • EnableMenuItem.USER32(?,00009D16,00000000), ref: 00E0202C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ItemMenu$Enable$Check$MessageSend$Radiolstrcmp
                              • String ID: *.*$C:\Users\user\Desktop\dZIZhRHDXv.ini
                              • API String ID: 4226156974-3401776512
                              • Opcode ID: 3ba9245e53888ae8b598488a5d4010dac37af3a342da63de7202a9a7e74377aa
                              • Instruction ID: 14501c44194332157ccd98d8ef61a323f6b86599a45ade394714a63f1e8d1784
                              • Opcode Fuzzy Hash: 3ba9245e53888ae8b598488a5d4010dac37af3a342da63de7202a9a7e74377aa
                              • Instruction Fuzzy Hash: FA5102723D0704BEF220AB35EC42FAB32DCEF95745F100111FA15FA0D1D7E899898A65
                              APIs
                              • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,98D825DA), ref: 00DF821F
                              • GetDlgItem.USER32(?,00000067), ref: 00DF824D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DF8277
                              • DestroyWindow.USER32(00000000), ref: 00DF827E
                              • SendMessageW.USER32(?,00000080,00000000,0005047B), ref: 00DF8296
                              • SendDlgItemMessageW.USER32(?,00000066,000000C5,00000103,00000000), ref: 00DF82C4
                              • GetDlgItem.USER32(?,00000066), ref: 00DF82CB
                              • SHAutoComplete.SHLWAPI(00000000), ref: 00DF82D2
                              • SendDlgItemMessageW.USER32(?,0000006C,000000C5,00000080,00000000), ref: 00DF82E7
                              • SendDlgItemMessageW.USER32(?,0000006D,000000C5,00000080,00000000), ref: 00DF82F8
                              • SendDlgItemMessageW.USER32(?,0000006E,000000C5,00000080,00000000), ref: 00DF8309
                              • CheckRadioButton.USER32(?,00000064,00000065,00000064), ref: 00DF832A
                              • GetDlgItem.USER32(?,00000067), ref: 00DF8460
                              • SendMessageW.USER32(00000000,00001603,00000000,?), ref: 00DF8472
                              • ImageList_Destroy.COMCTL32(?), ref: 00DF847F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ItemMessageSend$DestroyWindow$AutoButtonCheckCompleteCreateImageList_Radio
                              • String ID: 0$tooltips_class32
                              • API String ID: 2672803554-3619404913
                              • Opcode ID: cf9e0d3a08709d6f8e209a3c051c88697f995c798e9c53ae11c2f43101d9797c
                              • Instruction ID: 8fa3dee4bae225a942ff7d2dc9d77693c51a27c88d6315e9cb38fea07382d908
                              • Opcode Fuzzy Hash: cf9e0d3a08709d6f8e209a3c051c88697f995c798e9c53ae11c2f43101d9797c
                              • Instruction Fuzzy Hash: 2981E131B40309ABE7208B21DC4AF7B36BAFB44B40F04811AF605FA1E0DBF59844DB61
                              APIs
                              • GetPropW.USER32(00000000,DirListData), ref: 00DF8B55
                              • SHGetFileInfoW.SHELL32(Icon,00000010,?,000002B4,00004011), ref: 00DF8B7C
                              • SHGetFileInfoW.SHELL32(Icon,00000080,?,000002B4,00004011), ref: 00DF8BA7
                                • Part of subcall function 00DF8A30: GetPropW.USER32(?,DirListData), ref: 00DF8A3A
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A48
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A56
                                • Part of subcall function 00DF8A30: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF8A82
                                • Part of subcall function 00DF8A30: TranslateMessage.USER32(?), ref: 00DF8A8D
                                • Part of subcall function 00DF8A30: DispatchMessageW.USER32(?), ref: 00DF8A94
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A9E
                                • Part of subcall function 00DF8A30: ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8AB1
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8ABD
                              • lstrcpyW.KERNEL32(00000010,C:\Users\user\Desktop,?,?), ref: 00DF8BD8
                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00DF8BE5
                              • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00DF8BF5
                              • lstrcmpW.KERNEL32(?,*.*,?,?,?,?,?,?), ref: 00DF8C67
                              • StrChrW.SHLWAPI ref: 00DF8C8D
                              • StrChrW.SHLWAPI(?,0000003B), ref: 00DF8CB3
                              • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00DF8D06
                              • SHGetDesktopFolder.SHELL32(?,?,?,?,?,?,?,?,?), ref: 00DF8D11
                              • SHGetDataFromIDListW.SHELL32(?,?,00000001,?,00000250), ref: 00DF8E16
                              • PathMatchSpecW.SHLWAPI(?,?), ref: 00DF8E59
                              • CoTaskMemAlloc.OLE32(00000008), ref: 00DF8E7C
                              • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00DF8EDA
                              • CoTaskMemFree.OLE32(?,?,?,?,?,?,?,?,?), ref: 00DF8F21
                              • SendMessageW.USER32(?,0000101E,00000000,0000FFFE), ref: 00DF8F8F
                              • SendMessageW.USER32(?,00001030,00000000,00DF93D0), ref: 00DF8FB4
                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00DF8FBD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DF8FC9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Message$Send$Event$FileInfoObjectPropSingleTaskWaitlstrcpy$AllocDataDesktopDispatchFolderFreeFromListMatchPathPeekResetSpecTranslatelstrcmp
                              • String ID: *.*$C:\Users\user\Desktop$DirListData$Icon
                              • API String ID: 2929906256-2215564071
                              • Opcode ID: ecd85ed1323eb3773cd459624fe315368a461a664da887a410b52521eee50520
                              • Instruction ID: ab2f00b0cccff575355a37835ab40b3baf246cb7b9ad66637858fbbb9f700d76
                              • Opcode Fuzzy Hash: ecd85ed1323eb3773cd459624fe315368a461a664da887a410b52521eee50520
                              • Instruction Fuzzy Hash: A0E18B71208745AFD720CF64CC84B6BB7E9BF88744F05891DF6899B290DBB1E904CB62
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00DFB475
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00DFB483
                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00DFB496
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?), ref: 00DFB4A9
                              • PathIsRelativeW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DFB4BE
                              • PathIsPrefixW.SHLWAPI(?,?), ref: 00DFB4DB
                              • PathIsPrefixW.SHLWAPI(?,C:\Windows\system32\Viewers\Quikview.exe), ref: 00DFB4E7
                              • PathRelativePathToW.SHLWAPI(?,?,00000010,C:\Windows\system32\Viewers\Quikview.exe,?), ref: 00DFB502
                              • lstrcpyW.KERNEL32(?,%CSIDL:MYDOCUMENTS%), ref: 00DFB51C
                              • PathAppendW.SHLWAPI(?,?), ref: 00DFB52B
                              • lstrcpyW.KERNEL32(?,?), ref: 00DFB53E
                              • PathIsRelativeW.SHLWAPI(C:\Windows\system32\Viewers\Quikview.exe), ref: 00DFB547
                              • PathCommonPrefixW.SHLWAPI(?,?,00000000), ref: 00DFB562
                              • PathRelativePathToW.SHLWAPI(?,?,00000010,C:\Windows\system32\Viewers\Quikview.exe,?), ref: 00DFB580
                              • lstrcpynW.KERNEL32(?,C:\Windows\system32\Viewers\Quikview.exe,00000104), ref: 00DFB598
                              • PathUnExpandEnvStringsW.SHLWAPI(?,?,00000104), ref: 00DFB5AF
                              • lstrcpynW.KERNEL32(?,?,00000104), ref: 00DFB5CE
                              • lstrcpynW.KERNEL32(C:\Windows\system32\Viewers\Quikview.exe,?,00000104), ref: 00DFB5F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$Relative$Prefixlstrcpyn$Filelstrcpy$AppendCommonDirectoryExpandFolderModuleNameRemoveSpecStringsWindows
                              • String ID: %CSIDL:MYDOCUMENTS%$C:\Windows\system32\Viewers\Quikview.exe
                              • API String ID: 3942253345-3867429074
                              • Opcode ID: 7091731f97786559c5fe50a79af4063332eb75f0632717db7bb49c88d7856e84
                              • Instruction ID: 6eee32c6a9e061c14ac5f086f7f7887a0afa0942d96f0298166bc4ebae174ca1
                              • Opcode Fuzzy Hash: 7091731f97786559c5fe50a79af4063332eb75f0632717db7bb49c88d7856e84
                              • Instruction Fuzzy Hash: C3513272644349ABD720DBA1EC84FEB77ECBB88B50F44481AF645D3140E7B4E608CB61
                              APIs
                              • StrCmpNIW.SHLWAPI(C:\Users\user\Documents,%CSIDL:MYDOCUMENTS%,00000013,?,00000002), ref: 00DFB643
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?,?,00000002), ref: 00DFB663
                              • PathAppendW.SHLWAPI(?,?,?,00000002), ref: 00DFB675
                              • lstrcpynW.KERNEL32(?,C:\Users\user\Documents,00000104,?,00000002), ref: 00DFB684
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000138,?,00000002), ref: 00DFB69B
                              • lstrcpynW.KERNEL32(?,?,00000104,?,00000002), ref: 00DFB6BA
                              • PathIsRelativeW.SHLWAPI(?,?,00000002), ref: 00DFB6C4
                              • GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,?,00000002), ref: 00DFB6DA
                              • PathRemoveFileSpecW.SHLWAPI(?,?,00000002), ref: 00DFB6E5
                              • PathAppendW.SHLWAPI(?,?,?,00000002), ref: 00DFB6F8
                              • lstrcpynW.KERNEL32(?,?,00000104,?,00000002), ref: 00DFB70D
                              • PathCanonicalizeW.SHLWAPI(?,?,?,00000002), ref: 00DFB71C
                              • lstrcpyW.KERNEL32(?,?,?,00000002), ref: 00DFB733
                              • PathGetDriveNumberW.SHLWAPI(?,?,00000002), ref: 00DFB73E
                              • CharUpperBuffW.USER32(00000001,00000001,?,00000002), ref: 00DFB750
                              • lstrcpynW.KERNEL32(C:\Users\user\Documents,00000104,00000104,?,00000002), ref: 00DFB776
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$lstrcpyn$AppendFile$BuffCanonicalizeCharDriveEnvironmentExpandFolderModuleNameNumberRelativeRemoveSpecStringsUpperlstrcpy
                              • String ID: %CSIDL:MYDOCUMENTS%$C:\Users\user\Documents
                              • API String ID: 1371384388-3203994559
                              • Opcode ID: 4d1d44a5c3d1f8c16ee0305fb03551e6287b2dc29581472fa3187acf0eeb7533
                              • Instruction ID: b98eeea68e49378ef6426a570c3b39772cf9d07893427d5e91fe3c7466f91ec3
                              • Opcode Fuzzy Hash: 4d1d44a5c3d1f8c16ee0305fb03551e6287b2dc29581472fa3187acf0eeb7533
                              • Instruction Fuzzy Hash: 0C4152B2644349AFD720EFA1DC89FEB77ECAB84750F05492AF345D6090DBB0D5088B62
                              APIs
                                • Part of subcall function 00DFDD80: ResolveLocaleName.KERNEL32(en-US,?,00000055), ref: 00DFDDB3
                                • Part of subcall function 00DFDD80: GetLocaleInfoEx.KERNEL32(?,20000001,00000002), ref: 00DFDDD6
                              • GetDC.USER32 ref: 00DFCEF7
                              • EnumFontsW.GDI32(00000000,Segoe UI,00DFCCB0,00000000), ref: 00DFCF0B
                              • ReleaseDC.USER32(00000000,00000000), ref: 00DFCF14
                              • GetDC.USER32(00000000), ref: 00DFCF5D
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DFCF68
                              • ReleaseDC.USER32(00000000,00000000), ref: 00DFCF75
                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00DFCFC9
                              • SystemParametersInfoW.USER32(00000029,000001F8,000001F4,00000000), ref: 00DFD075
                              • MulDiv.KERNEL32(?,00000048,?), ref: 00DFD096
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: InfoLocaleRelease$CapsDeviceEnumFontsNameParametersResolveSystem
                              • String ID: Malgun Gothic$Microsoft JhengHei UI$Microsoft YaHei UI$Segoe UI$WINDOWSTYLE;WINDOW$Yu Gothic UI$en-US
                              • API String ID: 1673905233-1983616946
                              • Opcode ID: d252c6596d9dcd5927aab0eece201e55228f66c915d9f8a14fee0c323278ffec
                              • Instruction ID: b968cb3d3e841f0d9ac2fa09b9daad4f4bccaa039c36a7091059c2cef200ba7d
                              • Opcode Fuzzy Hash: d252c6596d9dcd5927aab0eece201e55228f66c915d9f8a14fee0c323278ffec
                              • Instruction Fuzzy Hash: 4671F1312043099FD7249F25D849B7AB3E6EF84341F15892EFA5ADB290EB71CC49C761
                              APIs
                                • Part of subcall function 00DE7E40: PathFileExistsW.SHLWAPI(00E7D538,?,?,00DE9F72,98D825DA), ref: 00DE7E57
                                • Part of subcall function 00DE7E40: PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE7E6A
                              • lstrcpyW.KERNEL32(00E7DE20,Notepad3.exe,75C05540), ref: 00E0664A
                              • lstrcpyW.KERNEL32(00E7E030,00E74520), ref: 00E06656
                              • lstrcpyW.KERNEL32(00E7DA00,Notepad3), ref: 00E06662
                              • lstrcpyW.KERNEL32(00E7E240,00E74520), ref: 00E0666E
                              • lstrcpyW.KERNEL32(00E7D7F0,00E74520), ref: 00E0667A
                              • lstrcpyW.KERNEL32(00E7DC10,00E74520), ref: 00E06686
                                • Part of subcall function 00DE8010: lstrlenW.KERNEL32(?,?,?,?,?,00E74520,en-US,00000055,98D825DA), ref: 00DE80EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: lstrcpy$Path$DirectoryExistsFilelstrlen
                              • String ID: DDEApplication$DDEMessage$DDETopic$Notepad3$Notepad3.exe$Target Application$TargetApplicationMode$TargetApplicationParams$TargetApplicationPath$TargetApplicationWndClass$UseTargetApplication
                              • API String ID: 3318512330-1779093258
                              • Opcode ID: a84414fb2b885d4aef86fd7d24a38cc6117b3de553b032b3e5a0e164718857b6
                              • Instruction ID: 7ff705cabdb1686ade89cbac1191c3a81c5de37cbc5e0a0490012ab004aa84ae
                              • Opcode Fuzzy Hash: a84414fb2b885d4aef86fd7d24a38cc6117b3de553b032b3e5a0e164718857b6
                              • Instruction Fuzzy Hash: 964129B2B85B84ABD310A7A17C03B173B61EB84B15F50E435F50C3A3D1EAF1198956A2
                              APIs
                              • SendMessageW.USER32 ref: 00DF9CDB
                              • SendMessageW.USER32(00000000,0000014B,00000000,00000000), ref: 00DF9CE7
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000011,00000000), ref: 00DF9D1E
                              • SHGetDesktopFolder.SHELL32(?), ref: 00DF9D31
                              • SHGetDataFromIDListW.SHELL32(00000000,00000000,00000003,?,00000014), ref: 00DF9DE3
                              • CoTaskMemAlloc.OLE32(00000008), ref: 00DF9DFF
                              • SendMessageW.USER32(00000000,0000040D,00000000,?), ref: 00DF9E41
                              • SendMessageW.USER32(00000000,0000040D,00000000,00000020), ref: 00DF9E72
                              • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 00DF9E91
                              • CoTaskMemFree.OLE32(00000000), ref: 00DF9ECE
                              • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 00DF9EE7
                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00DF9EF3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$FolderTask$AllocDataDesktopFreeFromListLocationSpecial
                              • String ID: $'
                              • API String ID: 202417901-2481900351
                              • Opcode ID: 3a6e83152030d57a63c9181a401338bea11a39fe7ca688d2315131b4cd6fa0fd
                              • Instruction ID: 11cc9a6a3f1ceea504a1be8a63e93d97e2b9e8847e527a95c363f42a0bb059a5
                              • Opcode Fuzzy Hash: 3a6e83152030d57a63c9181a401338bea11a39fe7ca688d2315131b4cd6fa0fd
                              • Instruction Fuzzy Hash: F9712A71244706AFD310CF59DC91F6BB7E8AF88B44F10891CF654EB2A0D7B1E9458B62
                              APIs
                              • lstrcpyW.KERNEL32(?,00E74520,75C05540,75C08510), ref: 00DFB0C3
                              • SendMessageW.USER32(00000000,00000418,00000000,00000000), ref: 00DFB0D9
                              • SendMessageW.USER32(00000000,00000418,00000000,00000000), ref: 00DFB0F3
                              • SendMessageW.USER32(00000000,00000417,00000000,?), ref: 00DFB10C
                              • wsprintfW.USER32 ref: 00DFB126
                              • lstrcatW.KERNEL32(?,?), ref: 00DFB139
                              • CharNextW.USER32(?), ref: 00DFB161
                              • lstrlenW.KERNEL32(?), ref: 00DFB172
                              • lstrlenW.KERNEL32(?), ref: 00DFB18F
                              • CharPrevW.USER32(?,00000000), ref: 00DFB1A2
                              • CharPrevW.USER32(?,00000000), ref: 00DFB1BB
                              • lstrcpynW.KERNEL32(?,?,00000200), ref: 00DFB1D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CharMessageSend$Prevlstrlen$Nextlstrcatlstrcpylstrcpynwsprintf
                              • String ID: %i
                              • API String ID: 2047470491-1318497599
                              • Opcode ID: bf37ca096ef79104d792f2f747b33a1a655df8fe25b4f9fedd1e5b1050ed4625
                              • Instruction ID: 7423dde91c8344ef86c84ed9b4e6d3d4cd390066ec5cc1f28b872690d1bcbaaa
                              • Opcode Fuzzy Hash: bf37ca096ef79104d792f2f747b33a1a655df8fe25b4f9fedd1e5b1050ed4625
                              • Instruction Fuzzy Hash: 984182B2600708AFC320DB64DC45F7BB7ECEB89740F05442AF651E7191EBB0E8098BA5
                              APIs
                              • lstrcpyW.KERNEL32(?,?,?,?), ref: 00E05AD9
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000138), ref: 00E05AED
                              • lstrcpynW.KERNEL32(?,?,00000104), ref: 00E05B09
                              • lstrcpyW.KERNEL32(?,?), ref: 00E05B3A
                              • GetFileAttributesW.KERNEL32(?), ref: 00E05B77
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05B92
                              • PostMessageW.USER32(00000111,00019D0D,00000000), ref: 00E05BB2
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E05BC7
                              • lstrcpyW.KERNEL32(?,?), ref: 00E05BF1
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000200), ref: 00E05C20
                              • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00E05C32
                              • PathIsRootW.SHLWAPI(?), ref: 00E05C4C
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00E05C61
                              • SendMessageW.USER32(00000111,00019D0D,00000000), ref: 00E05C7F
                              • SendMessageW.USER32(00001013,00000000,00000000), ref: 00E05CA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Message$Sendlstrcpy$CurrentDirectoryFile$AttributesEnvironmentExpandInfoPathPostRootStringslstrcpyn
                              • String ID:
                              • API String ID: 3189554786-0
                              • Opcode ID: 435493b843af1f4486c8b96f335fbc5b8bd7b1067e9f0dc6cce66761aa6d8a7c
                              • Instruction ID: dc51cc218c1aa9a698c9767d5a4cdc78129a2425ca7fd24bdb0172946459a594
                              • Opcode Fuzzy Hash: 435493b843af1f4486c8b96f335fbc5b8bd7b1067e9f0dc6cce66761aa6d8a7c
                              • Instruction Fuzzy Hash: BA51C672600744ABE7309B61EC8AFEF77ECAF84744F44442AF649E61D1EBB095488F51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::$Decorator::getReturnTypeoperator+
                              • String ID:
                              • API String ID: 2932655852-0
                              • Opcode ID: a3202cc0b96ad8ffe6b388927acd18238b449f52cb43840876bc4436f0e6526a
                              • Instruction ID: c28c3077b46d7bc1358dbf33f9e7aa97f9dda143f7e3e24cb8c3d595cdc4e21d
                              • Opcode Fuzzy Hash: a3202cc0b96ad8ffe6b388927acd18238b449f52cb43840876bc4436f0e6526a
                              • Instruction Fuzzy Hash: 83C18175A04209AFDB18EFE4D892DEDBBF8AB08300F14215DF606B7291DB709AC5CB51
                              APIs
                              • DName::operator+.LIBCMT ref: 00E12414
                              • DName::operator+.LIBCMT ref: 00E12557
                                • Part of subcall function 00E0DD2F: shared_ptr.LIBCMT ref: 00E0DD4B
                              • DName::operator+.LIBCMT ref: 00E12502
                              • DName::operator+.LIBCMT ref: 00E125A3
                              • DName::operator+.LIBCMT ref: 00E125B2
                              • DName::operator+.LIBCMT ref: 00E126DE
                              • DName::operator=.LIBVCRUNTIME ref: 00E1271E
                              • DName::DName.LIBVCRUNTIME ref: 00E12728
                              • DName::operator+.LIBCMT ref: 00E12745
                              • DName::operator+.LIBCMT ref: 00E12751
                                • Part of subcall function 00E13C69: Replicator::operator[].LIBCMT ref: 00E13CA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]shared_ptr
                              • String ID:
                              • API String ID: 1043660730-0
                              • Opcode ID: 0ba3db9fca29ddc496bc9ccb8ef8221ce771298e2b95c25c9f25a0646697afd0
                              • Instruction ID: 6be8585ebf9e07ca9e2bf5b480eefa7f1f2be0bc3d9d86b50ae4b40e47998b78
                              • Opcode Fuzzy Hash: 0ba3db9fca29ddc496bc9ccb8ef8221ce771298e2b95c25c9f25a0646697afd0
                              • Instruction Fuzzy Hash: DBC1BDB19042089FDB14CFA4DC85BEEB7F8AB18304F14545DE25AB72D2EB709AC8CB50
                              APIs
                              • Replicator::operator[].LIBCMT ref: 00E13CA6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Replicator::operator[]
                              • String ID: "7$@$generic-type-$template-parameter-$}+
                              • API String ID: 3676697650-3552409930
                              • Opcode ID: 01a39affc23115c9e4dea062ccc3c48ddf7048fb0b1ea5a2eae88a8c08344b6c
                              • Instruction ID: 17b880828eeec8a160ea7f50f71e740de4fe2426852ee3a7ed1ce313b6645427
                              • Opcode Fuzzy Hash: 01a39affc23115c9e4dea062ccc3c48ddf7048fb0b1ea5a2eae88a8c08344b6c
                              • Instruction Fuzzy Hash: 6A61D4B1D003099FDB14DFA5E841BEEBBF8AF08310F245019E515B72A2DB749A89CB90
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,0000022C,?,?,?), ref: 00DF8863
                              • SetPropW.USER32(00000000,DirListData,00000000), ref: 00DF888E
                              • lstrcpyW.KERNEL32(00000010,00E74520,?,?,?), ref: 00DF88B4
                              • SHGetFileInfoW.SHELL32(C:\,00000000,?,000002B4,00004001), ref: 00DF88D0
                              • SendMessageW.USER32(00000000,00001003,00000001,00000000), ref: 00DF88E5
                              • SHGetFileInfoW.SHELL32(C:\,00000000,?,000002B4,00004000), ref: 00DF88FD
                              • SendMessageW.USER32(00000000,00001003,00000000,00000000), ref: 00DF890C
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?), ref: 00DF8930
                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?), ref: 00DF8940
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CreateEventFileInfoMessageSend$AllocGlobalProplstrcpy
                              • String ID: C:\$DirListData
                              • API String ID: 1243389431-2784504048
                              • Opcode ID: 431ebd70de979795eb69d6c9e01c9addbecbedd6c7ce51cf9971432f1af0819f
                              • Instruction ID: f156e0d61c3f79921c1e082169877043f09707340c842cdb28b4261b9273669b
                              • Opcode Fuzzy Hash: 431ebd70de979795eb69d6c9e01c9addbecbedd6c7ce51cf9971432f1af0819f
                              • Instruction Fuzzy Hash: 60313271780704BFE760AF51EC8AF5B7B98EB08B41F544055FA09BE2C1DBF564488B61
                              APIs
                              • GetPropW.USER32(?,DirListData), ref: 00DF8A3A
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A48
                              • WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A56
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF8A82
                              • TranslateMessage.USER32(?), ref: 00DF8A8D
                              • DispatchMessageW.USER32(?), ref: 00DF8A94
                              • WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A9E
                              • ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8AB1
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8ABD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: EventMessage$ObjectSingleWait$DispatchPeekPropResetTranslate
                              • String ID: C:\Users\user\Desktop$DirListData
                              • API String ID: 3160958571-3121744273
                              • Opcode ID: 51cc601519707557e91c6e8c38faebdddd094c00258a5e4ddbd750ab05b2c3da
                              • Instruction ID: c5f841fa0d811dc4775be755a70386db1b4e20978808ea395852ef5396d45385
                              • Opcode Fuzzy Hash: 51cc601519707557e91c6e8c38faebdddd094c00258a5e4ddbd750ab05b2c3da
                              • Instruction Fuzzy Hash: E7016D33301B04BFD720ABB6FC4DFAB77A9EB09780F040815F645A5060DAB2E8088B21
                              APIs
                              • ResetEvent.KERNEL32(?), ref: 00DF9030
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DF904D
                              • CoInitialize.OLE32(00000000), ref: 00DF9058
                              • WaitForSingleObject.KERNEL32(?,00000000,?,00001004,00000000,00000000), ref: 00DF9088
                              • SendMessageW.USER32 ref: 00DF90AF
                              • CoTaskMemAlloc.OLE32(?), ref: 00DF9179
                              • SHGetFileInfoW.SHELL32(00000000,00000000,?,000002B4,00004009), ref: 00DF91BA
                              • CoTaskMemFree.OLE32(00000000), ref: 00DF91C1
                              • SHGetDataFromIDListW.SHELL32(?,?,00000001,?,00000250), ref: 00DF926D
                              • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00DF92A9
                              • CoUninitialize.OLE32(?,00001004,00000000,00000000), ref: 00DF92D2
                              • SetEvent.KERNEL32(?), ref: 00DF92DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$EventTask$AllocDataFileFreeFromInfoInitializeListObjectResetSingleUninitializeWait
                              • String ID:
                              • API String ID: 2249403244-0
                              • Opcode ID: 1348600bcedc93e26a6827f0bacadecb919c5663997c775a123ecf1d082059e2
                              • Instruction ID: 17acdbf66b8e39e66ba1e1f5058b712ced452cdc63e07be55d3be8b675b8bf73
                              • Opcode Fuzzy Hash: 1348600bcedc93e26a6827f0bacadecb919c5663997c775a123ecf1d082059e2
                              • Instruction Fuzzy Hash: 52918B71A05706AFD720CF65D898B6BBBF4BF89744F04852DFA849B290D7B0D904CB62
                              APIs
                              • lstrcpynW.KERNEL32(?,?,000001FE,44000000,?,75C05540), ref: 00DFB244
                                • Part of subcall function 00DFBB00: CharNextW.USER32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB21
                                • Part of subcall function 00DFBB00: lstrlenW.KERNEL32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB32
                                • Part of subcall function 00DFBB00: lstrlenW.KERNEL32(?,?,?,00DF50BE), ref: 00DFBB47
                                • Part of subcall function 00DFBB00: CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB54
                                • Part of subcall function 00DFBB00: CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB67
                              • lstrlenW.KERNEL32(00000000,?,?,?,?,75C05540), ref: 00DFB272
                              • SendMessageW.USER32(00000000,00000418,00000000,00000000), ref: 00DFB2B1
                              • SendMessageW.USER32(00000000,00000416,00000000,00000000), ref: 00DFB2CA
                              • SendMessageW.USER32(00000000,00000444,00000001,00E7B964), ref: 00DFB358
                              • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,75C05540), ref: 00DFB35B
                              • SendMessageW.USER32(00000000,00000418,00000000,00000000), ref: 00DFB373
                              • SendMessageW.USER32 ref: 00DFB3CF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$Char$Prev$Nextlstrcpyn
                              • String ID: $
                              • API String ID: 2625338006-227171996
                              • Opcode ID: c26b3c77e3c6c60c991fb6cdd682801e0dce979b3ce06e357501f0b3d6000cdf
                              • Instruction ID: 6d30502fa425b7daa3e2e8565b9ed729a0fd7058f86439a4b16b2fe6a3f12070
                              • Opcode Fuzzy Hash: c26b3c77e3c6c60c991fb6cdd682801e0dce979b3ce06e357501f0b3d6000cdf
                              • Instruction Fuzzy Hash: C14127729403086BD720DB20DC42B6B73D8EB94310F15882AFB45F7192E7B4E98986E6
                              APIs
                              • FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00DFD453
                              • FindWindowExW.USER32(00000000,00000000,TrayNotifyWnd,00000000), ref: 00DFD463
                              • GetWindowRect.USER32(00000000,?), ref: 00DFD46B
                              • SHAppBarMessage.SHELL32(00000005,?), ref: 00DFD491
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Window$Find$MessageRect
                              • String ID: $$Shell_TrayWnd$TrayNotifyWnd
                              • API String ID: 634609282-1160186678
                              • Opcode ID: f2da9b693fc3885990acb2e21e1408e7e3be0e34a0e936259168a3a63f7eb4da
                              • Instruction ID: 732cd86c33e543be28f805b4116df6f56905ce0234de945cae43ed24df2f3885
                              • Opcode Fuzzy Hash: f2da9b693fc3885990acb2e21e1408e7e3be0e34a0e936259168a3a63f7eb4da
                              • Instruction Fuzzy Hash: 45416B716007019FD320DF2ADD85B5ABBE5EF88754F50891EE58AE7380EBB0E944CB51
                              APIs
                              • StrRChrW.SHLWAPI(00E7D538,00000000,0000005C,?,?,?,00DEA9C3), ref: 00DE95CA
                              • SHCreateDirectoryExW.SHELL32(00000000,00E7D538,00000000,?,?,?,00DEA9C3), ref: 00DE95E2
                              • PathFileExistsW.SHLWAPI(00E7D538,?,?,?,00DEA9C3), ref: 00DE95F5
                              • PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE9604
                              • CreateFileW.KERNEL32(00E7D538,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,00DEA9C3), ref: 00DE9623
                              • GetFileSize.KERNEL32(00000000,?), ref: 00DE963E
                              • CloseHandle.KERNEL32(00000000), ref: 00DE9647
                              • CreateFileW.KERNEL32(00E7D538,40000000,00000003,00000000,00000002,00000080,00000000,?,?,?,00DEA9C3), ref: 00DE9671
