Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TEKujpTgCK.exe

Overview

General Information

Sample name:TEKujpTgCK.exe
renamed because original name is a hash value
Original sample name:c84ddc7daab32f1835872b0afe99f3691d7ced32cbd253af31ea8a2f121afc15.exe
Analysis ID:1558461
MD5:65c23b196d8c066197b3d6e9fc3282a2
SHA1:7a2412047c4c9d9bd3648600240482122173cb44
SHA256:c84ddc7daab32f1835872b0afe99f3691d7ced32cbd253af31ea8a2f121afc15
Tags:27-124-18-16exeuser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Bypasses PowerShell execution policy
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • TEKujpTgCK.exe (PID: 4832 cmdline: "C:\Users\user\Desktop\TEKujpTgCK.exe" MD5: 65C23B196D8C066197B3D6E9FC3282A2)
    • cmd.exe (PID: 4712 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ShellExperienceHosts.exe (PID: 1680 cmdline: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe MD5: 0922B22053A6D5D9516EA910D34A4771)
        • cmd.exe (PID: 7044 cmdline: cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 6008 cmdline: tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 4028 cmdline: findstr /I "ShellExperienceHosts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 2700 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 7040 cmdline: tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 3848 cmdline: findstr /I "ShellExperienceHosts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 1252 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 6972 cmdline: tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 3788 cmdline: findstr /I "ShellExperienceHosts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • ShellExperienceHosts.exe (PID: 3208 cmdline: "C:\Users\Public\Downloads\program\ShellExperienceHosts.exe" MD5: 0922B22053A6D5D9516EA910D34A4771)
          • timeout.exe (PID: 3056 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 6172 cmdline: tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 2124 cmdline: findstr /I "ShellExperienceHosts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 5888 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • cmd.exe (PID: 6552 cmdline: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 6528 cmdline: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 2788 cmdline: cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 6592 cmdline: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, CommandLine: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, NewProcessName: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, OriginalFileName: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4712, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, ProcessId: 1680, ProcessName: ShellExperienceHosts.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, ParentImage: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, ParentProcessId: 1680, ParentProcessName: ShellExperienceHosts.exe, ProcessCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 6552, ProcessName: cmd.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 27.124.18.16, DestinationIsIpv6: false, DestinationPort: 18852, EventID: 3, Image: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe, Initiated: true, ProcessId: 1680, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49718
Source: Process startedAuthor: frack113: Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6552, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 6528, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6552, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 6528, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C844E30 CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,4_2_6C844E30
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C844F50 CryptStringToBinaryA,CryptAcquireContextW,CryptDestroyHash,CryptReleaseContext,4_2_6C844F50
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8452A0 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,4_2_6C8452A0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C854E30 CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,24_2_6C854E30
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C854F50 CryptStringToBinaryA,CryptAcquireContextW,CryptDestroyHash,CryptReleaseContext,24_2_6C854F50
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8552A0 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,24_2_6C8552A0
Source: TEKujpTgCK.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3010744824.0000000006E00000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3010259870.0000000006DE4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win32_VS2019_nondev_i_r\WindowsPlayer_Master_il2cpp_x86.pdb source: ShellExperienceHosts.exe, ShellExperienceHosts.exe, 00000018.00000000.3480911780.000000000040C000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3017814528.0000000007EDA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdbE source: powershell.exe, 00000012.00000002.3017814528.0000000007EDA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \Release\yyzyBase.pdb source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe, 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmp, ShellExperienceHosts.exe, 00000018.00000002.3949001935.000000006CA17000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbt source: powershell.exe, 00000012.00000002.3010259870.0000000006DE4000.00000004.00000020.00020000.00000000.sdmp
Source: global trafficTCP traffic: 192.168.2.5:49718 -> 27.124.18.16:18852
Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
Source: unknownTCP traffic detected without corresponding DNS query: 27.124.18.16
Source: unknownTCP traffic detected without corresponding DNS query: 27.124.18.16
Source: unknownTCP traffic detected without corresponding DNS query: 27.124.18.16
Source: unknownTCP traffic detected without corresponding DNS query: 27.124.18.16
Source: unknownTCP traffic detected without corresponding DNS query: 27.124.18.16