                              • CloseHandle.KERNEL32(00000000,?,?,?,00DEA9C3), ref: 00DE967D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$Create$CloseDirectoryHandlePath$ExistsSize
                              • String ID: minipath
                              • API String ID: 3237904083-3157150768
                              • Opcode ID: 82ac5ecd65904cf851920ace2a88496e969b3d6c4a5c01d274191185507c571c
                              • Instruction ID: 3377b16c96e1243859bfa99166ef3aed90b124574beb3fc02d77dfe6f50f67f5
                              • Opcode Fuzzy Hash: 82ac5ecd65904cf851920ace2a88496e969b3d6c4a5c01d274191185507c571c
                              • Instruction Fuzzy Hash: 1B218772781700BFE334277ABC0AF5B6A68EB80FA6F34451AFA45F51D0D7E088444674
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: shared_ptr$operator+$Name::operator+Name::operator=
                              • String ID:
                              • API String ID: 1464150960-0
                              • Opcode ID: af1d24155521a67547fa171ba4b62fea55b97c7a4df391c0dd5658ebde7df23b
                              • Instruction ID: 929db87bad2d5ccd14ca220d26a7762cdf68455231d2d47fad26f382ec270fdb
                              • Opcode Fuzzy Hash: af1d24155521a67547fa171ba4b62fea55b97c7a4df391c0dd5658ebde7df23b
                              • Instruction Fuzzy Hash: 9FE1A1B1D0820A9FCB28DFD4D889AFEBBB4EF44304F54A12AD411B7691D7B44695CF90
                              APIs
                              • LoadStringW.USER32(?,?,00000200), ref: 00DF859B
                              • LoadStringW.USER32(?,?,00000200), ref: 00DF85B9
                              • StrChrW.SHLWAPI(?,0000000A,?,?,?,?,?,?,?,?,74E2F860), ref: 00DF8628
                              • lstrcpyW.KERNEL32(?,00000002,?,?,?,?,?,?,?,?,74E2F860), ref: 00DF8640
                              • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?,?,74E2F860), ref: 00DF8660
                              • lstrcpyW.KERNEL32(?,00E74520,?,?,?,?,?,?,?,?,74E2F860), ref: 00DF866C
                              • GetFocus.USER32 ref: 00DF866E
                              • MessageBoxExW.USER32(?,?,?,00000040,?), ref: 00DF86B6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: lstrcpy$LoadString$FocusMessage
                              • String ID: en-US
                              • API String ID: 3506571364-1228076028
                              • Opcode ID: d530c73dcd2d035a182cc7085e5acd0c4e26c32f5977b97e07479b8c46188f52
                              • Instruction ID: 5b4f99144ea30842a1be694254899d46bd03ecbb6ed34c17eb5feebccd005d58
                              • Opcode Fuzzy Hash: d530c73dcd2d035a182cc7085e5acd0c4e26c32f5977b97e07479b8c46188f52
                              • Instruction Fuzzy Hash: 22417872604249AFD761DB20DC45BEB77DCFF44340F00882AF68AE3191EE74D5498BA6
                              APIs
                              • lstrcpyW.KERNEL32(?,00E74520,?,?,?,?), ref: 00DF31DD
                              • LoadStringW.USER32(00002AFF,?,00000100), ref: 00DF31F4
                              • LoadStringW.USER32(00002AFF,?,00000100), ref: 00DF320F
                              • lstrcpyW.KERNEL32(?,?,?,?,?,?), ref: 00DF3228
                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?), ref: 00DF323D
                              • SHBrowseForFolderW.SHELL32 ref: 00DF3287
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00DF3295
                              • CoTaskMemFree.OLE32(00000000), ref: 00DF329C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LoadStringlstrcpy$BrowseCurrentDirectoryFolderFreeFromListPathTask
                              • String ID: A
                              • API String ID: 2100424654-3554254475
                              • Opcode ID: 6cde53cdb8433f3f6d8694c0202e9c795531ff22b6d5795be212887220fa1e7c
                              • Instruction ID: 1e7829009e29c94092a3ca35ca67f39d3c17b95102fe4053c359c17f750ee50a
                              • Opcode Fuzzy Hash: 6cde53cdb8433f3f6d8694c0202e9c795531ff22b6d5795be212887220fa1e7c
                              • Instruction Fuzzy Hash: BD31A3B2604344AFD320DF51DC49BAFB7E8FB88744F41481AF689A2250D7B49648CBA6
                              APIs
                              • lstrcmpW.KERNEL32(?,00E753E8,0000C356,74E2F860,00E05B23,?), ref: 00DFBDD0
                              • lstrcmpW.KERNEL32(?,00E753F0), ref: 00DFBDDC
                              • lstrcmpW.KERNEL32(?,00E753E8), ref: 00DFBDE8
                              • PathIsRootW.SHLWAPI(00E8066C), ref: 00DFBDF3
                              • lstrcpynW.KERNEL32(?,*.*,00000104), ref: 00DFBE0B
                              • SearchPathW.KERNEL32(00E8066C,?,00000000,00000104,?,00000000), ref: 00DFBE34
                              • SearchPathW.KERNEL32(C:\Users\user\Documents,?,00000000,00000104,?,00000000), ref: 00DFBE4E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Pathlstrcmp$Search$Rootlstrcpyn
                              • String ID: *.*$C:\Users\user\Documents
                              • API String ID: 2623810893-3265498248
                              • Opcode ID: 00ad620a130f71b3d38f32dca50523cfab5cd9f2f09f6ff4a2a48f16e6700b5f
                              • Instruction ID: d456fbc18f13902dae1a548d44222954c56f63b7e383fb158c4bd106652663c5
                              • Opcode Fuzzy Hash: 00ad620a130f71b3d38f32dca50523cfab5cd9f2f09f6ff4a2a48f16e6700b5f
                              • Instruction Fuzzy Hash: 830124B2381B023BE6102626AC0AFBF19898F81BB0F069029FA05F50C4EBE0DC414574
                              APIs
                              • DName::operator+.LIBCMT ref: 00E12F86
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E12F91
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E1307D
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E1309A
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E130B7
                              • DName::operator+.LIBCMT ref: 00E130CC
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E130E6
                              • swprintf.LIBCMT ref: 00E13160
                              • DName::operator+.LIBCMT ref: 00E131BB
                                • Part of subcall function 00E0EE69: DName::DName.LIBVCRUNTIME ref: 00E0EEC7
                              • DName::DName.LIBVCRUNTIME ref: 00E13232
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Decorator::getDimensionSigned$Name::operator+$NameName::$swprintf
                              • String ID:
                              • API String ID: 3689813335-0
                              • Opcode ID: 29baa670d51ba05d356947745dc151255a36fa7bd17f600a5c10bbd62bd75689
                              • Instruction ID: a114288a5fd78b2283a762911d2225daff002d0828411c4440e22bc3255f7544
                              • Opcode Fuzzy Hash: 29baa670d51ba05d356947745dc151255a36fa7bd17f600a5c10bbd62bd75689
                              • Instruction Fuzzy Hash: 2591B8B2E042099ADB19EBF4DD49AFE77B8EF09304F10211DF206B6191DA749BC5CB51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __aulldiv
                              • String ID: :$f$f$f$p$p$p
                              • API String ID: 3732870572-1434680307
                              • Opcode ID: 87d0085c63d79a98e0a5ccf09c4d6664a9c855f06cac4ceb6df5acbc09026a33
                              • Instruction ID: db1a5815932205a4d3ee9d22b7ad1f21d712dae37a2e0b2f1d38f3c3afe876fa
                              • Opcode Fuzzy Hash: 87d0085c63d79a98e0a5ccf09c4d6664a9c855f06cac4ceb6df5acbc09026a33
                              • Instruction Fuzzy Hash: BB0269759801189ADF24CFA9C4856EDB7B3FF40B18FB4A11AD416FB280D3309EC98B55
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: _strrchr
                              • String ID: j0Yj
                              • API String ID: 3213747228-2544518064
                              • Opcode ID: 9410032871a2a5834b41c06169913cc7385f83f7bd62ab43803e2690dd3bf7b7
                              • Instruction ID: 81f55b509ed04edb301564e22f32a129453bd9221c8738048ed633ff5ef9f121
                              • Opcode Fuzzy Hash: 9410032871a2a5834b41c06169913cc7385f83f7bd62ab43803e2690dd3bf7b7
                              • Instruction Fuzzy Hash: 80B16572A083659FEB11CF24EC81BEE7BA6EF95314F156195E984BB282D3709D00C7E0
                              APIs
                              • type_info::operator==.LIBVCRUNTIME ref: 00E0C601
                              • ___TypeMatch.LIBVCRUNTIME ref: 00E0C70F
                              • CatchIt.LIBVCRUNTIME ref: 00E0C760
                              • _UnwindNestedFrames.LIBCMT ref: 00E0C861
                              • CallUnexpected.LIBVCRUNTIME ref: 00E0C87C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                              • String ID: csm$csm$csm
                              • API String ID: 4119006552-393685449
                              • Opcode ID: f79c6ba831087639812f76253435e36aafd42bb9cd5958597a2cf085aa454071
                              • Instruction ID: f77617a26575f17bf8b24d1866f77046ff075229c6a72aac48dfaa50d03b282d
                              • Opcode Fuzzy Hash: f79c6ba831087639812f76253435e36aafd42bb9cd5958597a2cf085aa454071
                              • Instruction Fuzzy Hash: C4B17F71800209DFCF28DFA4C8419AEBBB5FF14714F24625AE8157B292D731EA91CFA5
                              APIs
                              • __EH_prolog3.LIBCMT ref: 00E103ED
                              • UnDecorator::getSymbolName.LIBCMT ref: 00E1047F
                              • DName::operator+.LIBCMT ref: 00E10583
                              • DName::DName.LIBVCRUNTIME ref: 00E10626
                                • Part of subcall function 00E0DD2F: shared_ptr.LIBCMT ref: 00E0DD4B
                                • Part of subcall function 00E0DFC9: DName::DName.LIBVCRUNTIME ref: 00E0E017
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name$Name::$Decorator::getH_prolog3Name::operator+Symbolshared_ptr
                              • String ID: "7$(@$(@$@
                              • API String ID: 1134295639-1931073713
                              • Opcode ID: 8339789518d4feba0f38fe4e8fdfc24030a894701bd738790b6f6b0a8f475c0e
                              • Instruction ID: ff7d3e2687696393cb8ca813897698f2507472a6690f725ee6d6ec99e71b120f
                              • Opcode Fuzzy Hash: 8339789518d4feba0f38fe4e8fdfc24030a894701bd738790b6f6b0a8f475c0e
                              • Instruction Fuzzy Hash: D0719D71D04219CFDB11DF94D881BEDBBB9BB08314F24602AE515BB2A2D7B499C4CFA0
                              APIs
                              • CreateFileW.KERNEL32(00E7D538,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 00DE8B41
                              • LockFileEx.KERNEL32(00000000,00000002,00000000,000000FF,00000000,?), ref: 00DE8B60
                              Strings
                              • AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!, xrefs: 00DE8B6A
                              • AcquireWriteFileLock(): INVALID FILE HANDLE!, xrefs: 00DE8C1C
                              • minipath, xrefs: 00DE8BB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$CreateLock
                              • String ID: AcquireWriteFileLock(): INVALID FILE HANDLE!$AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!$minipath
                              • API String ID: 3593386577-1287712860
                              • Opcode ID: b208244ec3851ad4085b6d2347ce1b45ae030e88d1cd5277c128c22e42fa6b6b
                              • Instruction ID: e7f788053f594e1199e52a015c42938f4afc7af5a9f1504766227230995c67b0
                              • Opcode Fuzzy Hash: b208244ec3851ad4085b6d2347ce1b45ae030e88d1cd5277c128c22e42fa6b6b
                              • Instruction Fuzzy Hash: 76318F72A043906BD230772ADC45F7FB2A4DB81774F280315FA6DB21D0DFA09C4992B2
                              APIs
                              • CreateFileW.KERNEL32(00E7D538,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 00DE903D
                              • LockFileEx.KERNEL32(00000000,00000002,00000000,000000FF,00000000,?), ref: 00DE905C
                              Strings
                              • SaveSettings, xrefs: 00DE90AA
                              • AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!, xrefs: 00DE9066
                              • AcquireWriteFileLock(): INVALID FILE HANDLE!, xrefs: 00DE910A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$CreateLock
                              • String ID: AcquireWriteFileLock(): INVALID FILE HANDLE!$AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!$SaveSettings
                              • API String ID: 3593386577-4113319956
                              • Opcode ID: a3e01ff157536610c5f8e8a7d12577550aa5f05d26fe193fd2cde811b7da7dd4
                              • Instruction ID: 41b3471105b704bd6899606292fada97960c4addc64c7a3b8401c5c6994e807e
                              • Opcode Fuzzy Hash: a3e01ff157536610c5f8e8a7d12577550aa5f05d26fe193fd2cde811b7da7dd4
                              • Instruction Fuzzy Hash: A0316F72A043516BD230B72BDC5AB6FB3A49BC1B74F544329FD55B22D0E7609D4882F2
                              APIs
                                • Part of subcall function 00DE89E0: lstrlenW.KERNEL32(?,00000000,Settings2,?,?,?), ref: 00DE8A9D
                                • Part of subcall function 00DE96A0: ExpandEnvironmentStringsW.KERNEL32(?,?,00000104,75B04E90,74E2F860,?,75B0A6F0), ref: 00DE96CA
                                • Part of subcall function 00DE96A0: PathIsRelativeW.SHLWAPI(?,?,75B0A6F0), ref: 00DE96D8
                                • Part of subcall function 00DE96A0: lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE96F2
                                • Part of subcall function 00DE96A0: PathFindFileNameW.SHLWAPI(?,?,?,75B0A6F0), ref: 00DE9701
                                • Part of subcall function 00DE96A0: lstrcpyW.KERNEL32(00000000,?,75B0A6F0), ref: 00DE9708
                                • Part of subcall function 00DE96A0: PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE970F
                                • Part of subcall function 00DE96A0: PathIsDirectoryW.SHLWAPI(?), ref: 00DE9724
                                • Part of subcall function 00DE96A0: lstrcpyW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE9734
                                • Part of subcall function 00DE96A0: PathRemoveFileSpecW.SHLWAPI(?,?,75B0A6F0), ref: 00DE973B
                                • Part of subcall function 00DE96A0: lstrcatW.KERNEL32(?,\np3\,?,75B0A6F0), ref: 00DE9751
                                • Part of subcall function 00DE96A0: lstrcatW.KERNEL32(?,?,?,75B0A6F0), ref: 00DE9760
                                • Part of subcall function 00DE96A0: PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE9767
                                • Part of subcall function 00DE96A0: PathIsDirectoryW.SHLWAPI(?), ref: 00DE9776
                                • Part of subcall function 00DE96A0: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?,?,75B0A6F0), ref: 00DE978F
                                • Part of subcall function 00DE96A0: PathAppendW.SHLWAPI(?,?,?,75B0A6F0), ref: 00DE97A2
                                • Part of subcall function 00DE96A0: PathFileExistsW.KERNELBASE(?,?,75B0A6F0), ref: 00DE97AD
                                • Part of subcall function 00DE96A0: PathIsDirectoryW.SHLWAPI(?), ref: 00DE97BC
                              • lstrcpyW.KERNEL32(?,?,?,?,75B04E90,74E2F860), ref: 00DE98BD
                              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104,?,?,75B04E90,74E2F860), ref: 00DE98F1
                              • PathIsRelativeW.SHLWAPI(?,?,?,75B04E90,74E2F860), ref: 00DE98FF
                              • lstrcpyW.KERNEL32(?,?,?,?,75B04E90,74E2F860), ref: 00DE9911
                              • PathFindFileNameW.SHLWAPI(?,?,?,?,75B04E90,74E2F860), ref: 00DE991C
                              • lstrcpyW.KERNEL32(00000000,?,?,75B04E90,74E2F860), ref: 00DE9923
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$Filelstrcpy$DirectoryExists$EnvironmentExpandFindNameRelativeStringslstrcat$AppendFolderRemoveSpeclstrlen
                              • String ID: minipath.ini
                              • API String ID: 785113118-2848199397
                              • Opcode ID: f21932638907beff9812015743efc90e699a6048b9722beb6adeb51d5a25a89f
                              • Instruction ID: 17c752bf8009a26be5fdfccde9f1a5f8d56bb4e6afc26a3bffd0870575525b67
                              • Opcode Fuzzy Hash: f21932638907beff9812015743efc90e699a6048b9722beb6adeb51d5a25a89f
                              • Instruction Fuzzy Hash: 6321B6B27042045BD720EB15EC85BFF73ECABD8340F44442EF649D3191EAB498898BA3
                              APIs
                              • CreateFileW.KERNEL32(00E7D538,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 00DE7F57
                              • LockFileEx.KERNEL32(00000000,00000002,00000000,000000FF,00000000,00000000), ref: 00DE7F76
                              • FlushFileBuffers.KERNEL32(75BF73E0,75BF73E0), ref: 00DE7FCC
                              • UnlockFileEx.KERNEL32(75BF73E0,00000000,000000FF,00000000,00000000), ref: 00DE7FDE
                              • CloseHandle.KERNEL32(75BF73E0), ref: 00DE7FE5
                                • Part of subcall function 00DF86E0: GetLastError.KERNEL32(?,00000000,?,?,00DE7DA3), ref: 00DF86E9
                                • Part of subcall function 00DF86E0: FormatMessageW.KERNEL32 ref: 00DF8718
                                • Part of subcall function 00DF86E0: lstrlenW.KERNEL32(00000000,00000000,00E7D538), ref: 00DF872F
                                • Part of subcall function 00DF86E0: lstrlenW.KERNEL32(00000000), ref: 00DF8737
                                • Part of subcall function 00DF86E0: LocalAlloc.KERNEL32(00000040,00000000), ref: 00DF8747
                                • Part of subcall function 00DF86E0: GetFocus.USER32 ref: 00DF8774
                                • Part of subcall function 00DF86E0: MessageBoxExW.USER32(?,00000000,MiniPath - ERROR,00000010,?), ref: 00DF878F
                                • Part of subcall function 00DF86E0: LocalFree.KERNEL32(00000000,?,?,00DE7DA3), ref: 00DF8796
                                • Part of subcall function 00DF86E0: LocalFree.KERNEL32(?), ref: 00DF879C
                              Strings
                              • AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!, xrefs: 00DE7F80
                              • AcquireWriteFileLock(): INVALID FILE HANDLE!, xrefs: 00DE7FF3
                              • p, xrefs: 00DE7FA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$Local$FreeMessagelstrlen$AllocBuffersCloseCreateErrorFlushFocusFormatHandleLastLockUnlock
                              • String ID: AcquireWriteFileLock(): INVALID FILE HANDLE!$AcquireWriteFileLock(): NO EXCLUSIVE LOCK ACQUIRED!$p
                              • API String ID: 3792989122-2122673611
                              • Opcode ID: be50b270c0e260e61cb5c1a23220b26689667009f8a63f6a6b0a2a0f9c23964d
                              • Instruction ID: 2965c103dd9e739abf67de7dd3ef673e106af4ccf884d2f3600683f0982f727a
                              • Opcode Fuzzy Hash: be50b270c0e260e61cb5c1a23220b26689667009f8a63f6a6b0a2a0f9c23964d
                              • Instruction Fuzzy Hash: 1621E7313086116BE264772AAC4AF6B3554AFC1774F758325FA69F11E0EBA0C48942BA
                              APIs
                              • LocalFree.KERNEL32(00E771B8,98D825DA,00000000,75C05420), ref: 00DFC7F9
                              • lstrlenW.KERNEL32(?,?,?,?,98D825DA,00000000,75C05420), ref: 00DFC870
                              • StrDupW.SHLWAPI(?,?,?,?,98D825DA,00000000,75C05420), ref: 00DFC8CB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: FreeLocallstrlen
                              • String ID: "$"$"%s"$%.2i
                              • API String ID: 3681330831-2637321524
                              • Opcode ID: a619447a80454e8b69c378d56810c9142d7226fe8407acf8e2dcb4da3251800c
                              • Instruction ID: 7787e8ebf76d466f8236dc333ea4e7710869db10353384d52188c755ea199eac
                              • Opcode Fuzzy Hash: a619447a80454e8b69c378d56810c9142d7226fe8407acf8e2dcb4da3251800c
                              • Instruction Fuzzy Hash: 4A61E07290071CABCB10EF55CC45BAEB7F8FB44700F05816AE959A7181EB7469448FA0
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00DFAE29
                              • GetParent.USER32(?), ref: 00DFAE2C
                              • GetWindowRect.USER32(00000000,?), ref: 00DFAE38
                              • MonitorFromRect.USER32(?,00000002), ref: 00DFAE41
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00DFAE55
                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000005), ref: 00DFAEE7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: RectWindow$Monitor$FromInfoParent
                              • String ID: (
                              • API String ID: 2534694491-3887548279
                              • Opcode ID: 50d135dc198b8c67970976a819f7e9847ef8277021a9053dfa0face832a894e3
                              • Instruction ID: 039849dd9ce758d64a8abcb9716114c9eceeff9bf331c90f2e0ee090dbc43747
                              • Opcode Fuzzy Hash: 50d135dc198b8c67970976a819f7e9847ef8277021a9053dfa0face832a894e3
                              • Instruction Fuzzy Hash: 0A313A723043059FC600CF68DD89A2FBBE9EB88744F55492DF58AE3251D7B0E9098B62
                              APIs
                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00DF9FE2
                              • SendMessageW.USER32(00000000,0000040D,00000000,00000020), ref: 00DFA011
                              • StrRetToBufW.SHLWAPI(?,75C05540,?,00000040), ref: 00DFA043
                              • PathIsSameRootW.SHLWAPI(00000020,?), ref: 00DFA055
                              • SendMessageW.USER32(00000000,0000014E,00000001,00000000), ref: 00DFA074
                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00DFA09A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$PathRootSame
                              • String ID:
                              • API String ID: 2384681124-3916222277
                              • Opcode ID: 23f72dea07d184e3ec3e55000f384ea435f3a6c94c4f850c6e38399b356df43d
                              • Instruction ID: 606fc61428ba69733472d85d38974edf1ec867f98df2016c6748e0ed33a1d18a
                              • Opcode Fuzzy Hash: 23f72dea07d184e3ec3e55000f384ea435f3a6c94c4f850c6e38399b356df43d
                              • Instruction Fuzzy Hash: BD215671344305AFD3209F59ED45FA7B7ECEB85B40F114419F649A7291DBB0E8448B62
                              APIs
                              • GetPropW.USER32(00000000,DirListData), ref: 00DF897A
                                • Part of subcall function 00DF8A30: GetPropW.USER32(?,DirListData), ref: 00DF8A3A
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A48
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A56
                                • Part of subcall function 00DF8A30: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF8A82
                                • Part of subcall function 00DF8A30: TranslateMessage.USER32(?), ref: 00DF8A8D
                                • Part of subcall function 00DF8A30: DispatchMessageW.USER32(?), ref: 00DF8A94
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A9E
                                • Part of subcall function 00DF8A30: ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8AB1
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8ABD
                              • CloseHandle.KERNEL32(?), ref: 00DF898F
                              • CloseHandle.KERNEL32(?), ref: 00DF899B
                              • CoTaskMemFree.OLE32(?), ref: 00DF89A9
                              • RemovePropW.USER32(00000000,DirListData), ref: 00DF89C4
                              • GlobalFree.KERNEL32(00000000), ref: 00DF89CB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: EventMessageProp$CloseFreeHandleObjectSingleWait$DispatchGlobalPeekRemoveResetTaskTranslate
                              • String ID: DirListData
                              • API String ID: 222544525-869039069
                              • Opcode ID: 1d735245f62357bd1cb995747772e8c02c49f091a066627ce19c57c1399e0713
                              • Instruction ID: 209529ee5c02db2e89309968ae9a0f27330dd0f1bcfc5c9df0fde29eb7660e22
                              • Opcode Fuzzy Hash: 1d735245f62357bd1cb995747772e8c02c49f091a066627ce19c57c1399e0713
                              • Instruction Fuzzy Hash: B7F0B272300B01BFD7045BB6FC4C92EB7A9FF58751B148519F51AD2131DBB1D8149A61
                              APIs
                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00DF9931
                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000200), ref: 00DF9985
                              • SendMessageW.USER32 ref: 00DF99B9
                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00DF99E4
                              • lstrcmpiW.KERNEL32(?,?), ref: 00DF99F6
                              • SendMessageW.USER32(00000000,00001053,00000000,?), ref: 00DF9A0C
                              • SendMessageW.USER32(00000000,0000102B,00000000,?), ref: 00DF9A4C
                              • SendMessageW.USER32(00000000,00001013,00000000,00000000), ref: 00DF9A57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$NamePathShort$FileInfolstrcmpi
                              • String ID:
                              • API String ID: 2457365294-0
                              • Opcode ID: 0f1d1a8c4e6e13ba5ce61c33f09636e64273e77582653e1aa78f3829566395b3
                              • Instruction ID: 53d0e4f9404a00a0824466618e83cb04a78eb2cce0b832b7a4ad3eb5bb89f8e3
                              • Opcode Fuzzy Hash: 0f1d1a8c4e6e13ba5ce61c33f09636e64273e77582653e1aa78f3829566395b3
                              • Instruction Fuzzy Hash: 6041C171A04304ABE330DB25DC85BBBB3ECEB85714F05451DFA98A72D1E7B4D944CA62
                              APIs
                              • SendMessageW.USER32(?,00000080,00000000,0005047B), ref: 00DF397A
                              • SetDlgItemTextW.USER32(?,00000064,00000000), ref: 00DF39ED
                              • SendDlgItemMessageW.USER32(?,00000064,000000C5,00000103,00000000), ref: 00DF3A02
                              • GetDlgItem.USER32(?,00000064), ref: 00DF3A0D
                              • SHAutoComplete.SHLWAPI(00000000), ref: 00DF3A14
                              • GetDlgItem.USER32(?,00000065), ref: 00DF3A40
                              • SendMessageW.USER32(00000000,00001603,00000000,?), ref: 00DF3A53
                              • ImageList_Destroy.COMCTL32(?), ref: 00DF3A61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Item$MessageSend$AutoCompleteDestroyImageList_Text
                              • String ID:
                              • API String ID: 2206562733-0
                              • Opcode ID: b794390f5d801fa82ec50018c91be42517ca36397fe284d12672930da3bc5faf
                              • Instruction ID: 29953f952e2333dc3009f35cd92c620a8ed91883937e5c2c7fbbc79e617a5db7
                              • Opcode Fuzzy Hash: b794390f5d801fa82ec50018c91be42517ca36397fe284d12672930da3bc5faf
                              • Instruction Fuzzy Hash: AC3157323002086FD220AB29EC4EF7F7799EB84750F054529F29AEA2D1DFF19951C761
                              APIs
                              • GetDlgItem.USER32(?,00000065), ref: 00DFAF20
                              • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 00DFAF35
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00DFAF45
                              • ImageList_Create.COMCTL32(?,?,00000021,00000001,00000000,?,?,?,?,?,?,?,?,?,?,00DF3994), ref: 00DFAF59
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,FF000000,?,?,?,?,?,?,?,?,?,?,00DF3994,00000065), ref: 00DFAF6A
                              • DeleteObject.GDI32(00000000), ref: 00DFAF71
                              • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 00DFAF84
                              • SendMessageW.USER32(00000000,00001602,00000000,?), ref: 00DFAF9F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Image$List_Object$CreateDeleteItemLoadMaskedMessageRectSend
                              • String ID:
                              • API String ID: 26161057-0
                              • Opcode ID: f0485f2918e3c30c4fc5ff81b9c3cc46d53d5095e72149de54715f42e1e82db3
                              • Instruction ID: cad8dd6d7ef373c5b962adc6115e4638606d0f1db6b0da85a3fae95a6036592d
                              • Opcode Fuzzy Hash: f0485f2918e3c30c4fc5ff81b9c3cc46d53d5095e72149de54715f42e1e82db3
                              • Instruction Fuzzy Hash: F8118E72244704BFE7209BA1AC4AF9B7BECFB48B51F500519F645AA1E0D6F0A9048B95
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: operator+shared_ptr$NameName::
                              • String ID: x3
                              • API String ID: 2894330373-2569920903
                              • Opcode ID: 1e752847080018c6330b31a68b8a5cbbe79519f36a07eafa13d8dba7e4690b04
                              • Instruction ID: 68fa963f5a37b7664eee1c70592fb5a150bf5e751aad57abb31becd66da789bb
                              • Opcode Fuzzy Hash: 1e752847080018c6330b31a68b8a5cbbe79519f36a07eafa13d8dba7e4690b04
                              • Instruction Fuzzy Hash: 0861AF75904109EFCB04DFA8D8449ED7BB9FF04344F24969AE919B7261D37196C5CF40
                              APIs
                                • Part of subcall function 00DE7CF0: CreateFileW.KERNEL32(00E7D538,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00DE7D33
                                • Part of subcall function 00DE7CF0: LockFileEx.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?), ref: 00DE7D4A
                              • FlushFileBuffers.KERNEL32(00000000,00000000), ref: 00DE92EC
                              • UnlockFileEx.KERNEL32(00000000,00000000,000000FF,00000000,?), ref: 00DE92FE
                              • CloseHandle.KERNEL32(00000000), ref: 00DE9305
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$BuffersCloseCreateFlushHandleLockUnlock
                              • String ID: E$Filters$P
                              • API String ID: 3886186091-1413264023
                              • Opcode ID: e1c02dd99b019d8e14f89a1a138ef02caa0b8eb60e26288203c51f1023b3de6f
                              • Instruction ID: 462a09ac747142e863554c60d7fcfe34c06393d454a99c966780593db2f7ba0f
                              • Opcode Fuzzy Hash: e1c02dd99b019d8e14f89a1a138ef02caa0b8eb60e26288203c51f1023b3de6f
                              • Instruction Fuzzy Hash: 7351DC726093819FC710FF16D890B6BF7E4EF85314F584929F980A3291D771E9498BB2
                              APIs
                              • DName::operator+.LIBCMT ref: 00E0F286
                              • DName::operator+.LIBCMT ref: 00E0F2D9
                                • Part of subcall function 00E0DD2F: shared_ptr.LIBCMT ref: 00E0DD4B
                                • Part of subcall function 00E0DC1E: DName::operator+.LIBCMT ref: 00E0DC3F
                              • DName::operator+.LIBCMT ref: 00E0F2CA
                              • DName::operator+.LIBCMT ref: 00E0F32A
                              • DName::operator+.LIBCMT ref: 00E0F337
                              • DName::operator+.LIBCMT ref: 00E0F37E
                              • DName::operator+.LIBCMT ref: 00E0F38B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$shared_ptr
                              • String ID:
                              • API String ID: 1037112749-0
                              • Opcode ID: 44567b760ebff1a9949d59d704d91962db149c8dd15e4f5436763042aff0e1e8
                              • Instruction ID: 857c095a2ecd2ff39c011e2b56abfcad84dbee3571576062d25afc1c8a9deef9
                              • Opcode Fuzzy Hash: 44567b760ebff1a9949d59d704d91962db149c8dd15e4f5436763042aff0e1e8
                              • Instruction Fuzzy Hash: 1A515F71904218AADF15DBE4CC95EEEBBF8AF08710F045169F505B71D1EB749A84CBA0
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 00E0A877
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00E0A87F
                              • _ValidateLocalCookies.LIBCMT ref: 00E0A908
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00E0A933
                              • _ValidateLocalCookies.LIBCMT ref: 00E0A988
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 1170836740-1018135373
                              • Opcode ID: e9bc44280abef8279ceb9ded72f5508a6272f75a880d45479ffd2424a471c532
                              • Instruction ID: c5a5f26275e80476efaf43e289a05e91d0a8157dec3a7340730f37411bc08459
                              • Opcode Fuzzy Hash: e9bc44280abef8279ceb9ded72f5508a6272f75a880d45479ffd2424a471c532
                              • Instruction Fuzzy Hash: 3A519234A0030D9FCB10DF68D885A9EBBF5BF45318F18D165E818AB392D731E986CB91
                              APIs
                              • lstrlenW.KERNEL32(?,?), ref: 00DE8ACB
                                • Part of subcall function 00DE7CF0: CreateFileW.KERNEL32(00E7D538,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00DE7D33
                                • Part of subcall function 00DE7CF0: LockFileEx.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?), ref: 00DE7D4A
                              • FlushFileBuffers.KERNEL32(00000000,00000000), ref: 00DE8A3D
                              • UnlockFileEx.KERNEL32(00000000,00000000,000000FF,00000000,?), ref: 00DE8A4F
                              • CloseHandle.KERNEL32(00000000), ref: 00DE8A56
                              • lstrlenW.KERNEL32(?,00000000,Settings2,?,?,?), ref: 00DE8A9D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$lstrlen$BuffersCloseCreateFlushHandleLockUnlock
                              • String ID: Settings2
                              • API String ID: 2223255397-1942966065
                              • Opcode ID: 1ce731c2879bec7f19c79cb6b58396647893829e1d64c62a4a83f09d6aa568e4
                              • Instruction ID: 2d7060aa0782e1169a7b1dac144cf60bd8571a76753b290942eebff7dee98d42
                              • Opcode Fuzzy Hash: 1ce731c2879bec7f19c79cb6b58396647893829e1d64c62a4a83f09d6aa568e4
                              • Instruction Fuzzy Hash: 7321D5326083519BC710BB29DC44AAFB7A9EFC5764F14061AF845A3390DB70AD4897F2
                              APIs
                              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,98D825DA,?,00E49B70,?,?,00000000,?), ref: 00E49B22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3664257935-537541572
                              • Opcode ID: 013a4d8a59bebaa76b085690566e4d58da736f1f01cdc01794984bf06b1e641c
                              • Instruction ID: ae38d248ace2647592da2383eccd9cee2e1e2e4c984b729a93b040165711ffd9
                              • Opcode Fuzzy Hash: 013a4d8a59bebaa76b085690566e4d58da736f1f01cdc01794984bf06b1e641c
                              • Instruction Fuzzy Hash: BF210633B41611ABCB31DB26FC85BAB37A9EB427A4F251210F916B7292D770ED04D6D0
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383},00000000,00000001,?,?), ref: 00E071A4
                              • RegQueryValueExW.ADVAPI32(?,Locale,00000000,00000000,|,00000006,?), ref: 00E071C1
                              • RegCloseKey.ADVAPI32(?), ref: 00E071CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Locale$Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}$|
                              • API String ID: 3677997916-279692074
                              • Opcode ID: 1c86b4ba294e9e65c9e744901336ed32cfb4f77aebeac044b7e210585df67857
                              • Instruction ID: 9d1e6ebd1965e3f557308a60350acb48992b7b7c196d4eccf5cf325dfcf35e2d
                              • Opcode Fuzzy Hash: 1c86b4ba294e9e65c9e744901336ed32cfb4f77aebeac044b7e210585df67857
                              • Instruction Fuzzy Hash: 56117376E00209AACB21EFA6EC09EFF77B9FB84744F401015F955B31A1E7709989C760
                              APIs
                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00E0A764
                                • Part of subcall function 00E0A2F5: std::exception::exception.LIBCONCRT ref: 00E0A302
                                • Part of subcall function 00E0BBAE: RaiseException.KERNEL32(E06D7363,00000001,00000003,00E09B83,?,?,?,?,00E09B83,?,00E77FD4), ref: 00E0BC0E
                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00E0A784
                                • Part of subcall function 00E0A369: std::exception::exception.LIBCONCRT ref: 00E0A376
                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00E0A7A4
                                • Part of subcall function 00E0A3A3: std::exception::exception.LIBCONCRT ref: 00E0A3B0
                              • std::regex_error::regex_error.LIBCPMT ref: 00E0A7C4
                                • Part of subcall function 00E0A3E6: std::exception::exception.LIBCONCRT ref: 00E0A3FE
                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00E0A7E4
                                • Part of subcall function 00E0A42F: std::exception::exception.LIBCONCRT ref: 00E0A43C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: std::exception::exception$std::invalid_argument::invalid_argument$ExceptionRaisestd::regex_error::regex_error
                              • String ID: bad function call
                              • API String ID: 2470674941-3612616537
                              • Opcode ID: 5d12753f4ab06653f0a2ebb66b912e6cb59a8d02b5bf8b9b49d8ca62f78be435
                              • Instruction ID: f335dd80ffd536b3f305a564d952bcaed88fe87163ff579b8427eef32bf1b9b9
                              • Opcode Fuzzy Hash: 5d12753f4ab06653f0a2ebb66b912e6cb59a8d02b5bf8b9b49d8ca62f78be435
                              • Instruction Fuzzy Hash: F111FE79C0430C7BCB04FAE4D84BCDDB7BDAA04700F90A460BA64B24D5EB75A6599AD1
                              APIs
                              • PathIsRelativeW.SHLWAPI(00E818F4,00000000), ref: 00E00948
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00E0095E
                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 00E00969
                              • PathAppendW.SHLWAPI(?,00E818F4), ref: 00E00975
                              • PathFileExistsW.SHLWAPI(00E818F4), ref: 00E00980
                              • PathIsDirectoryW.SHLWAPI(00E818F4), ref: 00E0098B
                              • LoadImageW.USER32(00000000,00E818F4,00000000,00000000,00000000,00002010), ref: 00E0099F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Path$File$AppendDirectoryExistsImageLoadModuleNameRelativeRemoveSpec
                              • String ID:
                              • API String ID: 1924643234-0
                              • Opcode ID: 60a790950e75fa2b9c3213dff2c6f93a855c8e3d0cdcf49e06d007c18757e7aa
                              • Instruction ID: f8a4bc502b06863b570c96ecf76bb7b923a2544e4a6e17764a702911fdb0b64f
                              • Opcode Fuzzy Hash: 60a790950e75fa2b9c3213dff2c6f93a855c8e3d0cdcf49e06d007c18757e7aa
                              • Instruction Fuzzy Hash: 4E018872600701AFE6109B61EC0DBAF37ECEF89B80F404519F859E6191DBF498448B52
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00000000,00E08710,00E08673,00E08BDA,?,?,00000000,?,?), ref: 00E086AC
                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00E086C2
                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00E086D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                              • API String ID: 667068680-1718035505
                              • Opcode ID: 29673fd4127fc1ed2cdcd434449885dde8a7620e197203f14ca8b801ce6903d5
                              • Instruction ID: da07d80cbf9548b9951a1835ceeb0d2c1ae504890a7e4bb471c6cfb2b034bcb0
                              • Opcode Fuzzy Hash: 29673fd4127fc1ed2cdcd434449885dde8a7620e197203f14ca8b801ce6903d5
                              • Instruction Fuzzy Hash: 61F0A4327527219FCB215EA17E856AB22C89B12399329203AD981F3280DA61CCC44B90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 98a0c1159b3e38cd66312c67d6919436bd5938e0bc1421d3068c70e45245a769
                              • Instruction ID: 3c1e79755a6667aa0b5839e4f79842bdb221b4917838df34508899aaa4205430
                              • Opcode Fuzzy Hash: 98a0c1159b3e38cd66312c67d6919436bd5938e0bc1421d3068c70e45245a769
                              • Instruction Fuzzy Hash: E3B13570A043499FDB01CF98D8A1BBDBBF5BF86319F341959E805BB282C7709949CB91
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __freea$Info
                              • String ID:
                              • API String ID: 541289543-0
                              • Opcode ID: ed39079d7e2e17b0788a5c85fe6b120cf860ec9d28614d8b9d51db0a36341c91
                              • Instruction ID: 8c2b2acb231041cf29e712e0f697a87c8a33cc3a714d7b854574cd4eb8011742
                              • Opcode Fuzzy Hash: ed39079d7e2e17b0788a5c85fe6b120cf860ec9d28614d8b9d51db0a36341c91
                              • Instruction Fuzzy Hash: 8E7105369082099BDF319F94DC81BEF77FAAF4931AF246845EC04B7291E635CC498790
                              APIs
                              • SendMessageW.USER32(00000000,00001032,00000000,00000000), ref: 00DF94B8
                              • SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 00DF94C8
                              • SendMessageW.USER32(?,?,00000000,0000104B), ref: 00DF94ED
                              • StrRetToBufW.SHLWAPI(?,?,?,00000104,?,?,?,?,?,00000000,0000104B,00000000,?), ref: 00DF9549
                              • StrRetToBufW.SHLWAPI(?,?,?,00000104,?,00000001,?,?,?,00000000,0000104B,00000000,?), ref: 00DF9588
                              • SHGetDataFromIDListW.SHELL32(?,?,00000001,?,00000250), ref: 00DF95A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: MessageSend$DataFromList
                              • String ID:
                              • API String ID: 101582348-0
                              • Opcode ID: 26756c1af1b279830c0adc33599424d7ecc25f37f936ab3c2c84429c0d1292f5
                              • Instruction ID: 53c7d60cb6f646ba0986fb70bcb14167c847bd0dcd7f6269337e94db04949db7
                              • Opcode Fuzzy Hash: 26756c1af1b279830c0adc33599424d7ecc25f37f936ab3c2c84429c0d1292f5
                              • Instruction Fuzzy Hash: 12419070204309AFD720DF65CC41F6BF7E8AF85744F148A19F69497290E7B0E9488B25
                              APIs
                              • DName::operator+.LIBCMT ref: 00E13B59
                              • DName::operator+.LIBCMT ref: 00E13B65
                                • Part of subcall function 00E0DD2F: shared_ptr.LIBCMT ref: 00E0DD4B
                              • DName::operator+=.LIBCMT ref: 00E13C23
                                • Part of subcall function 00E123A9: DName::operator+.LIBCMT ref: 00E12414
                                • Part of subcall function 00E123A9: DName::operator+.LIBCMT ref: 00E126DE
                                • Part of subcall function 00E0DC1E: DName::operator+.LIBCMT ref: 00E0DC3F
                              • DName::operator+.LIBCMT ref: 00E13BE0
                                • Part of subcall function 00E0DD87: DName::operator=.LIBVCRUNTIME ref: 00E0DDA8
                              • DName::DName.LIBVCRUNTIME ref: 00E13C47
                              • DName::operator+.LIBCMT ref: 00E13C53
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::Name::operator+=Name::operator=shared_ptr
                              • String ID:
                              • API String ID: 2795783184-0
                              • Opcode ID: 6645de5ddf26b84b0e939c5c0f4e58e8f02a8fbbd2d0e94d04fb9acd76a5cb40
                              • Instruction ID: 660409463957ad76e1e6a0c7962b06a5860eb3c4fe25a5ab96900330cbf310b9
                              • Opcode Fuzzy Hash: 6645de5ddf26b84b0e939c5c0f4e58e8f02a8fbbd2d0e94d04fb9acd76a5cb40
                              • Instruction Fuzzy Hash: B541B6B0A08644AFDB14DFB8C895BEDBBE9AB05304F10145CE19AB7291D7745EC4C7A0
                              APIs
                                • Part of subcall function 00E13C69: Replicator::operator[].LIBCMT ref: 00E13CA6
                              • DName::operator=.LIBVCRUNTIME ref: 00E12813
                                • Part of subcall function 00E123A9: DName::operator+.LIBCMT ref: 00E12414
                                • Part of subcall function 00E123A9: DName::operator+.LIBCMT ref: 00E126DE
                              • DName::operator+.LIBCMT ref: 00E127CD
                              • DName::operator+.LIBCMT ref: 00E127D9
                              • DName::DName.LIBVCRUNTIME ref: 00E1281D
                              • DName::operator+.LIBCMT ref: 00E1283A
                              • DName::operator+.LIBCMT ref: 00E12846
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]
                              • String ID:
                              • API String ID: 955152517-0
                              • Opcode ID: bd4fee3349d7f0cfbed2866d80d6e472b7c601f5de574164cec1afe10980e3ff
                              • Instruction ID: 9aa6a50ae70c762cac134d27a0bf751a14fe7516862ee803f771228982c4ddec
                              • Opcode Fuzzy Hash: bd4fee3349d7f0cfbed2866d80d6e472b7c601f5de574164cec1afe10980e3ff
                              • Instruction Fuzzy Hash: 1731F5B1A046049FDB18DFA8DC55AEEBBF8AF58300F10945DE19AF7391D7709984CB20
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,true,true,?,00000040), ref: 00DE8826
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide
                              • String ID: Settings$ShowDriveBox$false$p$true
                              • API String ID: 626452242-1378405446
                              • Opcode ID: 12ab4b09ef55519fd7101110cd648335ce9ffbf5f29b2fc07fc774f33b1a221e
                              • Instruction ID: 80d625dcf8db5803cb101c09889af42efbcfe9565b1fe69f26a178036d53454b
                              • Opcode Fuzzy Hash: 12ab4b09ef55519fd7101110cd648335ce9ffbf5f29b2fc07fc774f33b1a221e
                              • Instruction Fuzzy Hash: 531127757002405BEB34AB299C56BA776E5EBC9300F84842DF99DEB2C0DE70CC0893A2
                              APIs
                              • CreateFileW.KERNEL32(00000001,80000000,00000005,00000000,00000003,00000000,00000000,?,?,00000000,?,00E07CE0), ref: 00E074F3
                              • CreateFileMappingW.KERNEL32(00000000,00000000,00000008,00000000,00000000,00000000,?,00E07CE0), ref: 00E07507
                              • CloseHandle.KERNEL32(00000000,?,00E07CE0), ref: 00E07510
                              • MapViewOfFile.KERNEL32(00000000,00000001,00000000,00000000,00000000,?,00E07CE0), ref: 00E07520
                              • CloseHandle.KERNEL32(00000000,?,00E07CE0), ref: 00E07529
                              • LoadLibraryExW.KERNEL32(00000001,00000000,00000000,?,?,00000000,?,00E07CE0), ref: 00E07546
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandle$LibraryLoadMappingView
                              • String ID:
                              • API String ID: 1262414356-0
                              • Opcode ID: fefafdccb989816a2341b64050e8634dbd040134f42fd4715d22e23314d83222
                              • Instruction ID: cb6001919b21fabe3456f86bb97cc31ccbadac5569094cb0bec2757c1133b3bb
                              • Opcode Fuzzy Hash: fefafdccb989816a2341b64050e8634dbd040134f42fd4715d22e23314d83222
                              • Instruction Fuzzy Hash: 9C01F572A05618BFE2200B756C8DFBB761CEB41BDDF205225F945B20D0D6B0AD8086B0
                              APIs
                              • GetLastError.KERNEL32(?,?,00E0C16B,00E0B153,00E09F4B), ref: 00E0C182
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E0C190
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E0C1A9
                              • SetLastError.KERNEL32(00000000,00E0C16B,00E0B153,00E09F4B), ref: 00E0C1FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8ff0370f87e904cdb5d6ab925e2498693872eb8123e17ac85d2394f8e5e9143d
                              • Instruction ID: c0de6f7ea4b1a6ca2597b007026ba2037d99b3c0230105314058fca8c65aaf01
                              • Opcode Fuzzy Hash: 8ff0370f87e904cdb5d6ab925e2498693872eb8123e17ac85d2394f8e5e9143d
                              • Instruction Fuzzy Hash: AB01243220B2169EE728A7797C86A6726E4FB06379730133AF624B11F2EF118CC99140
                              APIs
                              • AppendMenuW.USER32(00000000,-000004D2,?,00000000), ref: 00DF5588
                              • lstrcmpiW.KERNEL32(?,00E7E6B8,?,?), ref: 00DF5598
                              • IsDlgButtonChecked.USER32(00000066), ref: 00DF55AA
                              • CharNextW.USER32(?,00E7E6B8,?,?), ref: 00DF55BB
                              • lstrcmpiW.KERNEL32(00000000,?,?), ref: 00DF55C2
                              • IsDlgButtonChecked.USER32(00000066), ref: 00DF55D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ButtonCheckedlstrcmpi$AppendCharMenuNext
                              • String ID:
                              • API String ID: 2957333968-0
                              • Opcode ID: 3a783dbebbed89c50b6aabe5fd895958199a81beec22cd4da5aeacdcc808f222
                              • Instruction ID: faa6786912c9ff6f906c391829bd62dab348d716af3ef8f74627b65d6312365b
                              • Opcode Fuzzy Hash: 3a783dbebbed89c50b6aabe5fd895958199a81beec22cd4da5aeacdcc808f222
                              • Instruction Fuzzy Hash: 9F018B32641A00AFE720AF12FC09A663BB6FB29351F148455F609F6AB4D3B198988B10
                              APIs
                              • SystemParametersInfoW.USER32(00000048,00000008,00000000), ref: 00DFD674
                              • GetWindowRect.USER32(?,?), ref: 00DFD690
                              • DrawAnimatedRects.USER32(?,00000003,?,?), ref: 00DFD6A3
                              • ShowWindow.USER32(?,00000005), ref: 00DFD6AC
                              • SetActiveWindow.USER32(?), ref: 00DFD6B3
                              • SetForegroundWindow.USER32(?), ref: 00DFD6BA
                                • Part of subcall function 00DFD430: FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00DFD453
                                • Part of subcall function 00DFD430: FindWindowExW.USER32(00000000,00000000,TrayNotifyWnd,00000000), ref: 00DFD463
                                • Part of subcall function 00DFD430: GetWindowRect.USER32(00000000,?), ref: 00DFD46B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Window$FindRect$ActiveAnimatedDrawForegroundInfoParametersRectsShowSystem
                              • String ID:
                              • API String ID: 2112798254-0
                              • Opcode ID: 28081db23e768ed4800652ee760726219d91b1ee5b0df321b8a67567fc619754
                              • Instruction ID: 9f2a090681f4d99b3b80f243ecc434fa1c374a7192daaf755684c01a0763da05
                              • Opcode Fuzzy Hash: 28081db23e768ed4800652ee760726219d91b1ee5b0df321b8a67567fc619754
                              • Instruction Fuzzy Hash: 0C017132101614AFD200AB11EC49B9F3BA8FF49741F404409F146A6090DBB499898B62
                              APIs
                              • GetWindowLongW.USER32(0000A02A,000000EC), ref: 00DFB01B
                              • SetWindowLongW.USER32(0000A02A,000000EC,00000000), ref: 00DFB02A
                              • MulDiv.KERNEL32(?,000000FF,00000064), ref: 00DFB03B
                              • SetLayeredWindowAttributes.USER32(0000A02A,00000000,?,00000002), ref: 00DFB04E
                              • GetWindowLongW.USER32(0000A02A,000000EC), ref: 00DFB057
                              • SetWindowLongW.USER32(0000A02A,000000EC,00000000), ref: 00DFB066
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Window$Long$AttributesLayered
                              • String ID:
                              • API String ID: 2169480361-0
                              • Opcode ID: 4ac5320d88bc793df48c8526b538705937e0096ed3de18bd26b9010469d9cd21
                              • Instruction ID: 7323d367b03a0f570931a413818f2d0719a49987a4ae0ae4817428891dcda197
                              • Opcode Fuzzy Hash: 4ac5320d88bc793df48c8526b538705937e0096ed3de18bd26b9010469d9cd21
                              • Instruction Fuzzy Hash: D4F03033205911BFD6112755BC0EFAB3E19AB42361F244216F163E40F1DFA004149765
                              APIs
                              • PathFindExtensionW.SHLWAPI(?,.lnk,00000000,-00000001), ref: 00DFB962
                              • lstrcmpiW.KERNEL32(00000000), ref: 00DFB969
                                • Part of subcall function 00DFB810: CoCreateInstance.OLE32(00E6A89C,00000000,00000001,00E66D8C,?,0000C356,?), ref: 00DFB83F
                                • Part of subcall function 00DFB810: lstrcpyW.KERNEL32(?,?), ref: 00DFB86B
                                • Part of subcall function 00DFB810: ExpandEnvironmentStringsW.KERNEL32(?,?,00000138), ref: 00DFB8F2
                                • Part of subcall function 00DFB810: lstrcpynW.KERNEL32(?,?,?), ref: 00DFB90C
                              • PathIsDirectoryW.SHLWAPI(?), ref: 00DFB9A9
                              • lstrcpynW.KERNEL32(?,?,?), ref: 00DFB9C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Pathlstrcpyn$CreateDirectoryEnvironmentExpandExtensionFindInstanceStringslstrcmpilstrcpy
                              • String ID: .lnk
                              • API String ID: 403286655-24824748
                              • Opcode ID: e0fee78b98e771c4043989935ef3efe53e6b08a2c4f883b8be225f234febc900
                              • Instruction ID: 5def9320973475d6dbbbf15dd886303228765c0a7d78f5a344310f1c0abde42f
                              • Opcode Fuzzy Hash: e0fee78b98e771c4043989935ef3efe53e6b08a2c4f883b8be225f234febc900
                              • Instruction Fuzzy Hash: 2911E7717007085BD720AB24EC467FB73D8AB84750F45C83AE745D2290EBF4CD458AB2
                              APIs
                              • RtlGetNtVersionNumbers.NTDLL ref: 00DE7149
                              • SetPropW.USER32(?,UseImmersiveDarkModeColors,75C08510), ref: 00DE716F
                              • SetWindowCompositionAttribute.USER32 ref: 00DE7198
                                • Part of subcall function 00DE6FC0: SystemParametersInfoW.USER32(00000042,0000000C,00000000), ref: 00DE6FDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: AttributeCompositionInfoNumbersParametersPropSystemVersionWindow
                              • String ID: P#_t@~`t)^t$UseImmersiveDarkModeColors
                              • API String ID: 153591563-3585946688
                              • Opcode ID: bcc347f23c10190a51e7b5177d8000d0f6fe79abf00b54e2f130969bfd49705d
                              • Instruction ID: 2917aab7aa34aeb52abfe060c6535112052c03d160d18edc235fd13d978ad4f1
                              • Opcode Fuzzy Hash: bcc347f23c10190a51e7b5177d8000d0f6fe79abf00b54e2f130969bfd49705d
                              • Instruction Fuzzy Hash: EB010071208700AFD710FF1AEC08B8A3BE4FF40345F448849F49CB22A1D3B0848C8BA2
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,98D825DA,?,?,00000000,00E64658,000000FF,?,00E41AD1,00000002,?,00E41AA5,00E45FF2), ref: 00E41B75
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E41B87
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,00E64658,000000FF,?,00E41AD1,00000002,?,00E41AA5,00E45FF2), ref: 00E41BA9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 25fdc5fe0290f5802d5f3e8b9a32b90ea90423ec37c2317c4497c7aa27ca1b0a
                              • Instruction ID: e71627830f611bd19ea8296798f610e4524cc9f14f58a4d93a1eea43b4269e7d
                              • Opcode Fuzzy Hash: 25fdc5fe0290f5802d5f3e8b9a32b90ea90423ec37c2317c4497c7aa27ca1b0a
                              • Instruction Fuzzy Hash: 2901DB32A40A19EFDB118F51EC09FAFB7B8FB05794F040525F811F26E0E7B49804CA80
                              APIs
                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00E49BE0), ref: 00E49C36
                              • GetLastError.KERNEL32(?,00E49BE0), ref: 00E49C40
                              • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00E49C7E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3177248105-537541572
                              • Opcode ID: 9f9e0b99e678387637ee312d0d682d34a5e59ade823ae0fdfbda25961f3b93dc
                              • Instruction ID: b4e04952d2c4906b0d94f1a8d341d7953d9062de08fa1b226054840d02b19eed
                              • Opcode Fuzzy Hash: 9f9e0b99e678387637ee312d0d682d34a5e59ade823ae0fdfbda25961f3b93dc
                              • Instruction Fuzzy Hash: 11F0A731F80304BBEF201F52FD46B5A7E959B80BC5F115520FA0CB80E2E7E6D9548580
                              APIs
                              • SetThreadUILanguage.KERNEL32(en-US,af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T,00DFE59F,?,?,00000400), ref: 00DFE05B
                              • InitMUILanguage.COMCTL32(en-US,?,?,00000400), ref: 00DFE062
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Language$InitThread
                              • String ID: af-ZA be-BY de-DE el-GR en-GB en-US es-ES fr-FR hi-IN hu-HU id-ID it-IT ja-JP ko-KR nl-NL pl-PL pt-BR pt-PT ru-RU sk-SK sv-SE tr-T$en-US$en-US
                              • API String ID: 4275532074-769303635
                              • Opcode ID: 5bda137b2ea04d16caf215b394845a8ea5a82237d04cb69e144f7a5fb747244a
                              • Instruction ID: 4cf7ac6d472127a937f99ff817e59c6de6f65c68f3971a4ef665df5a696429e1
                              • Opcode Fuzzy Hash: 5bda137b2ea04d16caf215b394845a8ea5a82237d04cb69e144f7a5fb747244a
                              • Instruction Fuzzy Hash: 83F027323029208FC715AF34E8153BB33E2EF8531130AC569E806E7660EB648D0597E5
                              APIs
                              • LocalAlloc.KERNEL32(00000040,?,00000000,74DF3070,75C05540,?,00E054C1,?,00000100,00002712,?), ref: 00DFA7FE
                              • LoadStringW.USER32(?,00000000,?), ref: 00DFA817
                              • LoadStringW.USER32(?,00000000,?), ref: 00DFA82E
                              • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DFA852
                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DFA859
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LoadLocalString$AllocFreelstrlen
                              • String ID:
                              • API String ID: 389633860-0
                              • Opcode ID: 2df73440966a6c7a4a643574dcf64940416c8359111a480c7eb11ab79104961c
                              • Instruction ID: cd0b7c5d76cb25bf6b77d2cc85ad0c5ef4de1be7205e7b785a9297faca241786
                              • Opcode Fuzzy Hash: 2df73440966a6c7a4a643574dcf64940416c8359111a480c7eb11ab79104961c
                              • Instruction Fuzzy Hash: 6301D472301615AFC6209B2BFC48C6B7B6CFFC6396B050429F509D2120EB62DC1986B2
                              APIs
                              • CharNextW.USER32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB21
                              • lstrlenW.KERNEL32(?,?,74E2F860,?,00DF50BE), ref: 00DFBB32
                              • lstrlenW.KERNEL32(?,?,?,00DF50BE), ref: 00DFBB47
                              • CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB54
                              • CharPrevW.USER32(?,00000000,?,?,00DF50BE), ref: 00DFBB67
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Char$Prevlstrlen$Next
                              • String ID:
                              • API String ID: 2482157412-0
                              • Opcode ID: 3716c995e6e2dc98ee5de9bbac2d09b63cdef4df12af500ca8e1e93124e23c41
                              • Instruction ID: dc2c5cd7ea29f2c2742e282464cc06173c7a5ec85794ef3e2c8430cf69d49108
                              • Opcode Fuzzy Hash: 3716c995e6e2dc98ee5de9bbac2d09b63cdef4df12af500ca8e1e93124e23c41
                              • Instruction Fuzzy Hash: E801DB6390022D9ECB206B65FCC493B77ADEB89360B5A5097E505D7162DBB09C41C7B0
                              APIs
                              • EncodePointer.KERNEL32(00000000,?), ref: 00E0C8AC
                              • CatchIt.LIBVCRUNTIME ref: 00E0C992
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CatchEncodePointer
                              • String ID: MOC$RCC
                              • API String ID: 1435073870-2084237596
                              • Opcode ID: 94ea3fa2bf4c03391dfeb0ec185ef3510cd3a76a35fb058ca22ea48b90bbed59
                              • Instruction ID: 00077b2dfa5e42a0c0d501e1ed4a6c04c4b2339ad27ede907dd73e4c6b39dbbb
                              • Opcode Fuzzy Hash: 94ea3fa2bf4c03391dfeb0ec185ef3510cd3a76a35fb058ca22ea48b90bbed59
                              • Instruction Fuzzy Hash: 11414A72900209EFCF15DF98CD81AAEBBB5FF48308F289259F90477291D335A991DB51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: NameName::$Name::operator+
                              • String ID: b=
                              • API String ID: 826178784-1403132311
                              • Opcode ID: f62fbe74695f3c6cb5bb355c489d3cfcc20e48057b6c482316cc28ada97b1d06
                              • Instruction ID: 82da745bc34bb9f139fbc2e10c1b52dd22334d9830b61d027fe73fe07b6544e1
                              • Opcode Fuzzy Hash: f62fbe74695f3c6cb5bb355c489d3cfcc20e48057b6c482316cc28ada97b1d06
                              • Instruction Fuzzy Hash: 5A31A771948248AFDB08EFE4C8919EDBBB4BB45300F64909DE046772D6DBB16EC9CB50
                              APIs
                              • UnDecorator::getSignedDimension.LIBCMT ref: 00E132C9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Decorator::getDimensionSigned
                              • String ID: u,
                              • API String ID: 2996861206-1774674687
                              • Opcode ID: 8e5d30c3c63b776d309538bdf076d86ef0c6d65caca5c11a950ca1c0e65d6f8f
                              • Instruction ID: e87da14844823129a417300ea20a982d0602a152001dc9fad9632eecf3e8a81e
                              • Opcode Fuzzy Hash: 8e5d30c3c63b776d309538bdf076d86ef0c6d65caca5c11a950ca1c0e65d6f8f
                              • Instruction Fuzzy Hash: 0F3184729042099FDF04EBF4EC85BEEB7F8AB08314F20542DE511B3191DB746A89CB65
                              APIs
                              • CreateFileW.KERNEL32(00E7D538,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00DE7D33
                              • LockFileEx.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?), ref: 00DE7D4A
                              Strings
                              • AcquireReadFileLock(%s): NO READER LOCK ACQUIRED!, xrefs: 00DE7D6A
                              • AcquireReadFileLock(%s): INVALID FILE HANDLE!, xrefs: 00DE7D83
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$CreateLock
                              • String ID: AcquireReadFileLock(%s): INVALID FILE HANDLE!$AcquireReadFileLock(%s): NO READER LOCK ACQUIRED!