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C856130 CreateThread,CreateThread,WSAStartup,getaddrinfo,closesocket,connect,socket,connect,closesocket,freeaddrinfo,recv,recv,VirtualAlloc,WSACleanup,WSACleanup,4_2_6C856130
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: powershell.exe, 00000011.00000002.3024932884.0000000008934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.T
Source: powershell.exe, 00000011.00000002.3025196023.000000000893E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m2
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: powershell.exe, 00000011.00000002.3011201303.0000000006160000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000011.00000002.2991030343.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2991030343.00000000058C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000011.00000002.2991030343.0000000005101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000011.00000002.2991030343.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2991030343.00000000058C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: powershell.exe, 00000011.00000002.2991030343.0000000005101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBsq
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
Source: powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: tsetup-x64.5.4.0.exe.0.drString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: powershell.exe, 00000011.00000002.3011201303.0000000006160000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C86834F GetKeyState,GetKeyState,GetKeyState,SendMessageW,4_2_6C86834F
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C87834F GetKeyState,GetKeyState,GetKeyState,SendMessageW,24_2_6C87834F
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8452A0 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,4_2_6C8452A0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8552A0 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,24_2_6C8552A0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8500A04_2_6C8500A0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9CCED04_2_6C9CCED0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C89E8374_2_6C89E837
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C868A354_2_6C868A35
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C8A544_2_6C9C8A54
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C91EBD14_2_6C91EBD1
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9E04284_2_6C9E0428
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9D60004_2_6C9D6000
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9EC3784_2_6C9EC378
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C91BD124_2_6C91BD12
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9D3FCB4_2_6C9D3FCB
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9D1B544_2_6C9D1B54
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9A15014_2_6C9A1501
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C84D6804_2_6C84D680
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9D17F54_2_6C9D17F5
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_028212DD18_2_028212DD
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9DCED024_2_6C9DCED0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8AE83724_2_6C8AE837
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C878A3524_2_6C878A35
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9D8A5424_2_6C9D8A54
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C92EBD124_2_6C92EBD1
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9F042824_2_6C9F0428
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8600A024_2_6C8600A0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9E600024_2_6C9E6000
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9FC37824_2_6C9FC378
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C92BD1224_2_6C92BD12
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9E3FCB24_2_6C9E3FCB
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9E1B5424_2_6C9E1B54
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9B150124_2_6C9B1501
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C85D68024_2_6C85D680
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9E17F524_2_6C9E17F5
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9C8290 appears 74 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9D7DCB appears 72 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C88135E appears 39 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9C81E5 appears 53 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9D8290 appears 74 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C882C67 appears 45 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C87135E appears 39 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9D81E5 appears 53 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9C81B2 appears 228 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C872C67 appears 45 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9D81B2 appears 228 times
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: String function: 6C9C7DCB appears 72 times
Source: TEKujpTgCK.exe, 00000000.00000000.2098546816.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs TEKujpTgCK.exe
Source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002DF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMFCApplication4.exe8 vs TEKujpTgCK.exe
Source: TEKujpTgCK.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs TEKujpTgCK.exe
Source: TEKujpTgCK.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ShellExperienceHosts.exe.0.drStatic PE information: Section: .tp6 ZLIB complexity 1.000637755102041
Source: classification engineClassification label: mal64.evad.winEXE@45/25@0/1
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C857560 CreateToolhelp32Snapshot,Process32FirstW,WideCharToMultiByte,Process32NextW,CloseHandle,Sleep,4_2_6C857560