                              • API String ID: 3593386577-1051419391
                              • Opcode ID: 98d4c1ac954eac66dd649c2a1e7fb8d295b9f73e17ecdbf7ddcde4ed1db2913f
                              • Instruction ID: 00ff82f4a9b74f01590b940647101ecc2dc9d7d372aa61580e90740d6fe869ee
                              • Opcode Fuzzy Hash: 98d4c1ac954eac66dd649c2a1e7fb8d295b9f73e17ecdbf7ddcde4ed1db2913f
                              • Instruction Fuzzy Hash: 8B215931785304B7E230BB35EC13FAB37DCAF81B60F540715B564B60C0EFA0AA0581A1
                              APIs
                              • __is_exception_typeof.LIBVCRUNTIME ref: 00E0B140
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __is_exception_typeof
                              • String ID: MOC$RCC$csm
                              • API String ID: 3140442014-2671469338
                              • Opcode ID: 545806b4b4481b0b0073283f60030dd9d4c6ad90bf3481b4a6dc1936605d5429
                              • Instruction ID: 8e2f79f0a5423dee5a0f0bb7ca83f920cafee8e6ccac8cd385abd2197fe18803
                              • Opcode Fuzzy Hash: 545806b4b4481b0b0073283f60030dd9d4c6ad90bf3481b4a6dc1936605d5429
                              • Instruction Fuzzy Hash: BC119032115209DFD7189F65D401B9BB7F8FF00715F25509AE850AB2A2E774EE80CB91
                              APIs
                              • LoadImageW.USER32(00000064,00000001,00000010,00000010,00000000,?), ref: 00E06394
                              • lstrcpyW.KERNEL32(?,?,?,MiniPath), ref: 00E063E8
                              • Shell_NotifyIconW.SHELL32(00000002,000003BC), ref: 00E06400
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: IconImageLoadNotifyShell_lstrcpy
                              • String ID: MiniPath
                              • API String ID: 2060738540-3848962392
                              • Opcode ID: 20bda9a2493b09754a25dd42d0e0f36df4b4cf6a9f6f8d7166dc915a9ddcb6b8
                              • Instruction ID: 320e5ea12097cb0a47895630617784409f80a5a0dd3c78e1056d91f2862eae9e
                              • Opcode Fuzzy Hash: 20bda9a2493b09754a25dd42d0e0f36df4b4cf6a9f6f8d7166dc915a9ddcb6b8
                              • Instruction Fuzzy Hash: CF117371644304AFE320DF15EC46B5B7BE8BB88B58F00581DF648B62D0D7F49A588B96
                              APIs
                              • PathFileExistsW.SHLWAPI(00E7D538,?,?,00DE9F72,98D825DA), ref: 00DE7E57
                              • PathIsDirectoryW.SHLWAPI(00E7D538), ref: 00DE7E6A
                                • Part of subcall function 00DE7CF0: CreateFileW.KERNEL32(00E7D538,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00DE7D33
                                • Part of subcall function 00DE7CF0: LockFileEx.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?), ref: 00DE7D4A
                                • Part of subcall function 00DEB710: GetFileSize.KERNEL32(?,?), ref: 00DEB729
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: File$Path$CreateDirectoryExistsLockSize
                              • String ID: p$p
                              • API String ID: 286802595-4017495783
                              • Opcode ID: 1a609cbe3fe657f7294a1d2fa3e6e66d870a9e811313298e3354d0109248d437
                              • Instruction ID: a61efc6810686048a39b80c15e80d910420e4a6ea106ad1c5150b6618077b148
                              • Opcode Fuzzy Hash: 1a609cbe3fe657f7294a1d2fa3e6e66d870a9e811313298e3354d0109248d437
                              • Instruction Fuzzy Hash: A801DB306083528BD354FB6B9C4635B29A5DF84758F94C699F48DA62A0E7F08C8887F2
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00E14673,00000000,?,00E7C1E8,?,?,?,00E148CA,00000004,InitializeCriticalSectionEx,00E6DD5C,InitializeCriticalSectionEx), ref: 00E14783
                              • GetLastError.KERNEL32(?,00E14673,00000000,?,00E7C1E8,?,?,?,00E148CA,00000004,InitializeCriticalSectionEx,00E6DD5C,InitializeCriticalSectionEx,00000000,?,00E0D212), ref: 00E1478D
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00E147B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID: api-ms-
                              • API String ID: 3177248105-2084034818
                              • Opcode ID: 4850659c0646b86de2a56c1621a7575ecbf804d2383453dfa47ce4f15008672d
                              • Instruction ID: 9023aedfb6c2edf8adc8a2d3f528e1d79e320cf7319359c1d30dde489f125d70
                              • Opcode Fuzzy Hash: 4850659c0646b86de2a56c1621a7575ecbf804d2383453dfa47ce4f15008672d
                              • Instruction Fuzzy Hash: 0BE04F71780708BBEF601F62FC46F993A9AAB01B88F105421FA4CF81E0D7A2E9958585
                              APIs
                              • GetPropW.USER32(00000000,DirListData), ref: 00DF89EA
                                • Part of subcall function 00DF8A30: GetPropW.USER32(?,DirListData), ref: 00DF8A3A
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A48
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A56
                                • Part of subcall function 00DF8A30: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DF8A82
                                • Part of subcall function 00DF8A30: TranslateMessage.USER32(?), ref: 00DF8A8D
                                • Part of subcall function 00DF8A30: DispatchMessageW.USER32(?), ref: 00DF8A94
                                • Part of subcall function 00DF8A30: WaitForSingleObject.KERNEL32(?,00000000,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8A9E
                                • Part of subcall function 00DF8A30: ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8AB1
                                • Part of subcall function 00DF8A30: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,00DF8BC1,?,?), ref: 00DF8ABD
                              • ResetEvent.KERNEL32(?,?,?,?), ref: 00DF8A05
                              • ResetEvent.KERNEL32(?,?,?,?), ref: 00DF8A0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Event$MessageReset$ObjectPropSingleWait$DispatchPeekTranslate
                              • String ID: DirListData
                              • API String ID: 628585283-869039069
                              • Opcode ID: f17d7bc0f6a88b68a05d9feac81361b79d89ab677486e0126410a2e5b8f5087a
                              • Instruction ID: 9a2001ff716d8722e27ba6747132622f4d99224cfaa4441f56d2d5d9349b2fea
                              • Opcode Fuzzy Hash: f17d7bc0f6a88b68a05d9feac81361b79d89ab677486e0126410a2e5b8f5087a
                              • Instruction Fuzzy Hash: E0E08632B106203BC6202366BC0DB5ABEA5DF957A0F050022F40873270CEE16C55C9E4
                              APIs
                              • GetConsoleOutputCP.KERNEL32(98D825DA,00000000,00000000,?), ref: 00E5A08F
                                • Part of subcall function 00E4E840: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000001,?,00000000,?,?,?,00E4841D,?,00000000,?), ref: 00E4E8A1
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E5A2E1
                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00E5A327
                              • GetLastError.KERNEL32 ref: 00E5A3CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                              • String ID:
                              • API String ID: 2112829910-0
                              • Opcode ID: 85b56d592ecaa0c4c0471479ee53068823a4af0ae848d78c9438efad0678c3c4
                              • Instruction ID: 54d6835c03e8d57211105b8dba95d3597f58e38554ba221575902f205d7d15c1
                              • Opcode Fuzzy Hash: 85b56d592ecaa0c4c0471479ee53068823a4af0ae848d78c9438efad0678c3c4
                              • Instruction Fuzzy Hash: 58D17A75D042489FCB15CFE8D880AEDBBF5FF09314F284A2AE856FB251D630A949CB51
                              APIs
                              • DName::operator+.LIBCMT ref: 00E10BBA
                                • Part of subcall function 00E0D97E: __aulldvrm.LIBCMT ref: 00E0D9AF
                              • DName::operator+.LIBCMT ref: 00E10B1B
                              • DName::operator=.LIBVCRUNTIME ref: 00E10BFF
                              • DName::DName.LIBVCRUNTIME ref: 00E10C31
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+$NameName::Name::operator=__aulldvrm
                              • String ID:
                              • API String ID: 2973644308-0
                              • Opcode ID: e6d12b7c01d842080f373bac8aad25f1fea80b61afb8280ef3ab253e74591242
                              • Instruction ID: 678cf88b24dc43c6d724db801e84e5db04c596c160fc2c91c63ac311b22cb9fd
                              • Opcode Fuzzy Hash: e6d12b7c01d842080f373bac8aad25f1fea80b61afb8280ef3ab253e74591242
                              • Instruction Fuzzy Hash: 5B617CB0904259DFCB15CF98C880AEDBBB4FB45304F24925AE4197B3A2D7B09AC4CF90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: AdjustPointer
                              • String ID:
                              • API String ID: 1740715915-0
                              • Opcode ID: 89cc0e8cfec9ec53cef243738e6d654b0b7f4f592dc4dc2333777c0445bde76d
                              • Instruction ID: 780029542a7af0ebe3c7ec1e1e20feead7817b7386bbbefc16d32076ba1f07e2
                              • Opcode Fuzzy Hash: 89cc0e8cfec9ec53cef243738e6d654b0b7f4f592dc4dc2333777c0445bde76d
                              • Instruction Fuzzy Hash: 2551D0B26046029FDB288F54D881BAE73A4FF04704F34A26DE956B76E1D735ACC0CB90
                              APIs
                              • DName::operator+.LIBCMT ref: 00E107E9
                                • Part of subcall function 00E0DCF3: DName::operator+=.LIBCMT ref: 00E0DD09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Name::operator+Name::operator+=
                              • String ID:
                              • API String ID: 382699925-0
                              • Opcode ID: 911f82d84db95886cd1a6359fb16d5dd71481f78fa469ca02890b7df67e8d8bd
                              • Instruction ID: 5633326ad4706d7929d5fd199197d930fe9d88a9574de6bfe4c4886f607b24e4
                              • Opcode Fuzzy Hash: 911f82d84db95886cd1a6359fb16d5dd71481f78fa469ca02890b7df67e8d8bd
                              • Instruction Fuzzy Hash: 3A413CB1D082099FDB04DFE8D895AEEBBB4FB84354F106119E505B7251D7B09AC8CBD0
                              APIs
                                • Part of subcall function 00E4E840: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000001,?,00000000,?,?,?,00E4841D,?,00000000,?), ref: 00E4E8A1
                              • GetLastError.KERNEL32 ref: 00E4C6EA
                              • __dosmaperr.LIBCMT ref: 00E4C6F1
                              • GetLastError.KERNEL32(?,?,?,?), ref: 00E4C72B
                              • __dosmaperr.LIBCMT ref: 00E4C732
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                              • String ID:
                              • API String ID: 1913693674-0
                              • Opcode ID: 1bedfbca604c0d4e57fcde63cc82c34921f0f4c6646a0d95a4a783f5c1e53067
                              • Instruction ID: 71c2bd14ddbb7e6562257b8c017fb0b7a2b4761ddea3774cbe3a41edfb37444d
                              • Opcode Fuzzy Hash: 1bedfbca604c0d4e57fcde63cc82c34921f0f4c6646a0d95a4a783f5c1e53067
                              • Instruction Fuzzy Hash: 5B21F231605605AFCB60AF76FC8496BB7E8FF05368720A51AF815B7211EB30EC008B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f1553de9774cfd83e78c28c36af69cdb151fdcf7b47dadd54e03c5cd894e8b9d
                              • Instruction ID: bd6ab112d2991e5e2e2707f65323550ef3b55680acb891798145337be8ba3b54
                              • Opcode Fuzzy Hash: f1553de9774cfd83e78c28c36af69cdb151fdcf7b47dadd54e03c5cd894e8b9d
                              • Instruction Fuzzy Hash: C621C031608609AFCB21AF61BC88D6B77E8EF453A8710561AF815B7242EB30EC50C7A1
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 00E4E94F
                                • Part of subcall function 00E4E840: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000001,?,00000000,?,?,?,00E4841D,?,00000000,?), ref: 00E4E8A1
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E4E987
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E4E9A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                              • String ID:
                              • API String ID: 158306478-0
                              • Opcode ID: 801be04e1d1b5a23cef36c7eb312c9d14b1d0d95329df9a6fe1e621846512805
                              • Instruction ID: b0d0b2ae4724608cb34b251fac968f5cf75af10613cd03c887680f90a9c0558f
                              • Opcode Fuzzy Hash: 801be04e1d1b5a23cef36c7eb312c9d14b1d0d95329df9a6fe1e621846512805
                              • Instruction Fuzzy Hash: 4B1104B2606A157FAB15277A7CCECBF2AACEE943D871120A5F601F1281FB60CD0081F1
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,00000040,?,00000000,75BF73E0), ref: 00DE83CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide
                              • String ID: %ld$Window$p
                              • API String ID: 626452242-4136197911
                              • Opcode ID: 3486d3b8bdfaeb3f72979a3db2c4efc6e5505303fb1ca8f7becca3768879c2a0
                              • Instruction ID: af282927e39e6372ff7d012e6f111be89ee4d4a69d41b44dabf2c8b852be48d1
                              • Opcode Fuzzy Hash: 3486d3b8bdfaeb3f72979a3db2c4efc6e5505303fb1ca8f7becca3768879c2a0
                              • Instruction Fuzzy Hash: EE1106716002416BE720EB25DC56FAB77D9EB85700F444529F64DEB2C0EE74D80887A2
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,true,true,?,00000040,?,00000000), ref: 00DEC5C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide
                              • String ID: Settings$false$true
                              • API String ID: 626452242-540067373
                              • Opcode ID: bc4c5040b1db470f8738d3ed6166bf77e36f67c8d482f0b8a634d107a73d3ca0
                              • Instruction ID: 55354e9f54e4598b22c951e8c2ae23635951054d7ca61a7fc5bda8f293121e1c
                              • Opcode Fuzzy Hash: bc4c5040b1db470f8738d3ed6166bf77e36f67c8d482f0b8a634d107a73d3ca0
                              • Instruction Fuzzy Hash: C80126727242806FE724DA288C55FA7B7D9EBC5710F04942AB6AEE72C1DB709C098771
                              APIs
                              • CreateThread.KERNEL32(00000000,00DF9000,00E37AB2,00000000,00000004,00000000), ref: 00E37DAC
                              • GetLastError.KERNEL32(?,?,?,00DF8A1C,00DF9000), ref: 00E37DB8
                              • __dosmaperr.LIBCMT ref: 00E37DBF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CreateErrorLastThread__dosmaperr
                              • String ID:
                              • API String ID: 2744730728-0
                              • Opcode ID: cd479c4ff3b46908753073e1c3ba31c62f8158949959f77622943b649c57371f
                              • Instruction ID: 5be459542f7e826e91d938280cd19e973d2d5c2afb5890897a7e24bd617009f2
                              • Opcode Fuzzy Hash: cd479c4ff3b46908753073e1c3ba31c62f8158949959f77622943b649c57371f
                              • Instruction Fuzzy Hash: E20122B2504604BBCB209B65DC0DBAE7FB9EF823B9F205209F464B61E0DB70C941D660
                              APIs
                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?), ref: 00E5C28F
                              • GetLastError.KERNEL32(?,?,?,?), ref: 00E5C29C
                              • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 00E5C2C2
                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 00E5C2E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: FilePointer$ErrorLast
                              • String ID:
                              • API String ID: 142388799-0
                              • Opcode ID: ff34cae698aa580623f295133d2337952d7fe1a60a1bf0094f54e1477044a82a
                              • Instruction ID: b6e606370e1d0ba461fef7766fd16da1096d840bbfd5e56922871c9dc12407c9
                              • Opcode Fuzzy Hash: ff34cae698aa580623f295133d2337952d7fe1a60a1bf0094f54e1477044a82a
                              • Instruction Fuzzy Hash: A7118576900619AFDF209FA1EC089DF3FB9EB05769F200904F828A61B0C7718A44CBA0
                              APIs
                              • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00E5E98B
                              • GetLastError.KERNEL32 ref: 00E5E997
                                • Part of subcall function 00E5EA40: CloseHandle.KERNEL32(FFFFFFFE,00E5EA8A,?,00E5D413,00000000,00000001,00000000,?,?,00E5A41E,?,00000000,00000000,?,?), ref: 00E5EA50
                              • ___initconout.LIBCMT ref: 00E5E9A7
                                • Part of subcall function 00E5EA02: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E5EA31,00E5D400,?,?,00E5A41E,?,00000000,00000000,?), ref: 00E5EA15
                              • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00E5E9BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                              • String ID:
                              • API String ID: 2744216297-0
                              • Opcode ID: 6f3fce971a4ee9322efcdf364a4af610f69e65af3b9a239edf58a58576416abc
                              • Instruction ID: 8e341a81d82090c8af3d425dc1c2f1d6ea79f5b50a8d25e3e30a4fe5e294cd4f
                              • Opcode Fuzzy Hash: 6f3fce971a4ee9322efcdf364a4af610f69e65af3b9a239edf58a58576416abc
                              • Instruction Fuzzy Hash: A9F08237100901AFCB266F96EC05E467FB6FFC9751B101814FB99A2230DB7198589B50
                              APIs
                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00E5D413,00000000,00000001,00000000,?,?,00E5A41E,?,00000000,00000000), ref: 00E5EA6E
                              • GetLastError.KERNEL32(?,00E5D413,00000000,00000001,00000000,?,?,00E5A41E,?,00000000,00000000,?,?,?,00E5AA09,00000000), ref: 00E5EA7A
                                • Part of subcall function 00E5EA40: CloseHandle.KERNEL32(FFFFFFFE,00E5EA8A,?,00E5D413,00000000,00000001,00000000,?,?,00E5A41E,?,00000000,00000000,?,?), ref: 00E5EA50
                              • ___initconout.LIBCMT ref: 00E5EA8A
                                • Part of subcall function 00E5EA02: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E5EA31,00E5D400,?,?,00E5A41E,?,00000000,00000000,?), ref: 00E5EA15
                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00E5D413,00000000,00000001,00000000,?,?,00E5A41E,?,00000000,00000000,?), ref: 00E5EA9F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                              • String ID:
                              • API String ID: 2744216297-0
                              • Opcode ID: 6ef1642f5c83880b26345b873e24f1157c1b0355f1a94cfc76ca8461ff9fd135
                              • Instruction ID: cf0c2663bd83c8813490e5deb9c3c1af9024314a58a215a05da7d30a73455e81
                              • Opcode Fuzzy Hash: 6ef1642f5c83880b26345b873e24f1157c1b0355f1a94cfc76ca8461ff9fd135
                              • Instruction Fuzzy Hash: E6F0A033100219BFCF261FA6EC08E8A3F62FF093A1F005410FE18B6231C77289289B90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-3684773922
                              • Opcode ID: c65bee88f0801378516d015a151dcb466967c3c7b7523b8a44bc0e0dd6694b85
                              • Instruction ID: aec7180130bdcd3f240400dd9c7d0085be1aa42e3961a4470d1317d9f7bea5cf
                              • Opcode Fuzzy Hash: c65bee88f0801378516d015a151dcb466967c3c7b7523b8a44bc0e0dd6694b85
                              • Instruction Fuzzy Hash: 59A11572E002019FDF28EF68F8957ADB7E1EF99B18F15603AE449BB291D7308C44CA51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: __aulldiv
                              • String ID: +$-
                              • API String ID: 3732870572-2137968064
                              • Opcode ID: 0a663fd5321ce7f9e0e8f2d5083654dc97f8cff783d22b6898c21793cb5a5387
                              • Instruction ID: 3224c6f9aa1f9eb1c19103a40472895dd5fad01d93001ccb8a2d1e2cad1bdfd1
                              • Opcode Fuzzy Hash: 0a663fd5321ce7f9e0e8f2d5083654dc97f8cff783d22b6898c21793cb5a5387
                              • Instruction Fuzzy Hash: 13A1F4709842589FCF24CE78C8506FE7BA1EF56324F24A199E8B5FB291D234D982CB50
                              APIs
                              • Replicator::operator[].LIBCMT ref: 00E12BE0
                              • DName::DName.LIBVCRUNTIME ref: 00E12D2B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: NameName::Replicator::operator[]
                              • String ID: %.
                              • API String ID: 3707554701-4225590719
                              • Opcode ID: 0fd694d23df804a029d64099dd56981ac2981806841210daee087f40059b8c53
                              • Instruction ID: af0b70799211c8f8a6332e3cb00058e5be2c914f7f2bc5a75f3398c3bd5e3c14
                              • Opcode Fuzzy Hash: 0fd694d23df804a029d64099dd56981ac2981806841210daee087f40059b8c53
                              • Instruction Fuzzy Hash: 5B51A1709042849FCB15CFA8E8856EDFBF8BB09304F24945ED759B7362C7719A88CB90
                              APIs
                              • GetVersionExW.KERNEL32(0000011C,?,?,?), ref: 00E07263
                              • GetVersionExW.KERNEL32(0000011C,?,?,?), ref: 00E0727E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: Version
                              • String ID: @s)u
                              • API String ID: 1889659487-2295221104
                              • Opcode ID: 035a136524b287075d91a6661ccf6485e6e360b4c6bd9e8f89976387d61f2637
                              • Instruction ID: 316bd7625917200ff26e17086998320b6930cf24646bf0c185d515ea63cfc203
                              • Opcode Fuzzy Hash: 035a136524b287075d91a6661ccf6485e6e360b4c6bd9e8f89976387d61f2637
                              • Instruction Fuzzy Hash: 1521D071E0422C8ADB359B599C09BEA77B4FB09718F006195E685B22E0C3B4BEC49AC0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: NameName::
                              • String ID: A
                              • API String ID: 1333004437-3554254475
                              • Opcode ID: 0a89dad1e038036d1e8d815a6946e4b5b75b70e75a33b7f29751defd2d063032
                              • Instruction ID: cd49631a725fc9e799f3a44db593deab5dde296b3686b2718fba68383125d9aa
                              • Opcode Fuzzy Hash: 0a89dad1e038036d1e8d815a6946e4b5b75b70e75a33b7f29751defd2d063032
                              • Instruction Fuzzy Hash: 77219FB0904208EFDF14DFD8E811AEC7BB5FB84344F249499E4597B296C7B1AAC5CB41
                              APIs
                              • ___swprintf_l.LIBCMT ref: 00E0D6CA
                                • Part of subcall function 00E14271: _vsnprintf.LEGACY_STDIO_DEFINITIONS ref: 00E14281
                              • swprintf.LIBCMT ref: 00E0D6ED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ___swprintf_l_vsnprintfswprintf
                              • String ID: %lf
                              • API String ID: 3395499991-2891890143
                              • Opcode ID: ebc8ab39cf436ea74cff083f72ad28da57aebdf9748046b436080972700b666c
                              • Instruction ID: a741d47f5d232981edf5a4c5293457cc10d0eb3bfbf853da674c29c6bdd0bff8
                              • Opcode Fuzzy Hash: ebc8ab39cf436ea74cff083f72ad28da57aebdf9748046b436080972700b666c
                              • Instruction Fuzzy Hash: 87F0C2B5500008BADB006B94DC86FFF7FACDF85354F114098F64526292DB715E50D3B5
                              APIs
                              • ___swprintf_l.LIBCMT ref: 00E0D726
                                • Part of subcall function 00E14271: _vsnprintf.LEGACY_STDIO_DEFINITIONS ref: 00E14281
                              • swprintf.LIBCMT ref: 00E0D749
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: ___swprintf_l_vsnprintfswprintf
                              • String ID: %lf
                              • API String ID: 3395499991-2891890143
                              • Opcode ID: fe6df537cd45beb83f50304e1842a48ffa034c27a28b98bb43584017e122e5de
                              • Instruction ID: 9124360f382c2e581cc76574741064c21e8e1cde00b3d2ef99e7fee023fc390c
                              • Opcode Fuzzy Hash: fe6df537cd45beb83f50304e1842a48ffa034c27a28b98bb43584017e122e5de
                              • Instruction Fuzzy Hash: C3F0F6B11000087ADB007B94DC86FFF3BACDF85354F014058F64926292DB719E40D3B5
                              APIs
                              • PathFindExtensionW.SHLWAPI(?,.lnk,74E2F860), ref: 00DFB7B7
                              • lstrcmpiW.KERNEL32(00000000), ref: 00DFB7BE
                                • Part of subcall function 00DFB810: CoCreateInstance.OLE32(00E6A89C,00000000,00000001,00E66D8C,?,0000C356,?), ref: 00DFB83F
                                • Part of subcall function 00DFB810: lstrcpyW.KERNEL32(?,?), ref: 00DFB86B
                                • Part of subcall function 00DFB810: ExpandEnvironmentStringsW.KERNEL32(?,?,00000138), ref: 00DFB8F2
                                • Part of subcall function 00DFB810: lstrcpynW.KERNEL32(?,?,?), ref: 00DFB90C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1798338705.0000000000D81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D80000, based on PE: true
                              • Associated: 00000000.00000002.1798315670.0000000000D80000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798431879.0000000000E65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E7B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798457254.0000000000E80000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1798500300.0000000000E82000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d80000_dZIZhRHDXv.jbxd
                              Similarity
                              • API ID: CreateEnvironmentExpandExtensionFindInstancePathStringslstrcmpilstrcpylstrcpyn
                              • String ID: .lnk
                              • API String ID: 2874927818-24824748
                              • Opcode ID: e99212b7c475a45d87f42414743d3ee27d80caf011695bd0a4b3294298774695
                              • Instruction ID: eca6a4ea6110da045cd29fcd0a84e0cf152524df9f3b5e43be58e16cff7b0352
                              • Opcode Fuzzy Hash: e99212b7c475a45d87f42414743d3ee27d80caf011695bd0a4b3294298774695
                              • Instruction Fuzzy Hash: 95F02431A00B045BD734BB24EC8A7FF77D4EF98750F85881AE459A6291EFF8488486D2

                              Execution Graph

                              Execution Coverage:2.4%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:1.5%
                              Total number of Nodes:1579
                              Total number of Limit Nodes:17
                              execution_graph 15344 57c427f 15345 57c428c 15344->15345 15346 57c429a 15345->15346 15352 57c42f5 15345->15352 15348 57c3c47 free 15346->15348 15349 57c42a8 15348->15349 15359 57c42c2 15349->15359 15362 57cf03c 15352->15362 15354 57c4300 15355 57c3c47 free 15354->15355 15356 57c430c 15355->15356 15374 57c431e memset 15356->15374 15358 57c4312 free 15358->15346 15462 57c9659 15359->15462 15361 57c42b4 15364 57cf049 _mbstowcs_s 15362->15364 15372 57cf0fd _mbstowcs_s 15362->15372 15363 57cf08b 15365 57cf098 15363->15365 15376 57cef4e 15363->15376 15364->15363 15366 57cf083 free 15364->15366 15373 57cf0b3 15365->15373 15382 57cef8e 15365->15382 15366->15363 15369 57cf0ab 15371 57cef4e free 15369->15371 15370 57cf0eb strlen 15370->15372 15371->15373 15372->15354 15373->15370 15373->15372 15375 57c433f 15374->15375 15375->15358 15377 57cef7e _mbstowcs_s 15376->15377 15378 57cef57 15376->15378 15377->15365 15388 57d2427 15378->15388 15380 57cef75 15381 57d2427 free 15380->15381 15381->15377 15383 57cef9a 15382->15383 15387 57cefc8 _mbstowcs_s 15382->15387 15392 57d6eef 15383->15392 15385 57cefbc 15414 57d67b6 15385->15414 15387->15369 15389 57d2463 _mbstowcs_s 15388->15389 15390 57d2430 _mbstowcs_s 15388->15390 15389->15380 15390->15389 15391 57d2457 free 15390->15391 15391->15389 15393 57d6f52 _mbstowcs_s 15392->15393 15394 57d6ef8 15392->15394 15393->15385 15424 57cf49d 15394->15424 15397 57cf49d _mbstowcs_s free 15398 57d6f0a 15397->15398 15399 57cf49d _mbstowcs_s free 15398->15399 15400 57d6f13 15399->15400 15401 57cf49d _mbstowcs_s free 15400->15401 15402 57d6f1c 15401->15402 15403 57cf49d _mbstowcs_s free 15402->15403 15404 57d6f25 15403->15404 15405 57cf49d _mbstowcs_s free 15404->15405 15406 57d6f2e 15405->15406 15407 57cf49d _mbstowcs_s free 15406->15407 15408 57d6f37 15407->15408 15409 57cf49d _mbstowcs_s free 15408->15409 15410 57d6f40 15409->15410 15411 57cf49d _mbstowcs_s free 15410->15411 15412 57d6f49 15411->15412 15413 57cf49d _mbstowcs_s free 15412->15413 15413->15393 15415 57d67e9 15414->15415 15416 57d67bf 15414->15416 15415->15387 15428 57d8aec 15416->15428 15419 57d8aec __cfltcvt free 15420 57d67d7 15419->15420 15421 57cf49d _mbstowcs_s free 15420->15421 15422 57d67e3 15421->15422 15436 57d67ee 15422->15436 15425 57cf4a6 _mbstowcs_s 15424->15425 15426 57cf4c2 15424->15426 15425->15426 15427 57cf4b6 free 15425->15427 15426->15397 15427->15426 15429 57d8af5 15428->15429 15435 57d67cb 15428->15435 15430 57cf49d _mbstowcs_s free 15429->15430 15431 57d8afb 15430->15431 15432 57cf49d _mbstowcs_s free 15431->15432 15433 57d8b04 15432->15433 15434 57cf49d _mbstowcs_s free 15433->15434 15434->15435 15435->15419 15447 57d8b12 15436->15447 15438 57d67f9 15439 57cf49d _mbstowcs_s free 15438->15439 15440 57d6802 15439->15440 15441 57d8aec __cfltcvt free 15440->15441 15442 57d680e 15441->15442 15443 57d8aec __cfltcvt free 15442->15443 15444 57d681a 15443->15444 15445 57cf49d _mbstowcs_s free 15444->15445 15446 57d6826 15445->15446 15446->15415 15448 57d8b81 _mbstowcs_s 15447->15448 15449 57d8b1e 15447->15449 15448->15438 15450 57cf49d _mbstowcs_s free 15449->15450 15455 57d8b51 15449->15455 15452 57d8b2d 15450->15452 15451 57d8b76 free 15451->15448 15454 57cf49d _mbstowcs_s free 15452->15454 15453 57d8aec __cfltcvt free 15453->15455 15456 57d8b36 15454->15456 15455->15448 15455->15451 15455->15453 15457 57cf49d _mbstowcs_s free 15456->15457 15458 57d8b3f 15457->15458 15459 57d8aec __cfltcvt free 15458->15459 15460 57d8b48 15459->15460 15461 57cf49d _mbstowcs_s free 15460->15461 15461->15455 15463 57c9668 15462->15463 15466 57c9685 15462->15466 15464 57c96f3 abort 15463->15464 15465 57c967e 15463->15465 15463->15466 15467 57c968a 15463->15467 15468 57c9693 15463->15468 15472 57caa5b 15465->15472 15466->15361 15484 57cbc6d 15467->15484 15488 57cbac0 15468->15488 15473 57caa97 15472->15473 15474 57caa73 15472->15474 15478 57cab98 2 API calls 15473->15478 15480 57caa8c 15473->15480 15475 57caa7a shutdown 15474->15475 15476 57caa86 15474->15476 15475->15480 15492 57cab98 15476->15492 15481 57caaaa 15478->15481 15479 57cab4a closesocket 15482 57cab57 15479->15482 15480->15479 15480->15482 15481->15480 15483 57caad3 closesocket 15481->15483 15482->15466 15483->15481 15497 57cadd9 15484->15497 15486 57cbc78 closesocket 15487 57cbc89 15486->15487 15487->15466 15489 57cbacf 15488->15489 15491 57cbad4 15488->15491 15499 57cbade 15489->15499 15491->15466 15493 57cabb0 15492->15493 15494 57cabde CancelIo 15493->15494 15495 57cabbb WSAIoctl 15493->15495 15494->15480 15495->15494 15496 57cabd9 15495->15496 15496->15480 15498 57cade3 15497->15498 15498->15486 15500 57cbaf2 15499->15500 15501 57cbb19 15500->15501 15503 57cbb3f 15500->15503 15501->15491 15508 57cbbab 15503->15508 15506 57cb2a0 7 API calls 15507 57cbb80 15506->15507 15507->15501 15509 57c8dfb 5 API calls 15508->15509 15510 57cbb73 15509->15510 15510->15506 16952 57c9659 16953 57c9668 16952->16953 16956 57c9685 16952->16956 16954 57c96f3 abort 16953->16954 16955 57c967e 16953->16955 16953->16956 16957 57c968a 16953->16957 16958 57c9693 16953->16958 16961 57caa5b 5 API calls 16955->16961 16959 57cbc6d closesocket 16957->16959 16960 57cbac0 12 API calls 16958->16960 16959->16956 16960->16956 16961->16956 15113 57c453e 15116 57c4551 15113->15116 15117 57c455b 15116->15117 15120 57c9721 15117->15120 15119 57c454f 15121 57c972d 15120->15121 15122 57c973d 15120->15122 15121->15119 15122->15121 15125 57c9ef3 15122->15125 15126 57c9f20 15125->15126 15127 57c9762 15126->15127 15128 57c9f56 15126->15128 15129 57c9f49 CreateEventA 15126->15129 15127->15119 15131 57c9f64 memset 15128->15131 15129->15128 15132 57c9f91 memset 15131->15132 15134 57c9fdd WSARecv 15132->15134 15135 57c9fd5 15132->15135 15136 57ca01f GetLastError 15134->15136 15137 57c9fff 15134->15137 15135->15134 15136->15137 15138 57ca02c WSAGetLastError 15136->15138 15141 57ca07a RegisterWaitForSingleObject 15137->15141 15142 57ca009 15137->15142 15139 57ca03e WSAGetLastError 15138->15139 15140 57ca036 WSAGetLastError 15138->15140 15139->15142 15140->15142 15141->15142 15142->15127 16816 57c2d39 16817 57c2d48 16816->16817 16821 57c2d71 16817->16821 16832 57c39c1 16817->16832 16818 57c2d6e 16821->16818 16825 57c1a2b 16821->16825 16822 57c2d68 16840 57c2dba 16822->16840 16846 57c1b75 malloc 16825->16846 16827 57c1a43 16848 57c570f malloc 16827->16848 16829 57c1a67 16851 57c1bd9 malloc 16829->16851 16833 57c39e5 __cfltcvt 16832->16833 16834 57c39f1 memset getaddrinfo 16833->16834 16835 57c2d62 16834->16835 16838 57c3a2e __cfltcvt 16834->16838 16835->16821 16835->16822 16836 57c3aa1 FreeAddrInfoW 16836->16835 16837 57c3a57 16837->16836 16838->16836 16838->16837 16839 57c3a8c htons 16838->16839 16839->16836 16845 57c2dd8 16840->16845 16841 57c2e28 16843 57c9659 19 API calls 16841->16843 16844 57c2e47 16841->16844 16842 57c3c47 free 16842->16841 16843->16844 16844->16818 16845->16841 16845->16842 16847 57c1b8f 16846->16847 16847->16827 16849 57c571f memset 16848->16849 16850 57c5741 16848->16850 16849->16850 16850->16829 16852 57c1be9 16851->16852 16855 57c1c20 16852->16855 16860 57c419f 16855->16860 16858 57c1c6a free 16859 57c1a9d 16858->16859 16859->16818 16870 57c4129 malloc 16860->16870 16862 57c41b0 16863 57c41fd __cfltcvt 16862->16863 16864 57c41c1 __cfltcvt 16862->16864 16868 57c1c3a 16862->16868 16876 57cad54 16863->16876 16864->16868 16880 57cad96 16864->16880 16867 57c41f8 16867->16868 16869 57c4263 42 API calls 16867->16869 16868->16858 16868->16859 16869->16868 16871 57c4141 16870->16871 16872 57c4148 free 16871->16872 16873 57c4154 16871->16873 16872->16862 16884 57c4164 malloc memset 16873->16884 16875 57c4160 16875->16862 16877 57cad62 16876->16877 16879 57cad81 16876->16879 16877->16879 16886 57ca0c0 16877->16886 16879->16867 16881 57cadc4 16880->16881 16882 57cada4 16880->16882 16881->16867 16882->16881 16934 57ca223 16882->16934 16885 57c4186 16884->16885 16885->16875 16887 57ca0e1 16886->16887 16892 57ca0d8 16886->16892 16888 57ca0fa 16887->16888 16897 57cacdd 16887->16897 16890 57ca12d memset 16888->16890 16888->16892 16901 57cae30 16888->16901 16893 57ca16c 16890->16893 16892->16879 16893->16892 16895 57ca1be GetLastError 16893->16895 16895->16892 16896 57ca1cb WSAGetLastError 16895->16896 16896->16892 16898 57cace9 16897->16898 16900 57cad04 16897->16900 16898->16900 16904 57c9a41 16898->16904 16900->16888 16932 57cadf8 WSAIoctl 16901->16932 16907 57c9a57 16904->16907 16906 57c9a53 16906->16900 16908 57c9ace bind 16907->16908 16909 57c9a65 socket 16907->16909 16910 57c9ae2 WSAGetLastError 16908->16910 16915 57c9a7f 16908->16915 16911 57c9a8f SetHandleInformation 16909->16911 16912 57c9a79 WSAGetLastError 16909->16912 16910->16915 16913 57c9a9e GetLastError 16911->16913 16914 57c9ab8 16911->16914 16912->16915 16916 57c9aad 16913->16916 16920 57c9b02 ioctlsocket 16914->16920 16915->16906 16919 57c9aaf closesocket 16916->16919 16918 57c9ac7 16918->16908 16918->16919 16919->16915 16921 57c9b3e CreateIoCompletionPort 16920->16921 16922 57c9b28 WSAGetLastError 16920->16922 16923 57c9b5a 16921->16923 16925 57c9b60 16921->16925 16931 57c9b2e 16922->16931 16924 57c9b96 GetLastError 16923->16924 16923->16925 16924->16931 16926 57c9b90 16925->16926 16928 57c9b87 SetFileCompletionNotificationModes 16925->16928 16927 57c9bc3 16926->16927 16929 57c9bfb setsockopt _errno 16926->16929 16926->16931 16930 57c9c32 _errno 16927->16930 16927->16931 16928->16926 16929->16927 16930->16931 16931->16918 16933 57ca11d 16932->16933 16933->16890 16933->16892 16935 57ca244 16934->16935 16940 57ca23b 16934->16940 16936 57ca25e 16935->16936 16945 57cad18 16935->16945 16937 57ca291 memset 16936->16937 16939 57cae30 WSAIoctl 16936->16939 16936->16940 16942 57ca2d0 16937->16942 16941 57ca281 16939->16941 16940->16881 16941->16937 16941->16940 16942->16940 16943 57ca322 GetLastError 16942->16943 16943->16940 16944 57ca32f WSAGetLastError 16943->16944 16944->16940 16946 57cad24 16945->16946 16948 57cad40 16945->16948 16946->16948 16949 57c9c8c 16946->16949 16948->16936 16950 57c9a57 15 API calls 16949->16950 16951 57c9c9e 16950->16951 16951->16948 16813 57c44f8 16814 57c43a6 7 API calls 16813->16814 16815 57c4515 16814->16815 16962 57c8dfb 16963 57c8e04 16962->16963 16964 57c8e0e 16962->16964 16965 57c8e11 5 API calls 16963->16965 16965->16964 15074 57c8aad SetErrorMode 15075 57c8abd 15074->15075 15076 57cae89 WSAStartup 15075->15076 15091 57cac49 memset htons inet_addr 15076->15091 15078 57caeb8 15092 57cac90 memset htons 15078->15092 15081 57caf39 WSAGetLastError 15085 57caf45 15081->15085 15082 57caf01 getsockopt 15083 57caf26 15082->15083 15084 57caf30 closesocket 15082->15084 15083->15084 15086 57caf46 socket 15084->15086 15085->15086 15087 57caf8b WSAGetLastError 15086->15087 15088 57caf57 closesocket 15086->15088 15089 57caf97 15087->15089 15088->15089 15091->15078 15095 57cc4f1 15092->15095 15094 57cacc9 socket 15094->15081 15094->15082 15096 57cc51a 15095->15096 15097 57cc4fb 15095->15097 15109 57cc529 15096->15109 15099 57cc500 15097->15099 15102 57cc5f6 memset 15097->15102 15099->15094 15101 57cc518 15101->15094 15105 57cc61f 15102->15105 15103 57cc646 strchr 15104 57cc65c strchr 15103->15104 15103->15105 15104->15105 15105->15103 15106 57cc747 15105->15106 15108 57cc6e7 __cfltcvt 15105->15108 15107 57cc529 strchr 15106->15107 15106->15108 15107->15108 15108->15101 15111 57cc54e 15109->15111 15112 57cc5c2 __cfltcvt 15109->15112 15110 57cc553 strchr 15110->15111 15111->15110 15111->15112 15112->15101 18728 57dd49e 18731 57d2762 18728->18731 18732 57d2769 free 18731->18732 15143 57c2b8f calloc 15144 57c2d2c 15143->15144 15145 57c2bb3 memset time srand calloc 15143->15145 15147 57c2d01 free 15145->15147 15149 57c2c19 15145->15149 15147->15144 15161 57c48ba 15149->15161 15151 57c2c3c strlen 15166 57c55e8 15151->15166 15153 57c2c52 15160 57c2ce1 15153->15160 15171 57c8ac2 15153->15171 15156 57c2ced 15157 57c2cf5 free 15156->15157 15157->15147 15158 57c2c62 15174 57c8b5e 15158->15174 15182 57c3c47 15160->15182 15186 57cf11a memset 15161->15186 15163 57c48d8 15187 57cf12e 15163->15187 15165 57c48e4 15165->15151 15167 57c55fe 15166->15167 15168 57c55f7 strlen 15166->15168 15191 57c5640 15167->15191 15168->15167 15170 57c560c 15170->15153 15196 57c8dfb 15171->15196 15178 57c8b69 15174->15178 15175 57c8b6e 15175->15160 15177 57c8b9e 15177->15175 15177->15178 15217 57c8c19 15177->15217 15221 57c8d93 15177->15221 15178->15175 15178->15177 15205 57c8ca1 15178->15205 15215 57c8e62 GetTickCount 15178->15215 15183 57c3c67 15182->15183 15184 57c3c54 15182->15184 15183->15156 15184->15183 15341 57c3bd5 15184->15341 15186->15163 15188 57cf13e 15187->15188 15189 57cf166 memset memset 15188->15189 15190 57cf1b7 15189->15190 15190->15165 15192 57c5674 15191->15192 15193 57c5651 memcmp 15191->15193 15194 57c5665 15192->15194 15195 57c5679 memcmp 15192->15195 15193->15192 15193->15194 15194->15170 15195->15194 15197 57c8e04 15196->15197 15198 57c8ad1 15196->15198 15200 57c8e11 CreateEventA InterlockedCompareExchange 15197->15200 15198->15158 15201 57c8e4c CloseHandle WaitForSingleObject 15200->15201 15202 57c8e3d SetEvent 15200->15202 15203 57c8e5e 15201->15203 15202->15203 15203->15198 15206 57c8d67 15205->15206 15207 57c8cb3 15205->15207 15206->15177 15207->15206 15209 57c8d02 15207->15209 15228 57ca983 15207->15228 15233 57ca53b 15207->15233 15246 57ca894 15207->15246 15253 57cbecb 15207->15253 15260 57cb89d 15207->15260 15209->15207 15240 57ca7b9 15209->15240 15216 57c8e71 15215->15216 15216->15178 15218 57c8c1e 15217->15218 15219 57c8c77 15218->15219 15320 57c984b 15218->15320 15219->15177 15222 57c8da9 GetQueuedCompletionStatus 15221->15222 15223 57c8da2 15221->15223 15225 57c8dd4 GetLastError 15222->15225 15227 57c8dc6 15222->15227 15337 57c9540 15223->15337 15225->15227 15227->15177 15229 57ca991 15228->15229 15230 57ca9c6 setsockopt 15229->15230 15232 57ca9e1 15229->15232 15231 57ca9ff WSAGetLastError 15230->15231 15230->15232 15231->15232 15232->15207 15238 57ca55b 15233->15238 15239 57ca5ea 15233->15239 15234 57ca628 WSARecv 15235 57ca6f2 WSAGetLastError 15234->15235 15234->15239 15237 57ca671 15235->15237 15236 57c9f64 8 API calls 15236->15238 15237->15236 15237->15238 15238->15207 15239->15234 15239->15237 15241 57ca7cf 15240->15241 15242 57ca80f 15241->15242 15243 57ca808 UnregisterWait 15241->15243 15245 57ca81d 15241->15245 15244 57ca816 CloseHandle 15242->15244 15242->15245 15243->15242 15244->15245 15245->15209 15247 57ca8f9 15246->15247 15252 57ca8a7 15246->15252 15248 57ca940 closesocket 15247->15248 15249 57ca903 setsockopt 15247->15249 15250 57ca953 15248->15250 15248->15252 15249->15248 15249->15252 15266 57c9ca2 socket 15250->15266 15252->15207 15254 57cbeea 15253->15254 15255 57cbfa0 memset WSARecvFrom 15254->15255 15259 57cbf06 15254->15259 15257 57cbff6 WSAGetLastError 15255->15257 15255->15259 15257->15259 15258 57cc08f 15258->15207 15259->15258 15282 57cbcf1 memset 15259->15282 15261 57cb8b7 15260->15261 15262 57cb8b0 15260->15262 15297 57cb9e5 15261->15297 15293 57cb8c1 15262->15293 15265 57cb8b5 15265->15207 15267 57c9cdc 15266->15267 15268 57c9d04 SetHandleInformation 15266->15268 15267->15252 15269 57c9d4f memset 15268->15269 15270 57c9d13 15268->15270 15271 57c9d6c 15269->15271 15279 57c9d3e closesocket 15270->15279 15272 57c9dbb GetLastError 15271->15272 15274 57c9d9c 15271->15274 15273 57c9dc8 WSAGetLastError 15272->15273 15272->15274 15275 57c9dda WSAGetLastError 15273->15275 15276 57c9dd2 WSAGetLastError 15273->15276 15274->15267 15278 57c9e38 RegisterWaitForSingleObject 15274->15278 15277 57c9dea 15275->15277 15276->15277 15280 57c9df6 closesocket 15277->15280 15278->15267 15279->15267 15280->15267 15281 57c9e09 CloseHandle 15280->15281 15281->15267 15283 57cbdee 15282->15283 15284 57cbd22 memset 15282->15284 15286 57cbe43 GetLastError 15283->15286 15292 57cbd84 15283->15292 15288 57cbd80 15284->15288 15287 57cbe50 WSAGetLastError 15286->15287 15286->15292 15289 57cbe5a WSAGetLastError 15287->15289 15290 57cbe62 WSAGetLastError 15287->15290 15291 57cbdb6 GetLastError 15288->15291 15288->15292 15289->15292 15290->15292 15291->15292 15292->15258 15295 57cb8d6 15293->15295 15294 57cb9bb 15294->15265 15295->15294 15301 57cb629 15295->15301 15298 57cb9fa 15297->15298 15299 57cba96 15298->15299 15316 57cb721 15298->15316 15299->15265 15302 57cb642 memset 15301->15302 15306 57cb2a0 15302->15306 15305 57cb6e5 15305->15294 15307 57cb2c0 CreateEventA 15306->15307 15308 57cb2b1 15306->15308 15307->15308 15309 57cb329 15307->15309 15310 57cb305 WaitForSingleObject 15308->15310 15311 57cb331 CloseHandle 15308->15311 15315 57cb338 15308->15315 15309->15305 15313 57cb32e 15310->15313 15314 57cb313 GetLastError CloseHandle WSASetLastError 15310->15314 15311->15315 15312 57cb354 WSASetLastError 15312->15309 15313->15311 15314->15309 15315->15312 15317 57cb737 QueueUserWorkItem 15316->15317 15319 57cb792 15317->15319 15319->15299 15321 57c9864 15320->15321 15323 57c992f 15320->15323 15322 57c9878 15321->15322 15321->15323 15324 57c98c2 shutdown 15322->15324 15328 57c98b5 15322->15328 15325 57c994b closesocket 15323->15325 15323->15328 15329 57c9957 15323->15329 15326 57c98d8 WSAGetLastError 15324->15326 15324->15328 15325->15329 15326->15328 15327 57c99dd 15327->15328 15331 57c99fe 15327->15331 15332 57c99f3 UnregisterWait 15327->15332 15328->15218 15329->15327 15330 57c99d0 free 15329->15330 15334 57c9992 UnregisterWait 15329->15334 15335 57c99ac CloseHandle 15329->15335 15336 57c99ce 15329->15336 15330->15327 15331->15328 15333 57c9a05 CloseHandle 15331->15333 15332->15331 15333->15328 15334->15329 15335->15329 15336->15330 15338 57c9551 15337->15338 15339 57c8e62 GetTickCount 15338->15339 15340 57c8da8 15338->15340 15339->15340 15340->15222 15342 57c3bdf free 15341->15342 15343 57c3bea 15341->15343 15342->15343 15343->15183 15511 57c1c8f 15512 57c1cb8 15511->15512 15513 57c1ca0 15511->15513 15515 57c1cd9 15512->15515 15516 57c1cc2 15512->15516 15529 57c4263 15513->15529 15519 57c1c6a free 15515->15519 15524 57c46ed malloc memset 15516->15524 15522 57c1cb3 15519->15522 15521 57c1ccd 15537 57c4829 15521->15537 15545 57ce798 memset 15524->15545 15526 57c4717 15546 57ce7ac calloc 15526->15546 15528 57c474a 15528->15521 15530 57c4277 15529->15530 15531 57c4270 15529->15531 15594 57c4344 15530->15594 15586 57c427f 15531->15586 15534 57c1ca6 15535 57c1c6a free 15534->15535 15536 57c1c88 15535->15536 15536->15522 15711 57cebdf 15537->15711 15540 57c4894 15718 57c453e 15540->15718 15541 57c483f 15544 57c4845 15541->15544 15715 57c44f8 15541->15715 15544->15522 15545->15526 15547 57ce7da 15546->15547 15549 57ce7ef 15546->15549 15547->15549 15550 57ce866 15547->15550 15549->15528 15551 57ce87c 15550->15551 15552 57ce876 15550->15552 15554 57cef8e 2 API calls 15551->15554 15555 57ce896 15551->15555 15553 57cef4e free 15552->15553 15553->15551 15554->15555 15556 57ce8ff 15555->15556 15562 57ce700 memset 15555->15562 15556->15549 15558 57ce8ef 15563 57ce9d5 memset 15558->15563 15562->15558 15579 57d1a49 memset 15563->15579 15565 57ce9f0 15580 57d1a49 memset 15565->15580 15567 57ce9fc 15581 57d2416 memset 15567->15581 15569 57cea05 15582 57d2416 memset 15569->15582 15571 57ce8f7 15572 57ce92e memset 15571->15572 15583 57d27ab memset 15572->15583 15574 57ce94d 15584 57d3799 memset 15574->15584 15576 57ce961 15585 57d6a51 memset 15576->15585 15578 57ce984 15578->15556 15579->15565 15580->15567 15581->15569 15582->15571 15583->15574 15584->15576 15585->15578 15587 57c428c 15586->15587 15588 57c429a 15587->15588 15589 57c42f5 8 API calls 15587->15589 15590 57c3c47 free 15588->15590 15589->15588 15591 57c42a8 15590->15591 15592 57c42c2 19 API calls 15591->15592 15593 57c42b4 15592->15593 15593->15534 15595 57c4357 15594->15595 15596 57c4352 15594->15596 15597 57c427f 27 API calls 15595->15597 15596->15595 15603 57cef10 15596->15603 15602 57c4361 15597->15602 15599 57c436e 15599->15595 15600 57c437f 15599->15600 15607 57c43a6 15600->15607 15602->15534 15604 57cef26 15603->15604 15605 57cef18 15603->15605 15604->15599 15605->15604 15611 57cdd9a 15605->15611 15608 57c43be 15607->15608 15608->15608 15698 57c979b 15608->15698 15610 57c4405 15610->15602 15612 57cdda2 15611->15612 15613 57cdde3 15611->15613 15612->15613 15616 57ccfbf 15612->15616 15613->15604 15615 57cdddf 15615->15604 15617 57ccffa __cfltcvt 15616->15617 15618 57cd033 15617->15618 15620 57cd09f 15617->15620 15618->15615 15623 57cd0ba __cfltcvt 15620->15623 15626 57cd26a __cfltcvt 15620->15626 15622 57cd1ad __cfltcvt 15622->15626 15627 57d225c 15622->15627 15623->15622 15624 57cd33a __cfltcvt 15623->15624 15623->15626 