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C857850 GetFileAttributesA,SHGetFolderPathA,GetFileAttributesA,CoInitialize,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,CoUninitialize,4_2_6C857850
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C857210 GetModuleHandleA,FindResourceW,LoadResource,SizeofResource,LockResource,4_2_6C857210
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile created: C:\Users\Public\Downloads\programJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1048:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6540:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5536:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3480:120:WilError_03
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeFile created: C:\Users\user\AppData\Local\Temp\monitor.batJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
Source: TEKujpTgCK.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SHELLEXPERIENCEHOSTS.EXE&apos;
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SHELLEXPERIENCEHOSTS.EXE&apos;
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SHELLEXPERIENCEHOSTS.EXE&apos;
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SHELLEXPERIENCEHOSTS.EXE&apos;
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TEKujpTgCK.exeString found in binary or memory: cc-add-resource
Source: TEKujpTgCK.exeString found in binary or memory: (cc-add-resource gold 100)
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile read: C:\Users\user\Desktop\TEKujpTgCK.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\TEKujpTgCK.exe "C:\Users\user\Desktop\TEKujpTgCK.exe"
Source: C:\Users\user\Desktop\TEKujpTgCK.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe "C:\Users\Public\Downloads\program\ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
Source: C:\Users\user\Desktop\TEKujpTgCK.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe C:\Users\Public\Downloads\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe "C:\Users\Public\Downloads\program\ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: yyzybase.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: yyzybase.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: msimg32.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: uxtheme.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: oledlg.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: oleacc.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeSection loaded: winmm.dll
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
Source: tsetup-x64.5.4.0.exe.lnk.4.drLNK file: ..\..\Public\Downloads\tsetup-x64.5.4.0.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: TEKujpTgCK.exeStatic file information: File size 47407259 > 1048576
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3010744824.0000000006E00000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3010259870.0000000006DE4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win32_VS2019_nondev_i_r\WindowsPlayer_Master_il2cpp_x86.pdb source: ShellExperienceHosts.exe, ShellExperienceHosts.exe, 00000018.00000000.3480911780.000000000040C000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.3017814528.0000000007EDA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdbE source: powershell.exe, 00000012.00000002.3017814528.0000000007EDA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \Release\yyzyBase.pdb source: TEKujpTgCK.exe, 00000000.00000003.2160518996.0000000002B71000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe, 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmp, ShellExperienceHosts.exe, 00000018.00000002.3949001935.000000006CA17000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbt source: powershell.exe, 00000012.00000002.3010259870.0000000006DE4000.00000004.00000020.00020000.00000000.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .tp6d
Source: yyzyBase.dll.0.drStatic PE information: real checksum: 0x2d0cdc should be: 0x2d37bd
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6a
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6d
Source: tsetup-x64.5.4.0.exe.0.drStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\TEKujpTgCK.exeCode function: 0_2_00950E38 push C00095BAh; retf 0_2_00950E3D
Source: C:\Users\user\Desktop\TEKujpTgCK.exeCode function: 0_2_0095D3CB pushfd ; ret 0_2_0095D3E2
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AC77 push edi; ret 4_2_6C85AC79
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AD23 push edi; ret 4_2_6C85AD25
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AE3E push edi; ret 4_2_6C85AE40
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AF02 push edi; ret 4_2_6C85AF04
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A93B push edi; ret 4_2_6C85A93D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AA17 push edi; ret 4_2_6C85AA19
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85AB16 push edi; ret 4_2_6C85AB18
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A44F push esi; ret 4_2_6C85A451
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A5E9 push esi; ret 4_2_6C85A5EB
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A68F push edi; ret 4_2_6C85A691
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A7E2 push edi; ret 4_2_6C85A7E4
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C8180 push ecx; ret 4_2_6C9C8193
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A20F push esi; ret 4_2_6C85A211
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85A358 push esi; ret 4_2_6C85A35A
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B804 push esi; ret 4_2_6C85B806
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B579 push esi; ret 4_2_6C85B57B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B6B9 push esi; ret 4_2_6C85B6BB
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B093 push edi; ret 4_2_6C85B095