15624->15624 15624->15626 15631 57d22be 15624->15631 15626->15618 15628 57d2270 15627->15628 15630 57d2295 15628->15630 15639 57d1bb2 15628->15639 15630->15626 15632 57d22fc 15631->15632 15633 57d22cc 15631->15633 15634 57d2337 15632->15634 15664 57dc303 15632->15664 15657 57dccd7 15633->15657 15634->15626 15640 57d1bc4 15639->15640 15645 57d1bda __cfltcvt 15639->15645 15641 57d1c1a 15640->15641 15642 57d1c30 15640->15642 15640->15645 15646 57dca22 15641->15646 15642->15645 15650 57dc096 15642->15650 15645->15630 15649 57dca3a 15646->15649 15647 57dcb56 15647->15645 15648 57d1bb2 memset 15648->15649 15649->15647 15649->15648 15651 57dc0ac 15650->15651 15653 57dc0b0 15651->15653 15654 57dc13e 15651->15654 15653->15645 15655 57dc158 memset 15654->15655 15656 57dc154 15654->15656 15655->15656 15656->15653 15667 57dc641 15657->15667 15659 57dccf1 15660 57dca22 memset 15659->15660 15663 57d22f7 15659->15663 15661 57dcd09 15660->15661 15661->15663 15674 57dcb62 15661->15674 15663->15626 15678 57dc32a 15664->15678 15668 57dc659 15667->15668 15673 57dc783 15667->15673 15669 57dc67a memset memset 15668->15669 15668->15673 15670 57dc6e1 memset 15669->15670 15671 57dc6c8 __cfltcvt 15669->15671 15670->15671 15672 57d1bb2 memset 15671->15672 15672->15673 15673->15659 15675 57dcb83 __cfltcvt 15674->15675 15676 57dcbe0 memset 15675->15676 15677 57dcc1b 15675->15677 15676->15677 15677->15663 15685 57dbfc3 15678->15685 15680 57dc33d 15681 57dc096 memset 15680->15681 15684 57d2332 15680->15684 15682 57dc366 15681->15682 15682->15684 15689 57dc182 15682->15689 15684->15626 15686 57dbfdb 15685->15686 15687 57dc000 _mbstowcs_s 15686->15687 15688 57dbfe4 memset 15686->15688 15687->15680 15688->15687 15690 57dc19e 15689->15690 15691 57dc196 15689->15691 15692 57dc1ab 15690->15692 15693 57dc1a3 15690->15693 15691->15684 15695 57dc2bf memset 15692->15695 15696 57dc1a9 15692->15696 15694 57dc13e memset 15693->15694 15694->15696 15695->15696 15696->15691 15697 57e3f42 memset 15696->15697 15697->15691 15699 57c97b9 15698->15699 15700 57c97aa 15698->15700 15699->15700 15703 57ca387 memset memset 15699->15703 15700->15610 15702 57c97df 15702->15610 15704 57ca3de WSASend 15703->15704 15705 57ca3c8 CreateEventA 15703->15705 15706 57ca44a GetLastError 15704->15706 15707 57ca3fb 15704->15707 15705->15704 15706->15707 15708 57ca457 WSAGetLastError 15706->15708 15709 57ca4d2 RegisterWaitForSingleObject 15707->15709 15710 57ca401 15707->15710 15708->15710 15709->15710 15710->15702 15713 57cebea 15711->15713 15714 57c4837 15711->15714 15713->15714 15721 57cebb5 15713->15721 15714->15540 15714->15541 15716 57c43a6 7 API calls 15715->15716 15717 57c4515 15716->15717 15717->15544 15719 57c4551 9 API calls 15718->15719 15720 57c454f 15719->15720 15720->15544 15722 57cebd9 15721->15722 15723 57cebc2 15721->15723 15722->15713 15723->15722 15726 57d6f5f 15723->15726 15727 57cebd7 15726->15727 15728 57d6f6f 15726->15728 15727->15713 15728->15727 15729 57d6fbf 15728->15729 15730 57d6fdf 15728->15730 15731 57d6fff 15728->15731 15732 57d701f 15728->15732 15733 57d703b 15728->15733 15734 57d6fd7 15728->15734 15735 57d6ff7 15728->15735 15736 57d7017 15728->15736 15737 57d6fcf 15728->15737 15738 57d6fef 15728->15738 15739 57d700f 15728->15739 15740 57d6fc7 15728->15740 15741 57d6fe7 15728->15741 15742 57d7007 15728->15742 15743 57d7027 15728->15743 15759 57d7096 15729->15759 15831 57d834b 15730->15831 15861 57d86f4 15731->15861 15887 57ce2c9 15732->15887 15904 57ce4b2 15733->15904 15809 57d7fbc 15734->15809 15849 57d8469 15735->15849 15874 57d889c 15736->15874 15797 57cdf08 15737->15797 15845 57cdde9 15738->15845 15869 57ce568 15739->15869 15769 57d791e 15740->15769 15840 57d841d 15741->15840 15866 57ce29d 15742->15866 15895 57ce62b 15743->15895 15760 57d70ae 15759->15760 15761 57d70b8 15759->15761 15760->15727 15761->15760 15910 57d78ba time 15761->15910 15764 57d7117 __cfltcvt 15764->15760 15912 57d736b 15764->15912 15765 57d726a 15915 57d77f0 15765->15915 15767 57d7318 15921 57ccf2a 15767->15921 15925 57cd510 15769->15925 15771 57d793b 15772 57d794b 15771->15772 15777 57d798a 15771->15777 15794 57d7950 15771->15794 15773 57cdd9a 8 API calls 15772->15773 15772->15794 15773->15794 15774 57cdd9a 8 API calls 15774->15794 15775 57d7d07 15776 57cdd9a 8 API calls 15775->15776 15776->15794 15777->15775 15778 57d7a05 __cfltcvt 15777->15778 15787 57d7a50 15777->15787 15780 57d7a89 15778->15780 15781 57d7b13 time 15778->15781 15783 57d7ae6 memcmp 15778->15783 15778->15787 15779 57cdd9a 8 API calls 15779->15794 15780->15779 15782 57d7b08 __cfltcvt 15781->15782 15782->15780 15786 57d7b8b 15782->15786 15783->15781 15784 57d7afb 15783->15784 15932 57cc78d 15784->15932 15786->15787 15786->15794 15946 57d7f2c 15786->15946 15953 57d7ed5 15786->15953 15958 57d7deb 15786->15958 15963 57d7dae 15786->15963 15968 57d7e21 15786->15968 15973 57d7d1e 15786->15973 15977 57d7e9c 15786->15977 15982 57d7e5d 15786->15982 15787->15774 15787->15794 15794->15727 15798 57cdf39 15797->15798 15807 57cdf73 15797->15807 15799 57cd510 9 API calls 15798->15799 15798->15807 15800 57cdf5c 15799->15800 15800->15807 16031 57ce0e5 15800->16031 15804 57cdfc7 16056 57cf2fe 15804->16056 15806 57cdd9a 8 API calls 15806->15807 15807->15727 15810 57d7fde 15809->15810 15822 57d8022 15809->15822 15811 57d81bc 15810->15811 15812 57d7ff0 15810->15812 16284 57d82d8 15811->16284 15814 57cd510 9 API calls 15812->15814 15815 57d7ff7 15814->15815 15818 57d803c 15815->15818 15819 57d800b 15815->15819 15815->15822 15816 57d8137 __cfltcvt 15817 57cdd9a 8 API calls 15816->15817 15816->15822 15817->15822 15821 57d8077 15818->15821 15823 57d8057 15818->15823 15820 57cdd9a 8 API calls 15819->15820 15819->15822 15820->15822 16271 57d81d1 15821->16271 15822->15727 15823->15822 16268 57d820a 15823->16268 15826 57d8089 15827 57cdd9a 8 API calls 15826->15827 15827->15822 15828 57d8075 15828->15822 15828->15826 15829 57d8118 15828->15829 15829->15822 16274 57cf3d3 15829->16274 15832 57d835d 15831->15832 15833 57d836c 15831->15833 15832->15833 15834 57cd510 9 API calls 15832->15834 15833->15727 15835 57d837e 15834->15835 15835->15833 15836 57d838a 15835->15836 15838 57d839e 15835->15838 15837 57cdd9a 8 API calls 15836->15837 15837->15833 15838->15833 15839 57cdd9a 8 API calls 15838->15839 15839->15833 15841 57cd510 9 API calls 15840->15841 15843 57d842a 15841->15843 15842 57d8436 15842->15727 15843->15842 15844 57cdd9a 8 API calls 15843->15844 15844->15842 15846 57cde03 __cfltcvt 15845->15846 15847 57cdea8 15845->15847 15846->15847 15848 57ccf2a 8 API calls 15846->15848 15847->15727 15848->15847 15850 57d8482 __cfltcvt 15849->15850 15853 57d850b 15849->15853 16418 57d6ba0 15850->16418 15859 57d8506 15853->15859 16453 57d6949 15853->16453 15855 57d853a 15855->15727 15859->15855 15860 57ccf2a 8 API calls 15859->15860 15860->15855 15862 57cc78d 4 API calls 15861->15862 15864 57d870e 15862->15864 15863 57d876d 15863->15727 15864->15863 15865 57ccf2a 8 API calls 15864->15865 15865->15863 15867 57ccf2a 8 API calls 15866->15867 15868 57ce2c7 15867->15868 15868->15727 15871 57ce577 __cfltcvt 15869->15871 15870 57ce603 memset 15872 57ccf2a 8 API calls 15870->15872 15871->15870 15873 57ce625 15872->15873 15873->15727 15875 57cd510 9 API calls 15874->15875 15876 57d88ae 15875->15876 15877 57d88be 15876->15877 15878 57d88d5 15876->15878 15886 57d88c8 __cfltcvt 15876->15886 15879 57cdd9a 8 API calls 15877->15879 15880 57d89b5 15878->15880 15882 57d8920 _mbstowcs_s 15878->15882 15879->15886 15881 57cdd9a 8 API calls 15880->15881 15881->15886 15883 57d8943 free calloc 15882->15883 15882->15886 15884 57d8970 15883->15884 15883->15886 15885 57cdd9a 8 API calls 15884->15885 15885->15886 15886->15727 15888 57cd510 9 API calls 15887->15888 15889 57ce2d6 15888->15889 15890 57ce317 15889->15890 15891 57ce2f6 memset 15889->15891 15892 57ce2e2 15889->15892 15890->15727 15891->15890 15893 57cdd9a 8 API calls 15892->15893 15894 57ce2ec 15893->15894 15894->15727 15896 57ce651 15895->15896 15897 57cd510 9 API calls 15896->15897 15898 57ce659 15897->15898 15899 57ce66a 15898->15899 15901 57ce67e 15898->15901 15903 57ce674 __cfltcvt 15898->15903 15900 57cdd9a 8 API calls 15899->15900 15900->15903 15902 57cdd9a 8 API calls 15901->15902 15901->15903 15902->15903 15903->15727 15905 57ce4c7 15904->15905 15906 57ce4f5 15905->15906 15907 57ce4ea free 15905->15907 16808 57ce52a 15906->16808 15907->15906 15911 57d78f7 15910->15911 15911->15764 15913 57d738f strlen 15912->15913 15914 57d739e __cfltcvt 15912->15914 15913->15914 15914->15765 15916 57d781c 15915->15916 15917 57d788b 15915->15917 15918 57d7822 strlen 15916->15918 15920 57d783b __cfltcvt 15916->15920 15917->15767 15918->15916 15919 57d7865 strlen 15919->15920 15920->15917 15920->15919 15923 57ccf4d 15921->15923 15922 57ccf52 15922->15760 15923->15922 15924 57ccfbf 8 API calls 15923->15924 15924->15922 15926 57cd51f 15925->15926 15931 57cd566 15925->15931 15987 57cd58e 15926->15987 15928 57cd525 15930 57cd58e memmove 15928->15930 15928->15931 15991 57cd5f1 15928->15991 15930->15928 15931->15771 15933 57cc7b2 __cfltcvt _mbstowcs_s 15932->15933 15937 57cc99a __cfltcvt 15933->15937 15945 57cc7cc _mbstowcs_s 15933->15945 16020 57d246f 15933->16020 15936 57d246f calloc 15936->15937 15938 57ccae6 15937->15938 15937->15945 16024 57d2546 15937->16024 16028 57d1a80 15938->16028 15941 57ccaf3 15944 57d1a80 memset 15941->15944 15941->15945 15942 57ccad9 15943 57d2546 2 API calls 15942->15943 15943->15938 15944->15945 15945->15782 15948 57d7f42 15946->15948 15951 57d7f3e 15946->15951 15947 57cdd9a 8 API calls 15949 57d7f94 15947->15949 15950 57d7f71 strlen 15948->15950 15948->15951 15949->15786 15950->15948 15952 57d7f7c memcmp 15950->15952 15951->15947 15952->15948 15952->15949 15954 57d7ede 15953->15954 15955 57cdd9a 8 API calls 15954->15955 15956 57d7eff 15954->15956 15957 57d7f22 15955->15957 15956->15786 15957->15786 15959 57d7dfa 15958->15959 15960 57cdd9a 8 API calls 15959->15960 15961 57d7e01 15959->15961 15962 57d7e18 15960->15962 15961->15786 15962->15786 15964 57d7dc0 15963->15964 15965 57cdd9a 8 API calls 15964->15965 15966 57d7dd5 15964->15966 15967 57d7de2 15965->15967 15966->15786 15967->15786 15969 57d7e30 15968->15969 15970 57cdd9a 8 API calls 15969->15970 15971 57d7e3d 15969->15971 15972 57d7e54 15970->15972 15971->15786 15972->15786 15975 57d7d2c 15973->15975 15974 57cdd9a 8 API calls 15976 57d7d88 15974->15976 15975->15974 15975->15976 15976->15786 15978 57d7eab 15977->15978 15979 57d7eb2 15978->15979 15980 57cdd9a 8 API calls 15978->15980 15979->15786 15981 57d7ecc 15980->15981 15981->15786 15983 57d7e6c 15982->15983 15984 57cdd9a 8 API calls 15983->15984 15985 57d7e79 15983->15985 15986 57d7e93 15984->15986 15985->15786 15986->15786 15988 57cd5a0 15987->15988 15989 57cd5a5 15987->15989 15988->15989 15990 57cd5b3 memmove 15988->15990 15989->15928 15990->15989 15992 57cd5ff 15991->15992 15993 57cd645 15992->15993 15999 57cd651 15992->15999 15993->15928 15995 57cd60b 15995->15993 16003 57cd713 15995->16003 15998 57cdd9a 8 API calls 15998->15993 16000 57cd68c 15999->16000 16001 57cd6b0 16000->16001 16002 57cdd9a 8 API calls 16000->16002 16001->15995 16002->16001 16004 57cd71e 16003->16004 16006 57cd62c 16003->16006 16007 57cd73d 16004->16007 16006->15993 16006->15998 16008 57cd75f 16007->16008 16013 57cd8ed 16007->16013 16010 57cda31 __cfltcvt 16008->16010 16012 57cd7a2 __cfltcvt 16008->16012 16008->16013 16009 57d225c memset 16009->16013 16010->16010 16010->16013 16014 57d2345 16010->16014 16012->16009 16012->16013 16013->16006 16015 57d2384 16014->16015 16016 57d2353 16014->16016 16018 57d237c 16015->16018 16019 57dc37b memset memset memset memset 16015->16019 16017 57dcd23 memset memset memset memset memset 16016->16017 16017->16018 16018->16013 16019->16018 16021 57d2479 16020->16021 16023 57cc981 16020->16023 16022 57d2492 calloc 16021->16022 16021->16023 16022->16023 16023->15936 16023->15945 16026 57d25ea _mbstowcs_s 16024->16026 16027 57d2558 16024->16027 16025 57d25c2 memset memset 16025->16026 16026->15942 16027->16025 16027->16026 16029 57d1a8a 16028->16029 16030 57d1a91 memset 16028->16030 16029->15941 16030->16029 16032 57ce0f4 16031->16032 16035 57ce10b 16031->16035 16033 57cdd9a 8 API calls 16032->16033 16042 57cdf6c 16033->16042 16034 57cdd9a 8 API calls 16034->16042 16036 57ce161 calloc 16035->16036 16039 57ce153 free 16035->16039 16043 57ce25c 16035->16043 16037 57ce197 16036->16037 16038 57ce180 16036->16038 16060 57d6528 memset 16037->16060 16040 57cdd9a 8 API calls 16038->16040 16039->16036 16040->16042 16042->15807 16050 57d5c07 16042->16050 16043->16034 16044 57ce220 16044->16042 16044->16043 16045 57ce249 memcmp 16044->16045 16045->16042 16045->16043 16047 57ce19d 16047->16043 16047->16044 16048 57ce260 16047->16048 16061 57d5135 16047->16061 16049 57cdd9a 8 API calls 16048->16049 16049->16042 16053 57d5c22 16050->16053 16051 57d5c2a 16051->15804 16052 57d5c4a 16168 57d5d7f 16052->16168 16053->16051 16053->16052 16161 57d63b1 strlen 16053->16161 16057 57cf30d 16056->16057 16263 57d5b4c 16057->16263 16060->16047 16062 57d518e 16061->16062 16065 57d514a 16061->16065 16062->16047 16063 57d519d 16072 57d51e4 memset memset memset 16063->16072 16065->16062 16065->16063 16067 57d5175 calloc 16065->16067 16066 57d51b0 16066->16062 16069 57d51c9 free 16066->16069 16067->16062 16068 57d5195 16067->16068 16071 57d6528 memset 16068->16071 16069->16062 16071->16063 16073 57d5221 _mbstowcs_s 16072->16073 16085 57d524f 16072->16085 16074 57d5269 calloc 16073->16074 16073->16085 16075 57d528f __cfltcvt _mbstowcs_s 16074->16075 16074->16085 16075->16085 16086 57df918 16075->16086 16077 57d5368 _mbstowcs_s 16077->16085 16096 57dfb7b 16077->16096 16079 57d54d2 16082 57d550a memcmp 16079->16082 16079->16085 16080 57d5463 16080->16079 16080->16085 16107 57d5697 16080->16107 16083 57d551d 16082->16083 16082->16085 16084 57d5529 memcmp 16083->16084 16083->16085 16084->16085 16085->16066 16087 57df92d 16086->16087 16094 57df926 16086->16094 16113 57e070d 16087->16113 16090 57df94f calloc 16091 57df968 16090->16091 16090->16094 16116 57df254 16091->16116 16093 57df978 16093->16094 16095 57df981 free 16093->16095 16094->16077 16095->16094 16097 57dfb9a _mbstowcs_s 16096->16097 16106 57dfba1 16097->16106 16126 57e01f5 memset 16097->16126 16099 57dfbbf 16100 57dfc37 16099->16100 16101 57dfc26 16099->16101 16099->16106 16100->16106 16138 57dfc99 16100->16138 16130 57e011d 16101->16130 16106->16080 16108 57d56aa 16107->16108 16110 57d56b1 _mbstowcs_s 16107->16110 16108->16079 16110->16108 16151 57e0655 16110->16151 16154 57d59dd 16110->16154 16157 57d5a13 16110->16157 16114 57e06c0 memcmp 16113->16114 16115 57df93c 16114->16115 16115->16090 16115->16094 16117 57df285 _mbstowcs_s 16116->16117 16125 57df27b _mbstowcs_s 16116->16125 16118 57df20e memset 16117->16118 16120 57df2e1 _mbstowcs_s 16117->16120 16117->16125 16119 57df2cc 16118->16119 16121 57e080a memcmp 16119->16121 16119->16125 16122 57df350 memcmp 16120->16122 16120->16125 16121->16120 16123 57df370 16122->16123 16122->16125 16124 57df466 memcmp 16123->16124 16124->16125 16125->16093 16127 57e021a 16126->16127 16128 57e0734 memcmp 16127->16128 16129 57e0221 16127->16129 16128->16129 16129->16099 16131 57e0136 _mbstowcs_s 16130->16131 16132 57dd4b7 free calloc free memset 16131->16132 16137 57e0148 16131->16137 16133 57e017b _mbstowcs_s 16132->16133 16134 57dd4b7 free calloc free memset 16133->16134 16133->16137 16135 57e01b7 16134->16135 16136 57dd578 7 API calls 16135->16136 16135->16137 16136->16137 16137->16106 16139 57dfca9 16138->16139 16140 57dfcbb 16138->16140 16141 57e079f memcmp 16139->16141 16142 57dfce8 8 API calls 16140->16142 16143 57dfcae 16141->16143 16142->16143 16144 57dfc5d 16143->16144 16145 57e08ac 7 API calls 16143->16145 16144->16106 16146 57e00e1 16144->16146 16145->16144 16147 57d8d1d free calloc free memset 16146->16147 16148 57e0103 16147->16148 16149 57e0111 16148->16149 16150 57db0e4 __cfltcvt 5 API calls 16148->16150 16149->16106 16150->16149 16152 57e0673 memcmp 16151->16152 16153 57e065e 16152->16153 16153->16110 16155 57e04c6 calloc 16154->16155 16156 57d59f2 16155->16156 16156->16110 16159 57d5a2e _mbstowcs_s 16157->16159 16158 57d5a35 16158->16110 16159->16158 16160 57d5a9c calloc 16159->16160 16160->16158 16160->16159 16162 57d63cd 16161->16162 16163 57d63f1 16161->16163 16167 57d63ef 16162->16167 16177 57d643d 16162->16177 16165 57d63fe memcmp 16163->16165 16166 57d643d strlen 16163->16166 16163->16167 16165->16163 16166->16163 16167->16052 16175 57d5d99 16168->16175 16171 57d5ec8 16171->16051 16175->16171 16184 57dfa1a 16175->16184 16187 57dfb52 16175->16187 16190 57d6363 16175->16190 16195 57d6171 16175->16195 16199 57d5efc 16175->16199 16204 57d600f 16175->16204 16178 57d644b 16177->16178 16181 57d645f 16178->16181 16182 57d6473 strlen 16178->16182 16180 57d646b 16180->16162 16181->16162 16183 57d648c 16182->16183 16183->16180 16212 57dfa43 time 16184->16212 16186 57dfa29 16186->16175 16188 57dfa43 2 API calls 16187->16188 16189 57dfb61 16188->16189 16189->16175 16191 57d5efc 2 API calls 16190->16191 16193 57d6376 16191->16193 16192 57d63a7 16192->16175 16193->16192 16194 57d638c memcmp 16193->16194 16194->16192 16194->16193 16196 57d6185 16195->16196 16198 57d61bf 16196->16198 16217 57d61d1 16196->16217 16198->16175 16202 57d5f06 16199->16202 16200 57d5f52 16200->16175 16201 57d5f1c memcmp 16201->16200 16201->16202 16202->16200 16202->16201 16231 57d5f60 16202->16231 16205 57d6021 16204->16205 16206 57d6028 __cfltcvt 16204->16206 16205->16175 16206->16205 16207 57d5efc 2 API calls 16206->16207 16209 57dfa1a 2 API calls 16206->16209 16210 57dfb52 2 API calls 16206->16210 16235 57d4fab 16206->16235 16239 57d5bb3 16206->16239 16207->16206 16209->16206 16210->16206 16215 57d277e gmtime 16212->16215 16214 57dfa63 16214->16186 16216 57d2790 __cfltcvt 16215->16216 16216->16214 16221 57d61ef 16217->16221 16223 57d626f 16217->16223 16220 57dfa1a 2 API calls 16220->16221 16221->16220 16222 57dfb52 2 API calls 16221->16222 16221->16223 16224 57d631b 16221->16224 16227 57d6290 16221->16227 16222->16221 16223->16196 16225 57d5efc memcmp memcmp 16224->16225 16226 57d6331 16225->16226 16226->16221 16229 57d62a7 __cfltcvt 16227->16229 16228 57d62db 16228->16221 16229->16228 16230 57d4fab 15 API calls 16229->16230 16230->16228 16232 57d5f70 16231->16232 16234 57d5f8b 16231->16234 16233 57d5f78 memcmp 16232->16233 16232->16234 16233->16234 16234->16202 16236 57d4fcf __cfltcvt 16235->16236 16237 57d4fc0 16235->16237 16236->16206 16237->16236 16244 57ded3d 16237->16244 16240 57d5bc3 16239->16240 16243 57d5bfd 16239->16243 16241 57d5bd5 memcmp 16240->16241 16242 57dfa1a 2 API calls 16240->16242 16240->16243 16241->16240 16242->16240 16243->16206 16245 57ded52 16244->16245 16246 57ded87 16245->16246 16247 57ded92 16245->16247 16260 57dedbc 16245->16260 16248 57dd9c6 8 API calls 16246->16248 16249 57dda77 8 API calls 16247->16249 16250 57ded8d __cfltcvt 16248->16250 16249->16250 16251 57dee04 memset 16250->16251 16250->16260 16252 57dee20 __cfltcvt 16251->16252 16253 57d2416 memset 16252->16253 16252->16260 16254 57dee6e 16253->16254 16255 57d246f calloc 16254->16255 16256 57dee7c 16255->16256 16257 57deeed 16256->16257 16259 57de109 memset memset 16256->16259 16258 57d2427 free 16257->16258 16258->16260 16261 57deea0 16259->16261 16260->16236 16261->16257 16262 57def62 memcmp 16261->16262 16262->16257 16264 57ce02a 16263->16264 16265 57d5b5b 16263->16265 16264->15806 16264->15807 16265->16264 16266 57d5b6e memcmp 16265->16266 16267 57d5b88 memcmp 16265->16267 16266->16264 16266->16265 16267->16264 16267->16265 16288 57d682b 16268->16288 16270 57d8225 16270->15828 16332 57d6a62 16271->16332 16273 57d81ea 16273->15828 16275 57cf3e3 __cfltcvt 16274->16275 16387 57d2416 memset 16275->16387 16277 57cf3fc 16278 57d246f calloc 16277->16278 16279 57cf408 16278->16279 16280 57d2427 free 16279->16280 16281 57cf472 16280->16281 16282 57cf481 16281->16282 16283 57cdd9a 8 API calls 16281->16283 16282->15816 16283->16282 16285 57d82eb 16284->16285 16286 57d82f2 16284->16286 16285->15816 16286->16285 16388 57d688d 16286->16388 16289 57d6842 16288->16289 16290 57d6866 16289->16290 16294 57d678e 16289->16294 16290->16270 16300 57d679e 16294->16300 16297 57d686c 16316 57d8daa 16297->16316 16299 57d6889 16299->16290 16303 57e08ac 16300->16303 16302 57d679b 16302->16290 16302->16297 16304 57d8b12 free free 16303->16304 16305 57e08b7 16304->16305 16306 57e0b08 16305->16306 16307 57e08c8 16305->16307 16308 57d8b12 free free 16306->16308 16309 57e0af9 16307->16309 16310 57e0ae9 16307->16310 16315 57e08cf 16307->16315 16312 57e0b0e 16308->16312 16311 57e0cd9 7 API calls 16309->16311 16313 57e0bf5 7 API calls 16310->16313 16314 57e0af6 16311->16314 16312->16302 16313->16314 16314->16302 16315->16302 16317 57d8de5 16316->16317 16318 57d8db4 16316->16318 16317->16299 16318->16317 16321 57d8d1d 16318->16321 16322 57d8d28 16321->16322 16331 57d8d3e 16321->16331 16323 57d8d30 16322->16323 16325 57d8d41 __cfltcvt 16322->16325 16324 57d8c05 _mbstowcs_s calloc free memset 16323->16324 16323->16331 16324->16331 16326 57cfb69 _mbstowcs_s free calloc free memset 16325->16326 16325->16331 16327 57d8d7b 16326->16327 16328 57cfb69 _mbstowcs_s free calloc free memset 16327->16328 16327->16331 16329 57d8d91 16328->16329 16330 57cf7eb __cfltcvt calloc free memset 16329->16330 16329->16331 16330->16331 16331->16299 16341 57d6aca 16332->16341 16335 57d6aca 4 API calls 16336 57d6a90 16335->16336 16337 57d6aca 4 API calls 16336->16337 16340 57d6ab4 __cfltcvt 16336->16340 16338 57d6aa6 16337->16338 16338->16340 16345 57d6b1a 16338->16345 16340->16273 16342 57d6adf 16341->16342 16344 57d6a7a 16341->16344 16342->16344 16355 57cfb69 16342->16355 16344->16335 16344->16340 16346 57d6b2a _mbstowcs_s 16345->16346 16347 57cf7eb __cfltcvt 3 API calls 16346->16347 16348 57d6b3e 16347->16348 16351 57d6b55 __cfltcvt 16348->16351 16374 57d039d 16348->16374 16350 57cf49d _mbstowcs_s free 16352 57d6b90 16350->16352 16351->16350 16353 57cf49d _mbstowcs_s free 16352->16353 16354 57d6b99 16353->16354 16354->16340 16356 57cfba6 16355->16356 16357 57cfb93 16355->16357 16361 57cfbb8 __cfltcvt _mbstowcs_s 16356->16361 16369 57cf7eb 16356->16369 16359 57cf49d _mbstowcs_s free 16357->16359 16360 57cfb99 _mbstowcs_s 16359->16360 16363 57cf4e6 16360->16363 16361->16344 16364 57cf4f5 16363->16364 16366 57cf50f 16363->16366 16365 57cf4fe calloc 16364->16365 16364->16366 16365->16366 16367 57cf514 __cfltcvt _mbstowcs_s 16365->16367 16366->16356 16367->16366 16368 57cf534 free 16367->16368 16368->16366 16370 57cf4e6 __cfltcvt calloc free 16369->16370 16371 57cf7f9 16370->16371 16372 57cf801 memset 16371->16372 16373 57cf81e 16371->16373 16372->16373 16373->16361 16375 57d03aa 16374->16375 16378 57d02f6 16375->16378 16379 57d033d 16378->16379 16380 57d030f __cfltcvt 16378->16380 16381 57d00cd _mbstowcs_s free calloc free memset 16379->16381 16383 57d031a 16380->16383 16384 57d0327 16380->16384 16382 57d0325 16381->16382 16382->16351 16386 57d01a1 __cfltcvt free calloc free memset 16383->16386 16385 57d01a1 __cfltcvt free calloc free memset 16384->16385 16385->16382 16386->16382 16387->16277 16389 57d6899 16388->16389 16390 57d678e 7 API calls 16389->16390 16391 57d68aa 16389->16391 16390->16391 16392 57d68b0 16391->16392 16394 57d68e0 16391->16394 16392->16285 16395 57d68eb 16394->16395 16396 57d6906 16394->16396 16402 57d8bb7 16395->16402 16398 57d6902 16396->16398 16399 57d8bb7 __cfltcvt 4 API calls 16396->16399 16398->16392 16400 57d692c 16399->16400 16400->16398 16409 57cf5df 16400->16409 16403 57cf5df __cfltcvt 4 API calls 16402->16403 16404 57d8bc8 16403->16404 16405 57cf5df __cfltcvt 4 API calls 16404->16405 16408 57d8bee 16404->16408 16406 57d8bdb 16405->16406 16407 57cf5df __cfltcvt 4 API calls 16406->16407 16406->16408 16407->16408 16408->16398 16410 57cf5f5 16409->16410 16417 57cf602 __cfltcvt 16409->16417 16411 57cf5fc 16410->16411 16412 57cf607 16410->16412 16413 57cf49d _mbstowcs_s free 16411->16413 16414 57cf63c memset 16412->16414 16415 57cf62a 16412->16415 16413->16417 16414->16417 16416 57cf4e6 __cfltcvt 2 API calls 16415->16416 16416->16417 16417->16398 16419 57d6c26 16418->16419 16422 57d6bb7 __cfltcvt 16418->16422 16419->15855 16430 57d6c80 16419->16430 16422->16419 16423 57d6b1a 5 API calls 16422->16423 16424 57d6c2d 16422->16424 16459 57d1551 16422->16459 16467 57cfdc4 16422->16467 16423->16422 16471 57d0d02 16424->16471 16427 57d6b1a 5 API calls 16428 57d6c52 16427->16428 16428->16419 16528 57cfc47 16428->16528 16431 57d6c9d 16430->16431 16432 57d6c93 16430->16432 16433 57d6b1a 5 API calls 16431->16433 16432->15859 16434 57d6cad _mbstowcs_s 16433->16434 16434->16432 16435 57d6cc7 16434->16435 16436 57d6d10 16434->16436 16628 57d6da6 16435->16628 16438 57cf5df __cfltcvt 4 API calls 16436->16438 16440 57d6d0b 16438->16440 16441 57d6d84 16440->16441 16445 57d0d02 7 API calls 16440->16445 16443 57cf49d _mbstowcs_s free 16441->16443 16443->16432 16446 57d6d3a 16445->16446 16446->16441 16448 57d6d66 __cfltcvt 16446->16448 16449 57d03e6 _mbstowcs_s 5 API calls 16446->16449 16447 57d0c8e _mbstowcs_s 5 API calls 16447->16440 16448->16441 16451 57cfc47 __cfltcvt memset 16448->16451 16450 57d6d53 16449->16450 16450->16441 16452 57d0c8e _mbstowcs_s 5 API calls 16450->16452 16451->16441 16452->16448 16738 57d6971 16453->16738 16456 57d69be 16791 57d69df 16456->16791 16460 57d157c 16459->16460 16465 57d158f 16459->16465 16461 57cf49d _mbstowcs_s free 16460->16461 16463 57d1582 _mbstowcs_s 16461->16463 16462 57cf7eb __cfltcvt 3 API calls 16466 57d15a1 _mbstowcs_s 16462->16466 16464 57cf4e6 __cfltcvt 2 API calls 16463->16464 16464->16465 16465->16462 16465->16466 16466->16422 16468 57cfdea 16467->16468 16469 57cf7eb __cfltcvt 3 API calls 16468->16469 16470 57cfdf1 16468->16470 16469->16470 16470->16422 16472 57d0d19 __cfltcvt _mbstowcs_s 16471->16472 16473 57d0d67 memset 16472->16473 16494 57d1242 16472->16494 16474 57d0d81 __cfltcvt 16473->16474 16475 57cf4e6 __cfltcvt 2 API calls 16474->16475 16476 57d0dce 16475->16476 16478 57cf4e6 __cfltcvt 2 API calls 16476->16478 16479 57d11d5 16476->16479 16477 57d120a 16481 57cf49d _mbstowcs_s free 16477->16481 16480 57d0de7 16478->16480 16479->16477 16482 57cf49d _mbstowcs_s free 16479->16482 16480->16479 16484 57cf4e6 __cfltcvt 2 API calls 16480->16484 16483 57d1216 16481->16483 16482->16479 16485 57cf49d _mbstowcs_s free 16483->16485 16486 57d0e00 16484->16486 16487 57d121f 16485->16487 16486->16479 16490 57d0e26 16486->16490 16491 57cf5df __cfltcvt 4 API calls 16486->16491 16488 57cf49d _mbstowcs_s free 16487->16488 16489 57d1228 16488->16489 16492 57cf49d _mbstowcs_s free 16489->16492 16489->16494 16490->16479 16493 57cf7eb __cfltcvt 3 API calls 16490->16493 16498 57d0e49 __cfltcvt 16490->16498 16491->16490 16492->16494 16495 57d0e5d 16493->16495 16494->16419 16494->16427 16495->16479 16531 57cfcdc 16495->16531 16498->16479 16500 57d0ed6 16498->16500 16501 57d0ec3 16498->16501 16503 57cf5df __cfltcvt 4 API calls 16500->16503 16502 57d0c8e _mbstowcs_s 5 API calls 16501->16502 16504 57d0ed1 16502->16504 16503->16504 16504->16479 16544 57d1285 16504->16544 16506 57d0f07 16506->16479 16507 57cf5df __cfltcvt 4 API calls 16506->16507 16508 57d0f20 16507->16508 16508->16479 16548 57d1379 16508->16548 16511 57cf4e6 __cfltcvt 2 API calls 16512 57d0f72 16511->16512 16512->16479 16514 57cf5df __cfltcvt 4 API calls 16512->16514 16513 57d1137 16513->16479 16519 57d1285 memset 16513->16519 16520 57d1195 16513->16520 16521 57d0f8b 16514->16521 16515 57d1048 16515->16479 16515->16513 16516 57d1285 memset 16515->16516 16516->16515 16517 57d1379 memset 16523 57d11aa 16517->16523 16518 57d1285 memset 16518->16521 16519->16513 16520->16517 16521->16479 16521->16518 16526 57d0fcc 16521->16526 16522 57cf4e6 __cfltcvt 2 API calls 16522->16526 16523->16479 16551 57d0298 16523->16551 16525 57cf5df __cfltcvt 4 API calls 16525->16526 16526->16479 16526->16515 16526->16522 16526->16525 16527 57d1285 memset 16526->16527 16527->16526 16529 57cfc5d memset 16528->16529 16530 57cfc76 16528->16530 16529->16530 16530->16419 16532 57cfcff __cfltcvt 16531->16532 16533 57cf4e6 __cfltcvt 2 API calls 16532->16533 16534 57cfd24 16532->16534 16533->16534 16534->16479 16535 57d0c8e 16534->16535 16536 57d0c9b __cfltcvt 16535->16536 16537 57d0ca1 16536->16537 16560 57d076b 16536->16560 16537->16498 16539 57d0cfc 16539->16498 16540 57d0cb9 __cfltcvt 16540->16539 16541 57d0298 __cfltcvt 4 API calls 16540->16541 16543 57d0cdc __cfltcvt 16540->16543 16541->16540 16542 57d02f6 _mbstowcs_s 4 API calls 16542->16543 16543->16539 16543->16542 16545 57d12d3 __cfltcvt _mbstowcs_s 16544->16545 16546 57d12a2 16544->16546 16545->16506 16546->16545 16547 57d12ad memset 16546->16547 16547->16545 16549 57d1285 memset 16548->16549 16550 57d0f3c 16549->16550 16550->16479 16550->16511 16550->16515 16552 57d02df 16551->16552 16553 57d02b1 __cfltcvt 16551->16553 16620 57d00cd 16552->16620 16556 57d02bc 16553->16556 16557 57d02c9 16553->16557 16555 57d02c7 16555->16479 16612 57d01a1 16556->16612 16559 57d01a1 __cfltcvt 4 API calls 16557->16559 16559->16555 16562 57d077f __cfltcvt _mbstowcs_s 16560->16562 16561 57d0785 16561->16540 16562->16561 16563 57d07cd 16562->16563 16564 57d0808 16562->16564 16566 57d07db 16563->16566 16568 57cf7eb __cfltcvt 3 API calls 16563->16568 16565 57cf5df __cfltcvt 4 API calls 16564->16565 16567 57d0812 16565->16567 16566->16561 16569 57d07f5 __cfltcvt 16566->16569 16570 57cf5df __cfltcvt 4 API calls 16566->16570 16567->16569 16572 57cf5df __cfltcvt 4 API calls 16567->16572 16568->16566 16569->16561 16571 57cf49d _mbstowcs_s free 16569->16571 16570->16569 16573 57d0c04 16571->16573 16574 57d082a 16572->16574 16575 57cf49d _mbstowcs_s free 16573->16575 16574->16569 16577 57cf4e6 __cfltcvt 2 API calls 16574->16577 16576 57d0c0d 16575->16576 16578 57cf49d _mbstowcs_s free 16576->16578 16579 57d084e 16577->16579 16580 57d0c16 16578->16580 16579->16569 16582 57cf7eb __cfltcvt 3 API calls 16579->16582 16581 57cf49d _mbstowcs_s free 16580->16581 16583 57d0c1f 16581->16583 16584 57d0864 16582->16584 16585 57cf49d _mbstowcs_s free 16583->16585 16584->16569 16586 57cf4e6 __cfltcvt 2 API calls 16584->16586 16585->16561 16587 57d087b 16586->16587 16587->16569 16588 57cf4e6 __cfltcvt 2 API calls 16587->16588 16589 57d0892 __cfltcvt 16588->16589 16589->16569 16590 57cfcdc _mbstowcs_s 2 API calls 16589->16590 16594 57d08d6 16589->16594 16591 57d08c0 16590->16591 16591->16569 16593 57cfcdc _mbstowcs_s 2 API calls 16591->16593 16592 57cfcdc _mbstowcs_s 2 API calls 16600 57d090e __cfltcvt 16592->16600 16593->16594 16594->16569 16594->16592 16595 57d0975 16596 57cfdc4 _mbstowcs_s 3 API calls 16595->16596 16605 57d097f __cfltcvt _mbstowcs_s 16596->16605 16597 57d02f6 _mbstowcs_s 4 API calls 16597->16600 16598 57d0b8d 16599 57d0b9e 16598->16599 16601 57cf5df __cfltcvt 4 API calls 16598->16601 16599->16569 16602 57cfdc4 _mbstowcs_s 3 API calls 16599->16602 16600->16569 16600->16595 16600->16597 16601->16599 16603 57d0bc6 16602->16603 16603->16569 16604 57cf5df __cfltcvt 4 API calls 16603->16604 16604->16569 16605->16569 16605->16598 16606 57d073c 5 API calls _mbstowcs_s 16605->16606 16607 57cf7eb calloc free memset __cfltcvt 16605->16607 16608 57d02f6 _mbstowcs_s 4 API calls 16605->16608 16609 57cf5df __cfltcvt 4 API calls 16605->16609 16610 57cfcdc calloc free _mbstowcs_s 16605->16610 16611 57d0298 __cfltcvt 4 API calls 16605->16611 16606->16605 16607->16605 16608->16605 16609->16605 16610->16605 16611->16605 16614 57d01b4 __cfltcvt _mbstowcs_s 16612->16614 16613 57d01ba 16613->16555 16614->16613 16615 57d01dc 16614->16615 16616 57cf5df __cfltcvt 4 API calls 16614->16616 16617 57cf5df __cfltcvt 4 API calls 16615->16617 16618 57d01f5 __cfltcvt 16615->16618 16616->16615 16617->16618 16619 57cf49d _mbstowcs_s free 16618->16619 16619->16613 16621 57d00dc 16620->16621 16622 57cf5df __cfltcvt 4 API calls 16621->16622 16623 57d00f0 16621->16623 16622->16623 16624 57cf4e6 __cfltcvt 2 API calls 16623->16624 16625 57d0199 16623->16625 16626 57d0126 16624->16626 16625->16555 16626->16625 16627 57cf4e6 __cfltcvt 2 API calls 16626->16627 16627->16626 16629 57d6dc1 __cfltcvt 16628->16629 16630 57d6dfc __cfltcvt 16629->16630 16631 57d6dc7 16629->16631 16634 57d6e0d 16630->16634 16639 57d6e64 __cfltcvt 16630->16639 16632 57cf5df __cfltcvt 4 API calls 16631->16632 16633 57d6dce 16632->16633 16636 57cf7eb __cfltcvt 3 API calls 16633->16636 16648 57d6cd3 16633->16648 16635 57d03e6 _mbstowcs_s 5 API calls 16634->16635 16637 57d6e15 16635->16637 16638 57d6de3 16636->16638 16641 57d0c8e _mbstowcs_s 5 API calls 16637->16641 16637->16648 16642 57cf7eb __cfltcvt 3 API calls 16638->16642 16638->16648 16640 57d1551 _mbstowcs_s 4 API calls 16639->16640 16647 57cfdc4 _mbstowcs_s 3 API calls 16639->16647 16639->16648 16649 57d6ec2 16639->16649 16640->16639 16643 57d6e2b 16641->16643 16642->16648 16644 57d03e6 _mbstowcs_s 5 API calls 16643->16644 16643->16648 16645 57d6e41 16644->16645 16646 57d0c8e _mbstowcs_s 5 API calls 16645->16646 16645->16648 16646->16648 16647->16639 16648->16441 16653 57d03e6 16648->16653 16667 57d15cd 16649->16667 16652 57d0d02 7 API calls 16652->16648 16654 57d03f8 _mbstowcs_s 16653->16654 16655 57d0415 16654->16655 16656 57cf5df __cfltcvt 4 API calls 16654->16656 16657 57cf5df __cfltcvt 4 API calls 16655->16657 16659 57d043c 16655->16659 16666 57d04a0 _mbstowcs_s 16655->16666 16656->16655 16657->16659 16658 57cf49d _mbstowcs_s free 16661 57d04e7 16658->16661 16660 57cf4e6 __cfltcvt 2 API calls 16659->16660 16659->16666 16662 57d048e 16660->16662 16663 57cf49d _mbstowcs_s free 16661->16663 16665 57cf7eb __cfltcvt 3 API calls 16662->16665 16662->16666 16664 57d04f0 16663->16664 16664->16441 16664->16447 16665->16666 16666->16658 16669 57d15e0 __cfltcvt _mbstowcs_s 16667->16669 16668 57d15e6 16668->16648 16668->16652 16669->16668 16715 57d13ab 16669->16715 16671 57cf49d _mbstowcs_s free 16672 57d1997 16671->16672 16674 57cf49d _mbstowcs_s free 16672->16674 16673 57d1650 __cfltcvt 16675 57d0c8e _mbstowcs_s 5 API calls 16673->16675 16714 57d166f 16673->16714 16676 57d19a0 16674->16676 16677 57d1686 16675->16677 16678 57cf49d _mbstowcs_s free 16676->16678 16681 57cf5df __cfltcvt 4 API calls 16677->16681 16677->16714 16679 57d19a9 16678->16679 16680 57cf49d _mbstowcs_s free 16679->16680 16682 57d19b2 16680->16682 16683 57d16a0 16681->16683 16684 57cf49d _mbstowcs_s free 16682->16684 16686 57cf5df __cfltcvt 4 API calls 16683->16686 16683->16714 16685 57d19bb 16684->16685 16687 57cf49d _mbstowcs_s free 16685->16687 16688 57d16b8 16686->16688 16689 57d19c4 16687->16689 16691 57cf5df __cfltcvt 4 API calls 16688->16691 16688->16714 16690 57cf49d _mbstowcs_s free 16689->16690 16692 57d19cd 16690->16692 16693 57d16d0 16691->16693 16694 57cf49d _mbstowcs_s free 16692->16694 16695 57cf7eb __cfltcvt 3 API calls 16693->16695 16693->16714 16696 57d19d6 16694->16696 16697 57d16e6 16695->16697 16698 57cf49d _mbstowcs_s free 16696->16698 16699 57cf7eb __cfltcvt 3 API calls 16697->16699 16697->16714 16698->16668 16700 57d16fc 16699->16700 16701 57cf7eb __cfltcvt 3 API calls 16700->16701 16700->16714 16702 57d1712 16701->16702 16703 57cf7eb __cfltcvt 3 API calls 16702->16703 16702->16714 16705 57d1728 __cfltcvt 16703->16705 16704 57cfdc4 calloc free memset _mbstowcs_s 16704->16705 16705->16704 16706 57d02f6 free calloc free memset _mbstowcs_s 16705->16706 16707 57d0298 free calloc free memset __cfltcvt 16705->16707 16708 57d1926 __cfltcvt 16705->16708 16705->16714 16706->16705 16707->16705 16709 57d0298 __cfltcvt 4 API calls 16708->16709 16710 57d1951 __cfltcvt 16708->16710 16708->16714 16709->16708 16711 57d197e 16710->16711 16712 57d02f6 _mbstowcs_s 4 API calls 16710->16712 16710->16714 16713 57cf5df __cfltcvt 4 API calls 16711->16713 16712->16710 16713->16714 16714->16671 16716 57d13bd _mbstowcs_s 16715->16716 16717 57cf5df __cfltcvt 4 API calls 16716->16717 16718 57d13db 16717->16718 16719 57d1528 16718->16719 16720 57cf5df __cfltcvt 4 API calls 16718->16720 16721 57cf49d _mbstowcs_s free 16719->16721 16727 57d13f4 _mbstowcs_s 16720->16727 16722 57d1535 16721->16722 16723 57cf49d _mbstowcs_s free 16722->16723 16724 57d153e 16723->16724 16725 57cf49d _mbstowcs_s free 16724->16725 16726 57d1547 16725->16726 16726->16673 16727->16719 16728 57cfdc4 _mbstowcs_s 3 API calls 16727->16728 16729 57d1426 16728->16729 16729->16719 16730 57cfdc4 _mbstowcs_s 3 API calls 16729->16730 16736 57d143c __cfltcvt _mbstowcs_s 16730->16736 16731 57d150a 16732 57cfcdc _mbstowcs_s 2 API calls 16731->16732 16733 57d1514 16732->16733 16733->16719 16735 57cf5df __cfltcvt 4 API calls 16733->16735 16734 57cfdc4 calloc free memset _mbstowcs_s 16734->16736 16735->16719 16736->16719 16736->16731 16736->16734 16737 57d01a1 free calloc free memset __cfltcvt 16736->16737 16737->16736 16739 57d6986 16738->16739 16740 57d696c 16738->16740 16744 57d6633 16739->16744 16740->15855 16740->16456 16751 57d6651 16744->16751 16747 57d8dec 16748 57d8e00 16747->16748 16749 57d8df9 16747->16749 16782 57d8c4e 16748->16782 16749->16740 16756 57db3f4 16751->16756 16754 57d664c 16754->16740 16754->16747 16757 57d6667 16756->16757 16759 57db417 __cfltcvt 16756->16759 16757->16754 16774 57d8e7d 16757->16774 16758 57d1551 _mbstowcs_s free calloc free memset 16758->16759 16759->16757 16759->16758 16760 57db4c4 __cfltcvt _mbstowcs_s 16759->16760 16762 57db449 __cfltcvt 16759->16762 16760->16757 16761 57d1551 _mbstowcs_s free calloc free memset 16760->16761 16763 57cfdc4 _mbstowcs_s calloc free memset 16760->16763 16761->16760 16764 57db469 16762->16764 16765 57db45a 16762->16765 16763->16760 16767 57cf860 _mbstowcs_s calloc free 16764->16767 16766 57cfdc4 _mbstowcs_s calloc free memset 16765->16766 16768 57db465 16766->16768 16767->16768 16768->16757 16769 57cf860 _mbstowcs_s calloc free 16768->16769 16770 57db48b 16769->16770 16770->16757 16771 57cf860 _mbstowcs_s calloc free 16770->16771 16772 57db4a3 16771->16772 16772->16757 16772->16760 16773 57cf860 _mbstowcs_s calloc free 16772->16773 16773->16760 16775 57d8e8d __cfltcvt 16774->16775 16776 57db0e4 __cfltcvt 5 API calls 16775->16776 16781 57d8ef3 16775->16781 16777 57d8e9c 16776->16777 16778 57d8ec8 16777->16778 16779 57da7fa __cfltcvt 5 API calls 16777->16779 16777->16781 16780 57d8ef9 __cfltcvt 12 API calls 16778->16780 16778->16781 16779->16778 16780->16781 16781->16754 16783 57d8c67 __cfltcvt 16782->16783 16784 57d8c9b 16783->16784 16785 57d8c6d 16783->16785 16787 57d8cd8 __cfltcvt 16783->16787 16784->16785 16786 57cfc47 __cfltcvt memset 16784->16786 16785->16749 16788 57d8cba 16786->16788 16787->16785 16789 57cfc47 __cfltcvt memset 16787->16789 16788->16785 16790 57cfc47 __cfltcvt memset 16788->16790 16789->16785 16790->16785 16792 57d69da 16791->16792 16793 57d69eb 16791->16793 16792->15859 16793->16792 16797 57d668d 16793->16797 16795 57d6a0f __cfltcvt 16795->16792 16796 57cfc47 __cfltcvt memset 16795->16796 16796->16792 16800 57d66ae 16797->16800 16801 57d66be __cfltcvt 16800->16801 16802 57d8e7d __cfltcvt 12 API calls 16801->16802 16806 57d66d9 __cfltcvt 16802->16806 16803 57d66f0 16804 57d8aec __cfltcvt free 16803->16804 16805 57d66a9 16804->16805 16805->16795 16806->16803 16807 57cf5df __cfltcvt 4 API calls 16806->16807 16807->16803 16809 57cef8e 2 API calls 16808->16809 16810 57ce536 16809->16810 16811 57cef4e free 16810->16811 16812 57ce523 16810->16812 16811->16812 16812->15727

                              Control-flow Graph

                              APIs
                              • memset.MSVCRT ref: 057C9F7B
                              • memset.MSVCRT ref: 057C9FC7
                              • WSARecv.WS2_32(FFE0458D,00000000,00000001,?,00000000,057C21F9,00000000), ref: 057C9FF5
                              • GetLastError.KERNEL32(?,?,?,?,?,00000001), ref: 057CA01F
                              • WSAGetLastError.WS2_32(?,?,?,?,?,00000001), ref: 057CA02C
                              • WSAGetLastError.WS2_32(?,?,?,?,?,00000001), ref: 057CA036
                              • WSAGetLastError.WS2_32(?,?,?,?,?,00000001), ref: 057CA03E
                              • RegisterWaitForSingleObject.KERNEL32(057C2219,30C48300,057C9EAD,057C21E9,000000FF,00000004), ref: 057CA088
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$memset$ObjectRecvRegisterSingleWait
                              • String ID:
                              • API String ID: 2020750497-0
                              • Opcode ID: 0013a77317f393e014d57fd337f873d493ae29f918dad70a3caef98ae0117bb2
                              • Instruction ID: 48d241931cb5ddca7e8c2c37030fa26ff01e4e89d91d24bb6a290c77c5a5c0c9
                              • Opcode Fuzzy Hash: 0013a77317f393e014d57fd337f873d493ae29f918dad70a3caef98ae0117bb2
                              • Instruction Fuzzy Hash: 3D41AA71600708AFE7218F24D849BAABFF8FF05355F10866DE942DA590E770EA44EB90

                              Control-flow Graph

                              APIs
                              • socket.WS2_32(00000010,00000001,00000000), ref: 057C9A6C
                              • WSAGetLastError.WS2_32(?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010,057CAD04,057CAD81), ref: 057C9A79
                                • Part of subcall function 057C9B02: ioctlsocket.WS2_32(057CAD04,8004667E,057CAD81), ref: 057C9B1D
                                • Part of subcall function 057C9B02: WSAGetLastError.WS2_32(?,?,057C9AC7,17E80870,057CAD04,00000000,00000010,00000000,?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010), ref: 057C9B28
                              • SetHandleInformation.KERNEL32(00000000,00000001,00000000,?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010,057CAD04,057CAD81), ref: 057C9A94
                              • GetLastError.KERNEL32(?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010,057CAD04,057CAD81), ref: 057C9A9E
                              • closesocket.WS2_32(00000000), ref: 057C9AB0
                              • bind.WS2_32(50A5A5A5,057CAD04,00000002), ref: 057C9AD7
                              • WSAGetLastError.WS2_32(?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010,057CAD04,057CAD81), ref: 057C9AE2
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$HandleInformationbindclosesocketioctlsocketsocket
                              • String ID:
                              • API String ID: 2417539845-0
                              • Opcode ID: 72af81a2b74382948aa44b1c449a551d790e0f267145dd46f822bc63ba71f2fd
                              • Instruction ID: 1653e7420bdd4bf24bc21025527c3de1414fbc98aa932753e2862647545c02b8
                              • Opcode Fuzzy Hash: 72af81a2b74382948aa44b1c449a551d790e0f267145dd46f822bc63ba71f2fd
                              • Instruction Fuzzy Hash: 97118E31104700ABDB625E74DC0DB6A7FA6AB49731F10866DF722892E0EB71A450FB60
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000000,?,?), ref: 0307031C
                                • Part of subcall function 030700A0: VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 030700C9
                                • Part of subcall function 030700A0: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 03070275
                              • VirtualAlloc.KERNELBASE(00000000,00400000,00001000,00000004), ref: 0307036E
                              • VirtualProtect.KERNELBASE(0000002C,?,00000040,?), ref: 030703DD
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 030703FD
                              • MapViewOfFile.KERNELBASE(?,00000004,00000000,00000000,00000000), ref: 03070424
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0307044C
                              • CloseHandle.KERNELBASE(?), ref: 03070467
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000003.1794796397.0000000003070000.00000040.00000001.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_3_3070000_dialer.jbxd
                              Similarity
                              • API ID: Virtual$Alloc$Free$CloseFileHandleProtectView
                              • String ID: ,
                              • API String ID: 3867569247-3772416878
                              • Opcode ID: 82e5e3048abb205ecfbadfcc4accb215ed5bf30bd6965aeddf34148881449b51
                              • Instruction ID: 7eea16197f2bd2c6b7cfc262d04988aae3fddaa190583ab4f9d498b105a92734
                              • Opcode Fuzzy Hash: 82e5e3048abb205ecfbadfcc4accb215ed5bf30bd6965aeddf34148881449b51
                              • Instruction Fuzzy Hash: 3D51FBB5D01209AFCB20DFA5C884ADEBBF8FF08354F148529F959A7240D770A954CBA4

                              Control-flow Graph

                              APIs
                              • SetErrorMode.KERNELBASE(00008003), ref: 057C8AB2
                              • WSAStartup.WS2_32(00000202,?), ref: 057CAEA0
                                • Part of subcall function 057CAC49: memset.MSVCRT ref: 057CAC59
                                • Part of subcall function 057CAC49: htons.WS2_32(00000002), ref: 057CAC6A
                                • Part of subcall function 057CAC49: inet_addr.WS2_32(?), ref: 057CAC77
                                • Part of subcall function 057CAC90: memset.MSVCRT ref: 057CACA0
                                • Part of subcall function 057CAC90: htons.WS2_32(?), ref: 057CACB1
                              • socket.WS2_32(00000002,00000001,00000000), ref: 057CAEED
                              • getsockopt.WS2_32(00000000,0000FFFF,00002005,?,?), ref: 057CAF1E
                              • closesocket.WS2_32(00000000), ref: 057CAF31
                              • WSAGetLastError.WS2_32 ref: 057CAF39
                              • socket.WS2_32(00000017,00000001,00000000), ref: 057CAF4E
                              • closesocket.WS2_32(00000000), ref: 057CAF83
                              • WSAGetLastError.WS2_32 ref: 057CAF8B
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: Error$Lastclosesockethtonsmemsetsocket$ModeStartupgetsockoptinet_addr
                              • String ID:
                              • API String ID: 2777411211-0
                              • Opcode ID: c7e81198b955047df010dc561adb9a43bc17cce2038cb2960bd7494fe5edd027
                              • Instruction ID: 333454b97c8f9265b59824ce2004f8bbda119ee9e22c3fe3665aa4f9596582b5
                              • Opcode Fuzzy Hash: c7e81198b955047df010dc561adb9a43bc17cce2038cb2960bd7494fe5edd027
                              • Instruction Fuzzy Hash: BB31F9F1204308ABD221EBA4DC8EFAF7FADFB49721F40455EF6149A1C0EB759904A761

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 53 57ca387-57ca3c6 memset * 2 54 57ca3de-57ca3f9 WSASend 53->54 55 57ca3c8-57ca3db CreateEventA 53->55 56 57ca44a-57ca455 GetLastError 54->56 57 57ca3fb-57ca3ff 54->57 55->54 58 57ca457-57ca46b WSAGetLastError call 57cac0f 56->58 59 57ca470-57ca477 56->59 57->59 60 57ca401-57ca415 57->60 73 57ca517-57ca51b 58->73 62 57ca479 59->62 63 57ca484-57ca498 59->63 64 57ca42d-57ca445 60->64 65 57ca417-57ca41c 60->65 68 57ca47c-57ca482 62->68 69 57ca49a-57ca49f 63->69 70 57ca4b0-57ca4d0 63->70 66 57ca50e-57ca514 call 57c9e85 64->66 65->64 71 57ca41e-57ca425 65->71 76 57ca515 66->76 68->63 68->68 69->70 75 57ca4a1-57ca4a8 69->75 70->76 77 57ca4d2-57ca4eb RegisterWaitForSingleObject 70->77 71->64 72 57ca427-57ca42a 71->72 72->64 75->70 79 57ca4aa-57ca4ad 75->79 76->73 77->76 80 57ca4ed-57ca4f7 77->80 79->70 82 57ca4fd-57ca504 80->82 83 57ca4f9-57ca4fb 80->83 86 57ca509-57ca50d 82->86 83->86 86->66
                              APIs
                              • memset.MSVCRT ref: 057CA3AE
                              • memset.MSVCRT ref: 057CA3BA
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,057C427C,00000000,00000000,057C4237,00000000), ref: 057CA3CC
                              • WSASend.WS2_32(?,057C427C,?,00000000,00000000,00000010,00000000), ref: 057CA3F1
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 057CA44A
                              • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 057CA457
                              • RegisterWaitForSingleObject.KERNEL32(00000048,?,057CA51C,00000000,000000FF,0000000C), ref: 057CA4E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastmemset$CreateEventObjectRegisterSendSingleWait
                              • String ID:
                              • API String ID: 2712206520-0
                              • Opcode ID: 574a6081d358356bddd4681c6cea6f0392694ed538d6eaa1c287c5fbabc4a38d
                              • Instruction ID: d7b29c03abc6547a5dcb4a885457e628059a2c6662699fe499729bb237d172a5
                              • Opcode Fuzzy Hash: 574a6081d358356bddd4681c6cea6f0392694ed538d6eaa1c287c5fbabc4a38d
                              • Instruction Fuzzy Hash: 9C5183B1500B0AAFD724CF29D888A62BFF8FF0831970086ADE956C7650E730F955DB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 107 57c9b02-57c9b26 ioctlsocket 108 57c9b3e-57c9b58 CreateIoCompletionPort 107->108 109 57c9b28 WSAGetLastError 107->109 111 57c9b5a-57c9b5e 108->111 112 57c9b63-57c9b6d 108->112 110 57c9b2e-57c9b2f 109->110 113 57c9b32-57c9b39 call 57cac0f 110->113 114 57c9b96-57c9b9e GetLastError 111->114 115 57c9b60 111->115 116 57c9b6f 112->116 117 57c9b75-57c9b7c 112->117 128 57c9be2-57c9be5 113->128 114->113 115->112 116->117 118 57c9b7e-57c9b81 117->118 119 57c9bb4-57c9bb8 117->119 118->119 121 57c9b83-57c9b85 118->121 123 57c9bca-57c9bce 119->123 124 57c9bba-57c9bc8 call 57c9bfb 119->124 121->119 127 57c9b87-57c9b8e SetFileCompletionNotificationModes 121->127 125 57c9be7-57c9bee 123->125 126 57c9bd0-57c9be0 call 57c9c32 123->126 124->123 124->128 134 57c9bf4 125->134 135 57c9bf0 125->135 126->125 126->128 131 57c9ba0-57c9bab 127->131 132 57c9b90-57c9b94 127->132 133 57c9bf6-57c9bfa 128->133 131->119 139 57c9bad-57c9baf 131->139 132->119 134->133 135->134 139->110
                              APIs
                              • ioctlsocket.WS2_32(057CAD04,8004667E,057CAD81), ref: 057C9B1D
                              • WSAGetLastError.WS2_32(?,?,057C9AC7,17E80870,057CAD04,00000000,00000010,00000000,?,?,?,057C9A53,057CAD04,00000002,057CAD04,00000010), ref: 057C9B28
                              • CreateIoCompletionPort.KERNELBASE(057CAD04,19751710,057CAD04,00000000,?,?,057C9AC7,17E80870,057CAD04,00000000,00000010,00000000,?,?,?,057C9A53), ref: 057C9B48
                              • SetFileCompletionNotificationModes.KERNEL32(057CAD04,00000003,?,?,057C9AC7,17E80870,057CAD04,00000000,00000010,00000000,?,?,?,057C9A53,057CAD04), ref: 057C9B8A
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: Completion$CreateErrorFileLastModesNotificationPortioctlsocket
                              • String ID:
                              • API String ID: 3397353003-0
                              • Opcode ID: fbe525a5cb9bf22ed67f29fa2b31c1a6be4dd5cd5a504a60e8b4e7aa0b37f77f
                              • Instruction ID: e6a5ffb2de05c1317a66e1f02172e1af5c1d7f1603158eafe5a4140c54f8f477
                              • Opcode Fuzzy Hash: fbe525a5cb9bf22ed67f29fa2b31c1a6be4dd5cd5a504a60e8b4e7aa0b37f77f
                              • Instruction Fuzzy Hash: 48319F31104705FADB619E65DD89B6A7FAAFF40394F1441ACFB0296180EB70FA44E764

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 141 57ca0c0-57ca0d6 142 57ca0d8-57ca0dc 141->142 143 57ca0e1-57ca0e4 141->143 144 57ca1d5-57ca1db call 57cac0f 142->144 145 57ca105-57ca112 143->145 146 57ca0e6-57ca0f5 call 57cacdd 143->146 154 57ca1dc-57ca1df 144->154 148 57ca12d-57ca163 memset 145->148 149 57ca114-57ca121 call 57cae30 145->149 151 57ca0fa-57ca0ff 146->151 155 57ca16c-57ca16e 148->155 149->148 160 57ca123-57ca128 149->160 151->145 151->154 157 57ca21e-57ca222 154->157 158 57ca1be-57ca1c9 GetLastError 155->158 159 57ca170-57ca178 155->159 162 57ca1e1-57ca1ef 158->162 163 57ca1cb-57ca1d1 WSAGetLastError 158->163 161 57ca17a-57ca188 159->161 159->162 164 57ca1d2 160->164 167 57ca19d-57ca1bc call 57c9e85 161->167 168 57ca18a-57ca18c 161->168 165 57ca207-57ca21a 162->165 166 57ca1f1-57ca1f6 162->166 163->164 164->144 171 57ca21c 165->171 166->165 169 57ca1f8-57ca1ff 166->169 167->171 168->167 170 57ca18e-57ca195 168->170 169->165 173 57ca201-57ca204 169->173 170->167 174 57ca197-57ca19a 170->174 171->157 173->165 174->167
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 52c862c9104abab961222ed0f91ac914c88d237c573d8fed6c891e8fedfec932
                              • Instruction ID: 5c58cc6a199e30a49b1b215122702dbf3523a9d85ec4ef6fa80ba6db2c7bb850
                              • Opcode Fuzzy Hash: 52c862c9104abab961222ed0f91ac914c88d237c573d8fed6c891e8fedfec932
                              • Instruction Fuzzy Hash: A941AFB16102099FDB14CF25C884FA2BBB9FF45325F4481ADED168F256EB31E441EBA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 176 57caa5b-57caa71 177 57caa97-57caa9c 176->177 178 57caa73-57caa78 176->178 179 57caa9e-57caaa2 177->179 180 57caaef-57caaf5 177->180 181 57caa7a-57caa84 shutdown 178->181 182 57caa86-57caa8f call 57cab98 178->182 179->180 183 57caaa4-57caaad call 57cab98 179->183 184 57cab19-57cab1f 180->184 185 57caaf7-57cab00 180->185 181->180 182->180 197 57caa91-57caa95 182->197 183->180 199 57caaaf-57caab7 183->199 188 57cab21-57cab2a 184->188 189 57cab43-57cab48 184->189 185->184 190 57cab02-57cab04 185->190 188->189 193 57cab2c-57cab2e 188->193 194 57cab4a-57cab53 closesocket 189->194 195 57cab57-57cab63 189->195 190->184 196 57cab06-57cab08 190->196 193->189 200 57cab30-57cab32 193->200 194->195 201 57cab69-57cab6c 195->201 202 57cab65-57cab67 195->202 196->184 198 57cab0a-57cab11 196->198 197->180 198->184 203 57cab13-57cab16 198->203 199->180 204 57caab9-57caabb 199->204 200->189 205 57cab34-57cab3b 200->205 206 57cab6f-57cab7d 201->206 202->201 202->206 203->184 207 57caabd-57caac8 204->207 205->189 208 57cab3d-57cab40 205->208 209 57cab7f-57cab84 206->209 210 57cab94-57cab97 206->210 211 57caade-57caaeb 207->211 212 57caaca-57caad1 207->212 208->189 209->210 213 57cab86-57cab91 209->213 211->207 215 57caaed-57caaee 211->215 212->211 214 57caad3-57caada closesocket 212->214 213->210 214->211 215->180