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B1E4 push edi; ret 4_2_6C85B1E6
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B2A8 push edi; ret 4_2_6C85B2AA
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C85B359 push edi; ret 4_2_6C85B35B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AC77 push edi; ret 24_2_6C86AC79
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AD23 push edi; ret 24_2_6C86AD25
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AE3E push edi; ret 24_2_6C86AE40
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AF02 push edi; ret 24_2_6C86AF04
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86A93B push edi; ret 24_2_6C86A93D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AA17 push edi; ret 24_2_6C86AA19
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86AB16 push edi; ret 24_2_6C86AB18
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C86A44F push esi; ret 24_2_6C86A451
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6 entropy: 7.9916235972250025
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6d entropy: 7.90195668192099
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile created: C:\Users\Public\Downloads\program\yyzyBase.dllJump to dropped file
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeJump to dropped file
Source: C:\Users\user\Desktop\TEKujpTgCK.exeFile created: C:\Users\Public\Downloads\tsetup-x64.5.4.0.exeJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C87400C SetForegroundWindow,IsIconic,PostMessageW,IsIconic,4_2_6C87400C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C87400C SetForegroundWindow,IsIconic,PostMessageW,IsIconic,4_2_6C87400C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8EA161 IsWindowVisible,IsWindowVisible,GetWindowRect,IsIconic,CopyRect,MonitorFromPoint,GetMonitorInfoW,CopyRect,CopyRect,SystemParametersInfoW,OffsetRect,GetSystemMetrics,GetSystemMetrics,4_2_6C8EA161
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C859DE0 IsIconic,GetClientRect,4_2_6C859DE0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C869A46 IsIconic,4_2_6C869A46
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C87741B IsWindowVisible,IsIconic,4_2_6C87741B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8E935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C8E935C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8E935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C8E935C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8E935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C8E935C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C88400C SetForegroundWindow,IsIconic,PostMessageW,IsIconic,24_2_6C88400C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C88400C SetForegroundWindow,IsIconic,PostMessageW,IsIconic,24_2_6C88400C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8FA161 IsWindowVisible,IsWindowVisible,GetWindowRect,IsIconic,CopyRect,MonitorFromPoint,GetMonitorInfoW,CopyRect,CopyRect,SystemParametersInfoW,OffsetRect,GetSystemMetrics,GetSystemMetrics,24_2_6C8FA161
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C869DE0 IsIconic,GetClientRect,24_2_6C869DE0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C879A46 IsIconic,24_2_6C879A46
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C88741B IsWindowVisible,IsIconic,24_2_6C88741B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8F935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,24_2_6C8F935C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8F935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,24_2_6C8F935C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C8F935C IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,24_2_6C8F935C
Source: C:\Users\user\Desktop\TEKujpTgCK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4026Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7686Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1892Jump to behavior
Source: C:\Users\user\Desktop\TEKujpTgCK.exeDropped PE file which has not been started: C:\Users\Public\Downloads\tsetup-x64.5.4.0.exeJump to dropped file
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeAPI coverage: 7.3 %
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeAPI coverage: 3.9 %
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe TID: 4984Thread sleep time: -73000s >= -30000sJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe TID: 1220Thread sleep time: -78000s >= -30000sJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe TID: 2448Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\timeout.exe TID: 1048Thread sleep count: 266 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1240Thread sleep count: 4026 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2436Thread sleep count: 331 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6324Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6456Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1516Thread sleep count: 7686 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 572Thread sleep count: 1892 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6192Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\timeout.exe TID: 5020Thread sleep count: 264 > 30Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe TID: 3008Thread sleep time: -73000s >= -30000s
Source: C:\Windows\SysWOW64\timeout.exe TID: 3964Thread sleep count: 268 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 4196Thread sleep count: 150 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeThread delayed: delay time: 73000Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeThread delayed: delay time: 73000
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
Source: tsetup-x64.5.4.0.exe.0.drBinary or memory string: qemU]a0\LS
Source: tsetup-x64.5.4.0.exe.0.drBinary or memory string: IHGfs
Source: powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