                              APIs
                              • shutdown.WS2_32(D7FF5605,00000001), ref: 057CAA7E
                              • closesocket.WS2_32(?), ref: 057CAAD4
                              • closesocket.WS2_32(D7FF5605), ref: 057CAB4D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: closesocket$shutdown
                              • String ID:
                              • API String ID: 3079814495-0
                              • Opcode ID: 68d4176aca07a7568790196ed61f00d325e184016bf3600530355ff23a2982eb
                              • Instruction ID: 2221fa6557e0dc3690252b3e926afb2b7900c4205ca1d85ea84bd568c2dbe8b1
                              • Opcode Fuzzy Hash: 68d4176aca07a7568790196ed61f00d325e184016bf3600530355ff23a2982eb
                              • Instruction Fuzzy Hash: 0D414C70614B098FEB358E65D548B66BFF2FF05366F048A5DE89286A90D730E446EF40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 216 57ca983-57ca98f 217 57ca9ab-57ca9c4 216->217 218 57ca991-57ca996 216->218 220 57caa1a-57caa30 call 57cafca call 57cac0f 217->220 221 57ca9c6-57ca9df setsockopt 217->221 218->217 219 57ca998-57ca99a 218->219 219->217 223 57ca99c-57ca9a3 219->223 236 57caa33-57caa3e 220->236 224 57ca9ff-57caa18 WSAGetLastError call 57cac0f 221->224 225 57ca9e1-57ca9fd call 57c9ecb 221->225 223->217 228 57ca9a5-57ca9a8 223->228 224->236 225->236 228->217 238 57caa56-57caa5a 236->238 239 57caa40-57caa42 236->239 239->238 240 57caa44-57caa46 239->240 240->238 241 57caa48-57caa53 240->241 241->238
                              APIs
                              • setsockopt.WS2_32(?,0000FFFF,00007010,00000000,00000000), ref: 057CA9D7
                              • WSAGetLastError.WS2_32(?,057C8D2F,00000000,00000000,?,00000000,00000000,00000000,057C8BB0,00000000,?,00000000,057C2CE1,?,00000000,?), ref: 057CA9FF
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastsetsockopt
                              • String ID:
                              • API String ID: 1729277954-0
                              • Opcode ID: 9fa3da7c0c9fd5d8a6afc7caafe329dde9c8fe0c94a35aa5a107ca32b9775731
                              • Instruction ID: 0b9a770ba2b6513755e3b13a93c4361a852fd15cab4fd03e7245e2e14b52efe0
                              • Opcode Fuzzy Hash: 9fa3da7c0c9fd5d8a6afc7caafe329dde9c8fe0c94a35aa5a107ca32b9775731
                              • Instruction Fuzzy Hash: 25319370204B09AFDB20DF25C989E6ABBB4FF09351B04865DFD869B791C730F8119B94
                              APIs
                              • VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 030700C9
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 03070275
                              Memory Dump Source
                              • Source File: 00000001.00000003.1794796397.0000000003070000.00000040.00000001.00020000.00000000.sdmp, Offset: 03070000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_3_3070000_dialer.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                              • Instruction ID: c8cbb75dc56fcf1fc09c6aa1114752b928fca445d261703a2f4c13ead114719b
                              • Opcode Fuzzy Hash: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                              • Instruction Fuzzy Hash: 3471AA72E0524ADFCB41CF98C981BEDBBF0AF09314F284595E465FB241C274AA91CF68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 242 57cf03c-57cf043 243 57cf118-57cf119 242->243 244 57cf049-57cf065 242->244 245 57cf075-57cf07a 244->245 246 57cf067-57cf072 call 57d2762 244->246 248 57cf07c-57cf088 call 57d2762 free 245->248 249 57cf08b-57cf090 245->249 246->245 248->249 252 57cf09f-57cf0a3 249->252 253 57cf092-57cf09e call 57cef4e 249->253 254 57cf0cd-57cf0d2 252->254 255 57cf0a5-57cf0ca call 57cef8e call 57cef4e call 57cf002 252->255 253->252 258 57cf0d4-57cf0e0 call 57cf002 254->258 259 57cf0e1-57cf0e9 254->259 255->254 258->259 265 57cf108-57cf117 call 57d2762 259->265 266 57cf0eb-57cf105 strlen call 57d2762 259->266 265->243 266->265
                              APIs
                              • free.MSVCRT(74C08559,74C08559,0000414D,00000000,?,00000000,057C4237,057C4300,057C4237,00000000,057C429A,?,00000000,057C4237,00000000,057C4361), ref: 057CF086
                              • strlen.MSVCRT ref: 057CF0EC
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: freestrlen
                              • String ID:
                              • API String ID: 322734593-0
                              • Opcode ID: 93442e4eeaa0d179bd8cea1c0119ac4e79e678d9dbd7bc3b657d3c67f5abf513
                              • Instruction ID: 4e457cd2c3cb29fcbadadc09d1efb635c2acd0a522b24c8dfb4d62f752ba6c3b
                              • Opcode Fuzzy Hash: 93442e4eeaa0d179bd8cea1c0119ac4e79e678d9dbd7bc3b657d3c67f5abf513
                              • Instruction Fuzzy Hash: 7C21A131308704ABDB717B39DD49F4BBBEAFF40B10B05486DF582A2560DA22F850AB24

                              Control-flow Graph

                              APIs
                              • malloc.MSVCRT ref: 057C46F4
                              • memset.MSVCRT ref: 057C470A
                                • Part of subcall function 057CE798: memset.MSVCRT ref: 057CE7A3
                                • Part of subcall function 057CE7AC: calloc.MSVCRT(00000001,0000414D), ref: 057CE7CF
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset$callocmalloc
                              • String ID:
                              • API String ID: 4186080596-0
                              • Opcode ID: a5d238a9b4f98967c8c6547edc4a995f274c1a3b5615251c390752604226eb72
                              • Instruction ID: 6ac57bc3cac3d199be51daefc5233206658410106631e7fc22af55d553806285
                              • Opcode Fuzzy Hash: a5d238a9b4f98967c8c6547edc4a995f274c1a3b5615251c390752604226eb72
                              • Instruction Fuzzy Hash: E4F04F75740700AFD621AB64CD0EF4B7FA9EF85B10F05885CB9596B640C634A900E750

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 293 57c9ef3-57c9f1e 294 57c9f20-57c9f23 293->294 295 57c9f33-57c9f3b 293->295 294->295 296 57c9f25-57c9f2e 294->296 297 57c9f3d-57c9f42 295->297 298 57c9f5f-57c9f63 295->298 296->295 299 57c9f30 296->299 300 57c9f44-57c9f47 297->300 301 57c9f56-57c9f58 call 57c9f64 297->301 299->295 300->301 302 57c9f49-57c9f53 CreateEventA 300->302 304 57c9f5d-57c9f5e 301->304 302->301 304->298
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,057C21B5,?,057C9762,?,057C21B5,057C21B5,057C4579,?,057C45AE,057C45FA,057C454F,?), ref: 057C9F4D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent
                              • String ID:
                              • API String ID: 2692171526-0
                              • Opcode ID: ed73d682c389628015100ab8e574c72a84a3863358526ff5fddfd0905d015827
                              • Instruction ID: 4fd4a47c8d4fdcf80c10a1ad8b88f1a0287fcbc2b1ed975aa36f8905d1ca1cd6
                              • Opcode Fuzzy Hash: ed73d682c389628015100ab8e574c72a84a3863358526ff5fddfd0905d015827
                              • Instruction Fuzzy Hash: 09014CB4908B01AFE770CE26D444A67BBF5FB88320F04895DE98A86A00E374F845DB50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 305 57ce7ac-57ce7d8 calloc 306 57ce7ef-57ce7f6 305->306 307 57ce7da-57ce7ed 305->307 308 57ce80d-57ce85d 306->308 307->306 311 57ce7f8-57ce80b call 57cea13 call 57ce866 307->311 316 57ce861-57ce865 308->316 311->308 318 57ce85f 311->318 318->316
                              APIs
                              • calloc.MSVCRT(00000001,0000414D), ref: 057CE7CF
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: calloc
                              • String ID:
                              • API String ID: 2635317215-0
                              • Opcode ID: accf3d8817905bfd7331faa0f57120824e45fbc8c1211d219fe70d15b18b62ca
                              • Instruction ID: ef6fbce90d3584df49036c3eb543c121caa130084e4322ff5e8ff18f96575471
                              • Opcode Fuzzy Hash: accf3d8817905bfd7331faa0f57120824e45fbc8c1211d219fe70d15b18b62ca
                              • Instruction Fuzzy Hash: CC21ED71504B00DED721CF2AE881A86FBE8FF94754F20881FE599C7261DBB0A040DF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 319 57c1bd9-57c1be7 malloc 320 57c1be9-57c1bfd 319->320 321 57c1c00-57c1c05 319->321 320->321 322 57c1c09-57c1c16 call 57c1c20 321->322 323 57c1c07 321->323 325 57c1c1b-57c1c1f 322->325 323->322
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: malloc
                              • String ID:
                              • API String ID: 2803490479-0
                              • Opcode ID: bb7adc56db02b5f241ff60fc2ee37bf05146b6930231ecb0fd04e5ab1d1b9d81
                              • Instruction ID: 556bd0552cbff52f05a1ba6c9d6985fcd66d2fa5d5fd95aaae3d4988e4e07655
                              • Opcode Fuzzy Hash: bb7adc56db02b5f241ff60fc2ee37bf05146b6930231ecb0fd04e5ab1d1b9d81
                              • Instruction Fuzzy Hash: 10F0FEB56042099FCF098F54E854DA93FA5FF48354B4580ADFD094B361D731D820DB60
                              APIs
                              • memcmp.MSVCRT(?,057EDEBC,00000001,00000000,?,057C328A,?,?), ref: 057C4AE4
                              • memcmp.MSVCRT(?,057EDEB8,00000002), ref: 057C4B13
                              • memcmp.MSVCRT(?,057EDEB4,00000003), ref: 057C4B53
                              • memcmp.MSVCRT(?,057EDEA0,00000004), ref: 057C4BE8
                              • memcmp.MSVCRT(?,057EDE98,00000005), ref: 057C4C2C
                              • memcmp.MSVCRT(?,057EDE70,00000006), ref: 057C4CEA
                              • memcmp.MSVCRT(?,057EDE58,00000007), ref: 057C4D66
                              • memcmp.MSVCRT(?,057EDE3C,00000008), ref: 057C4DE4
                              • memcmp.MSVCRT(?,057EDE18,00000009), ref: 057C4E60
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID:
                              • API String ID: 1475443563-0
                              • Opcode ID: f21b20afc236fc27d2c136454e12b2dbd61378bba67a7a524d7264475040dc4a
                              • Instruction ID: ebb7fafb7ae94df6023f822babcd999907ebbe9965c1b9e040780f19963c36f3
                              • Opcode Fuzzy Hash: f21b20afc236fc27d2c136454e12b2dbd61378bba67a7a524d7264475040dc4a
                              • Instruction Fuzzy Hash: 9581BFB2B4830072DA3051696D5FF362E5E6B2AB0BF4444EDFD09ED156F167E700B682
                              APIs
                              • socket.WS2_32(0000138A,00000001,00000000), ref: 057C9CCC
                              • SetHandleInformation.KERNEL32(00000000,00000001,00000000,?,?,?,057CA95A,?,00000000,?,00000000,00000000,?,00000000), ref: 057C9D09
                              • closesocket.WS2_32(00000000), ref: 057C9D44
                              • memset.MSVCRT ref: 057C9D5A
                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,?), ref: 057C9DBB
                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,?), ref: 057C9DC8
                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,?), ref: 057C9DD2
                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,?), ref: 057C9DDA
                              • closesocket.WS2_32(?), ref: 057C9DFE
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?), ref: 057C9E0C
                              • RegisterWaitForSingleObject.KERNEL32(00000154,?,057C9EAD,00000000,000000FF,00000004), ref: 057C9E49
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Handleclosesocket$CloseInformationObjectRegisterSingleWaitmemsetsocket
                              • String ID:
                              • API String ID: 1241441197-0
                              • Opcode ID: 32353b74cf431e23fa0fc13cb8eb7aadbadaebc6c30ab1540d590b5f24ab33f0
                              • Instruction ID: 3d1163daaf4d8cedf148a9bf532b61833f0103df8d0022f888100b6a7560d5f3
                              • Opcode Fuzzy Hash: 32353b74cf431e23fa0fc13cb8eb7aadbadaebc6c30ab1540d590b5f24ab33f0
                              • Instruction Fuzzy Hash: 1951AB32610B05EFD7619FA4CC49BA6BFB8FF49311F10826DE616CA180EB34F511AB94
                              APIs
                              • GetUserDefaultLangID.KERNEL32(00000059,00000000,00000020), ref: 057C2EEA
                              • GetUserDefaultLangID.KERNEL32(0000005A,00000000,00000020), ref: 057C2F12
                              • _snwprintf.MSVCRT ref: 057C2FB0
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 057C2FCA
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000080,00000000,00000000), ref: 057C2FF8
                              • strlen.MSVCRT ref: 057C3143
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharDefaultLangMultiUserWide$_snwprintfstrlen
                              • String ID: z
                              • API String ID: 2883371422-1657960367
                              • Opcode ID: 9b638cebb7f64d6c96e0b4442c821ab1db918ad95a54b3853c07b77c23b5c461
                              • Instruction ID: ea8a5ac4c97c8794b97f5c956d3e72b8ee250ff5ae2910dfd342152ff01e950c
                              • Opcode Fuzzy Hash: 9b638cebb7f64d6c96e0b4442c821ab1db918ad95a54b3853c07b77c23b5c461
                              • Instruction Fuzzy Hash: B9A102B1A10309AFDB20DFA4DC89E9D7FB9FB4C304F14C8ADF905AA280DB749545AB51
                              APIs
                              • shutdown.WS2_32(?,00000001), ref: 057C98C7
                              • WSAGetLastError.WS2_32(?,00000000,?,057C8C46,00000000,00000000,00000000,00000000,00000000,00000000,00000000,057C8BB6,00000000,00000000,?,00000000), ref: 057C98D8
                              • closesocket.WS2_32(?), ref: 057C994E
                              • UnregisterWait.KERNEL32(89595908), ref: 057C9993
                              • CloseHandle.KERNEL32(458BF845,00000000,00000000,?,00000000,?,057C8C46,00000000,00000000,00000000,00000000,00000000,00000000,00000000,057C8BB6,00000000), ref: 057C99AD
                              • free.MSVCRT ref: 057C99D3
                              • UnregisterWait.KERNEL32(?), ref: 057C99F4
                              • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,?,057C8C46,00000000,00000000,00000000,00000000,00000000,00000000,00000000,057C8BB6,00000000), ref: 057C9A06
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleUnregisterWait$ErrorLastclosesocketfreeshutdown
                              • String ID:
                              • API String ID: 3261266694-0
                              • Opcode ID: e1d7fafc2cf221d04f7030d9903324b16297be3d6ff22d3005697a2ed8fefd8b
                              • Instruction ID: 1af81ff2141e66de29c256f70f72d3317be46490e7974e2e82b46faf41bdcbdc
                              • Opcode Fuzzy Hash: e1d7fafc2cf221d04f7030d9903324b16297be3d6ff22d3005697a2ed8fefd8b
                              • Instruction Fuzzy Hash: F2513871604B018FDB75CF69C588A66BBF1FF48324F048A6DEA968B6A0D730F845DB50
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: callocfree$memsetsrandstrlentime
                              • String ID:
                              • API String ID: 805530809-0
                              • Opcode ID: 8df7ddeea7a58c4449680d5ec35b5c58a00b120bf1e8c9585fecf5002bed7878
                              • Instruction ID: 97abb274f7e861881ca4886cbb565b47ebbdf9149c817afb65a6cadd01d8312a
                              • Opcode Fuzzy Hash: 8df7ddeea7a58c4449680d5ec35b5c58a00b120bf1e8c9585fecf5002bed7878
                              • Instruction Fuzzy Hash: D2513BB5A00704AFDB10DFA5C889A9EBFF8FF08300F50896EF95AD7640D775A9449B60
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$memset
                              • String ID:
                              • API String ID: 4054172246-0
                              • Opcode ID: 58181fc20751b5e770e5717c9ca2f925ef4a1910dd70294353fc14e74fdf6177
                              • Instruction ID: 1344da856e8de83f08c7153eb06810ae000fe1b0b45f889d21258a1c983e7ace
                              • Opcode Fuzzy Hash: 58181fc20751b5e770e5717c9ca2f925ef4a1910dd70294353fc14e74fdf6177
                              • Instruction Fuzzy Hash: A0516972500748AFD721DF65C84AB9ABBF8FF09700F10896DF64ADA140EB74E604DBA0
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,057CBB80,?,000000FF,00000000,00000000), ref: 057CB2C7
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,057CBB80), ref: 057CB308
                              • GetLastError.KERNEL32(?,?,?,057CBB80), ref: 057CB313
                              • CloseHandle.KERNEL32(00000000,?,?,?,057CBB80), ref: 057CB31C
                              • WSASetLastError.WS2_32(00000000,?,?,?,057CBB80), ref: 057CB323
                              • CloseHandle.KERNEL32(00000000,?,?,?,057CBB80), ref: 057CB332
                              • WSASetLastError.WS2_32(00000000,?,?,?,057CBB80), ref: 057CB355
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$CloseHandle$CreateEventObjectSingleWait
                              • String ID:
                              • API String ID: 1659421480-0
                              • Opcode ID: 0991e90416662c25cf06a82c612650d54ac554f0adec2a26b85c4182804eebc9
                              • Instruction ID: 68cf7986da0db66117dcf11f7c4721f802f806d97fdef2eb6c9bf709a9e02776
                              • Opcode Fuzzy Hash: 0991e90416662c25cf06a82c612650d54ac554f0adec2a26b85c4182804eebc9
                              • Instruction Fuzzy Hash: 70212932900614ABD7225A74DC8EEAF3F69FB48770F45475CF92AE71C0EA308D44E6A0
                              APIs
                              • memcmp.MSVCRT(?,057EDDC0,0000000C), ref: 057C4F94
                              • memcmp.MSVCRT(?,057EDDB0,0000000C), ref: 057C4FB6
                              • memcmp.MSVCRT(?,057EDDA0,0000000C), ref: 057C4FD8
                              • memcmp.MSVCRT(?,057EDD80,0000000C), ref: 057C5018
                              • memcmp.MSVCRT(?,057EDD70,0000000C), ref: 057C503A
                              • memcmp.MSVCRT(?,057EDD60,0000000C), ref: 057C505C
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID:
                              • API String ID: 1475443563-0
                              • Opcode ID: d134dbe006166cb7c6b889e2bbfa6cac9dad9d843ea7d0892bc3f77d7533af64
                              • Instruction ID: 94753fdbbcdfd378df9fb49bad5675390486c5a27143c6bdd5bab433417066a8
                              • Opcode Fuzzy Hash: d134dbe006166cb7c6b889e2bbfa6cac9dad9d843ea7d0892bc3f77d7533af64
                              • Instruction Fuzzy Hash: FB118CF3748725A1E530A2692D1BF3A1E0E5B2AB4AF4441EDFD09E9156E187E700B187
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp$callocfree
                              • String ID: factfmt RIFFdata
                              • API String ID: 254810267-2461439165
                              • Opcode ID: e411907253d0d1f837064ef20bf80e9264f9bf8f78c0daee0118acdeef07228e
                              • Instruction ID: 66b02115d609a2fb9cc4d1b129610741ced748c03d8473e44e885d2b83efa00d
                              • Opcode Fuzzy Hash: e411907253d0d1f837064ef20bf80e9264f9bf8f78c0daee0118acdeef07228e
                              • Instruction Fuzzy Hash: 82D1A072E042199BDF24DFA4C888BEEBBB9FF44714F0084AEE545A7241E734DA44DB61
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset$calloc
                              • String ID:
                              • API String ID: 1504270956-0
                              • Opcode ID: ea551b160cd66fe7ad9f7a1cade80fbb58a647f03e27691230362b7b7135a28f
                              • Instruction ID: c0e7b89ee94fdb5be72481e79c61bd6fddc29e45568d973fb780ce8a56072e78
                              • Opcode Fuzzy Hash: ea551b160cd66fe7ad9f7a1cade80fbb58a647f03e27691230362b7b7135a28f
                              • Instruction Fuzzy Hash: B9C11072A00209EBDB11DAA5CD88EEFB7FEBF44244F14456AE946D7140F630EB04AB71
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: strchr$memset
                              • String ID: 0123456789ABCDEF$0123456789abcdef
                              • API String ID: 3020236661-885041942
                              • Opcode ID: 42cb3bcda0be43ee5a223f1ba12019c4f0c747e570010292cc308e4fc432686a
                              • Instruction ID: 5b945fb7527286c6f40089a9006cb0e631b47d484203cef43227af306739a899
                              • Opcode Fuzzy Hash: 42cb3bcda0be43ee5a223f1ba12019c4f0c747e570010292cc308e4fc432686a
                              • Instruction Fuzzy Hash: 4A51C43190424ADFCF12CFA8C5859EEBFB9FB85354F1440AED86AA7200D7309E85DB90
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,?,?,057C8E0E,00000000,057CBB73,057CBBBA,057EEEE0,057CBBC2,057CBB73,00000000), ref: 057C8E1E
                              • InterlockedCompareExchange.KERNEL32(057CBB77,00000000,00000000), ref: 057C8E30
                              • SetEvent.KERNEL32(00000000,?,057C8E0E,00000000,057CBB73,057CBBBA,057EEEE0,057CBBC2,057CBB73,00000000), ref: 057C8E41
                              • CloseHandle.KERNEL32(00000000,?,057C8E0E,00000000,057CBB73,057CBBBA,057EEEE0,057CBBC2,057CBB73,00000000), ref: 057C8E4D
                              • WaitForSingleObject.KERNEL32(057CBB73,000000FF,?,057C8E0E,00000000,057CBB73,057CBBBA,057EEEE0,057CBBC2,057CBB73,00000000), ref: 057C8E58
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCompareCreateExchangeHandleInterlockedObjectSingleWait
                              • String ID:
                              • API String ID: 4206309166-0
                              • Opcode ID: 046f98369a3d274792d35dfb1e250f251d1c4ec818d475c8aaed6c5a4ad1a5e4
                              • Instruction ID: b048aed48483a14d6b8c920c760d84531d2e069c1971e1860365d62e5209ab9f
                              • Opcode Fuzzy Hash: 046f98369a3d274792d35dfb1e250f251d1c4ec818d475c8aaed6c5a4ad1a5e4
                              • Instruction Fuzzy Hash: 52F08235514304BBDB115FA0DC4EF963FACEB0C771F108515FA0A9A1C1EA7195409B61
                              APIs
                              • memcmp.MSVCRT(?,057EDD30,0000000E), ref: 057C50F7
                              • memcmp.MSVCRT(?,057EDD20,0000000E), ref: 057C5119
                              • memcmp.MSVCRT(?,057EDD10,0000000E), ref: 057C513B
                              • memcmp.MSVCRT(?,057EDD00,0000000E), ref: 057C515D
                              • memcmp.MSVCRT(?,057EDCF0,0000000E), ref: 057C517F
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID:
                              • API String ID: 1475443563-0
                              • Opcode ID: b840f2df05f93870fdee1edc111a1018bca407ff2eefdaa82045d7a9516142d3
                              • Instruction ID: 240a1c8b4ea894a9dc459cdac3f40a7c37deedbbf15f77c226ca9976d38fd4c3
                              • Opcode Fuzzy Hash: b840f2df05f93870fdee1edc111a1018bca407ff2eefdaa82045d7a9516142d3
                              • Instruction Fuzzy Hash: 9901A2F276838932E53052792E1FF351E4EA718B4AF4449EDBD09F8182F4A7F650B542
                              APIs
                              • memcmp.MSVCRT(?,057EDCE0,0000000F), ref: 057C51BA
                              • memcmp.MSVCRT(?,057EDCD0,0000000F), ref: 057C51D8
                              • memcmp.MSVCRT(?,057EDCC0,0000000F), ref: 057C51FA
                              • memcmp.MSVCRT(?,057EDCB0,0000000F), ref: 057C521C
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID:
                              • API String ID: 1475443563-0
                              • Opcode ID: 00b309a4f9f5f799ef792975f36afb78c89b63c741e436258e482e9bab178262
                              • Instruction ID: 0da86c5410948ccfb08da3159da1dddc7e2ad9cf6a7cefe0f8adf724ce2d71fe
                              • Opcode Fuzzy Hash: 00b309a4f9f5f799ef792975f36afb78c89b63c741e436258e482e9bab178262
                              • Instruction Fuzzy Hash: C4018BF274871236D53051691D0BF3A2E496B1AB86F4044FDAD09F895AF186EB017187
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: callocfree
                              • String ID: P
                              • API String ID: 306872129-3110715001
                              • Opcode ID: 001f240d6f431d2027c3824c4cc299c60711ce3b378b11b2800193439d89e906
                              • Instruction ID: e55cb13928cfb5315d984993b72585a2a7e99ccc67f2b0c57ea32af0ca2d6ef3
                              • Opcode Fuzzy Hash: 001f240d6f431d2027c3824c4cc299c60711ce3b378b11b2800193439d89e906
                              • Instruction Fuzzy Hash: 5D51D532709A009FD7769B28C889F697F9ABF45700F1884ECFC478F292E721E844A755
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddrFreeInfogetaddrinfohtonsmemset
                              • String ID:
                              • API String ID: 928751204-0
                              • Opcode ID: ae34b124981f52607683e1800c30586c238b28a46d934abda087d95056acfe5e
                              • Instruction ID: 864c6bbd2be9f2e81f92af07960e11e6ac826d6a27b71779f02bd522b303dfb1
                              • Opcode Fuzzy Hash: ae34b124981f52607683e1800c30586c238b28a46d934abda087d95056acfe5e
                              • Instruction Fuzzy Hash: D7316B71A00205EFDB24DF94C888BAEBBBAFF48310F15889DF4159B211E371EA55DB91
                              APIs
                              • WSARecv.WS2_32(?,?,00000001,00000000,?,00000000,00000000), ref: 057CA641
                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,?), ref: 057CA6F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.3000931439.00000000057C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 057C1000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_57c1000_dialer.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastRecv
                              • String ID: E'
                              • API String ID: 904507345-3751625834
                              • Opcode ID: 3a5b01b889b47b4bd0e19c3df835c29d42ec83b08a46266d78578e6f130c031e
                              • Instruction ID: c45d6cb93f52810f89a8ad91f0d627a7b1bff392a344ffc859c4eab8a1534225
                              • Opcode Fuzzy Hash: 3a5b01b889b47b4bd0e19c3df835c29d42ec83b08a46266d78578e6f130c031e
                              • Instruction Fuzzy Hash: 2B81D47050470CAFDB318F14C888EAA7FF6FF04366F04469DE95696690E731EA85EB90