Source: ShellExperienceHosts.exe, 00000004.00000002.3181115549.00000000005EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C8D8D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C9C8D8D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C86479B OutputDebugStringA,GetLastError,4_2_6C86479B
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C8D8D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C9C8D8D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9D2A72 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C9D2A72
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C84AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6C9C84AC
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9D8D8D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_6C9D8D8D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9E2A72 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_6C9E2A72
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 24_2_6C9D84AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_6C9D84AC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
Source: C:\Users\user\Desktop\TEKujpTgCK.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe C:\Users\Public\Downloads\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Downloads\program\ShellExperienceHosts.exe "C:\Users\Public\Downloads\program\ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "ShellExperienceHosts.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_6C9EEEAC
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C9E602C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_6C9EF821
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C9E5AC0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C9EF51C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_6C9EF645
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C9EF74B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C9EF0B1
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C9EF1A3
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C9EF158
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_6C9EF2C9
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C9EF23E
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,24_2_6C9FEEAC
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,24_2_6C9F602C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,24_2_6C9FF821
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,24_2_6C9F5AC0
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,24_2_6C9FF51C
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,24_2_6C9FF645
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,24_2_6C9FF74B
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,24_2_6C9FF0B1
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,24_2_6C9FF1A3
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,24_2_6C9FF158
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,24_2_6C9FF2C9
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,24_2_6C9FF23E
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C9C8EAA GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_6C9C8EAA
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeCode function: 4_2_6C8F666D __EH_prolog3_GS,GetCurrentThread,GetCurrentThreadId,GetVersionExW,4_2_6C8F666D
Source: C:\Users\Public\Downloads\program\ShellExperienceHosts.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Windows Management Instrumentation
1
Scripting
11
Process Injection
1
Masquerading
1
Input Capture
1
System Time Discovery
Remote Services1
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
PowerShell
Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets11
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Software Packing
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558461 Sample: TEKujpTgCK.exe Startdate: 19/11/2024 Architecture: WINDOWS Score: 64 54 AI detected suspicious sample 2->54 56 Sigma detected: Suspicious Program Location with Network Connections 2->56 58 Sigma detected: Execution from Suspicious Folder 2->58 60 Sigma detected: Parent in Public Folder Suspicious Process 2->60 9 TEKujpTgCK.exe 8 2->9         started        process3 file4 46 C:\Users\Public\...\ShellExperienceHosts.exe, PE32 9->46 dropped 48 C:\Users\Public\...\tsetup-x64.5.4.0.exe, PE32 9->48 dropped 50 C:\Users\Public\Downloads\...\yyzyBase.dll, PE32 9->50 dropped 12 cmd.exe 1 9->12         started        process5 signatures6 64 Bypasses PowerShell execution policy 12->64 15 ShellExperienceHosts.exe 6 12->15         started        19 conhost.exe 12->19         started        process7 dnsIp8 52 27.124.18.16, 18852 BCPL-SGBGPNETGlobalASNSG Singapore 15->52 44 C:\Users\user\AppData\Local\updated.ps1, ASCII 15->44 dropped 21 cmd.exe 1 15->21         started        23 cmd.exe 1 15->23         started        25 cmd.exe 1 15->25         started        file9 process10 process11 27 powershell.exe 1 22 21->27         started        30 conhost.exe 21->30         started        32 powershell.exe 37 23->32         started        34 conhost.exe 23->34         started        36 conhost.exe 25->36         started        38 tasklist.exe 1 25->38         started        40 tasklist.exe 1 25->40         started        42 11 other processes 25->42 signatures12 62 Loading BitLocker PowerShell Module 32->62

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TEKujpTgCK.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\Public\Downloads\program\ShellExperienceHosts.exe0%ReversingLabs
C:\Users\Public\Downloads\program\yyzyBase.dll3%ReversingLabs
C:\Users\Public\Downloads\tsetup-x64.5.4.0.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.m20%Avira URL Cloudsafe
http://crl.T0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUtsetup-x64.5.4.0.exe.0.drfalse
    high
    http://nuget.org/NuGet.exepowershell.exe, 00000011.00000002.3011201303.0000000006160000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000011.00000002.2991030343.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2991030343.00000000058C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://crl.m2powershell.exe, 00000011.00000002.3025196023.000000000893E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.2991030343.0000000005256000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2991030343.00000000058C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://nuget.org/nuget.exepowershell.exe, 00000011.00000002.3011201303.0000000006160000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Iconpowershell.exe, 00000012.00000002.3001331600.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.Tpowershell.exe, 00000011.00000002.3024932884.0000000008934000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.2991030343.0000000005101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.0000000004271000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://aka.ms/pscore6lBsqpowershell.exe, 00000011.00000002.2991030343.0000000005101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2990788974.0000000004271000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/Pester/Pesterpowershell.exe, 00000012.00000002.2990788974.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              27.124.18.16
                              unknownSingapore
                              64050BCPL-SGBGPNETGlobalASNSGtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1558461
                              Start date and time:2024-11-19 13:59:50 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 34s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Run name:Run with higher sleep bypass
                              Number of analysed new started processes analysed:29
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:TEKujpTgCK.exe
                              renamed because original name is a hash value
                              Original Sample Name:c84ddc7daab32f1835872b0afe99f3691d7ced32cbd253af31ea8a2f121afc15.exe
                              Detection:MAL
                              Classification:mal64.evad.winEXE@45/25@0/1
                              EGA Information:
                              • Successful, ratio: 40%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 73
                              • Number of non-executed functions: 293
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com
                              • Execution Graph export aborted for target TEKujpTgCK.exe, PID 4832 because there are no executed function
                              • Execution Graph export aborted for target powershell.exe, PID 6528 because it is empty
                              • Execution Graph export aborted for target powershell.exe, PID 6592 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: TEKujpTgCK.exe
                              No simulations
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              BCPL-SGBGPNETGlobalASNSGwFg25zfjIL.dllGet hashmaliciousUnknownBrowse
                              • 192.253.235.75
                              wFg25zfjIL.dllGet hashmaliciousUnknownBrowse
                              • 192.253.235.75
                              http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                              • 27.124.9.52
                              qkbfi86.elfGet hashmaliciousMiraiBrowse
                              • 118.107.53.186
                              DsQEFiMzra.exeGet hashmaliciousGhostRat, NitolBrowse
                              • 27.124.47.7
                              http://shoutout.wix.comGet hashmaliciousUnknownBrowse
                              • 202.79.161.103
                              #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeGet hashmaliciousUnknownBrowse
                              • 137.220.137.85
                              #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeGet hashmaliciousUnknownBrowse
                              • 137.220.137.85
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 134.122.132.94
                              libcurl64.dll.bin.dllGet hashmaliciousUnknownBrowse
                              • 27.124.45.155
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\Public\Downloads\tsetup-x64.5.4.0.exehttp://successguilddi.info/Get hashmaliciousUnknownBrowse
                                Process:C:\Users\user\Desktop\TEKujpTgCK.exe
                                File Type:openssl enc'd data with salted password, base64 encoded
                                Category:dropped
                                Size (bytes):56
                                Entropy (8bit):5.173251796980338
                                Encrypted:false
                                SSDEEP:3:iqk94GNUUxkiuNS8:ilNNJH8
                                MD5:3534422D0B85476052455B2D51291AED
                                SHA1:AA9DBBE75FAB93AFD7E830EE8E743D9F9E12794F
                                SHA-256:BB6EB6543FF1435FD5259ACEDAA08EBDE27A53418F55464BAA9D160197D67364
                                SHA-512:E7599A845308EB7CEA6978F4FA9F6C837ECFF373C5D9AACC96573087163380E6B112AF125E6195868A3B8AE5E67C6C1F1C588D2364FBD9F723788392B5ECD62D
                                Malicious:false
                                Preview:U2FsdGVkX18ZrUfJM1q4htGAqi0PFxwUl2He6tG8HSioTpsLh6QV7g==
                                Process:C:\Users\user\Desktop\TEKujpTgCK.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):649416
                                Entropy (8bit):6.182028963232553
                                Encrypted:false
                                SSDEEP:12288:zohLz8nnnnntnnnnnnnnnnnnnnnxnMvnnnnPZnnnnPxnnnnnnnnqshJSLnk41mCL:zshQmC5Bz5CLgBFqGI1yi/UQeZndsqro
                                MD5:0922B22053A6D5D9516EA910D34A4771
                                SHA1:784D3ED35D040091AE209792E2FA8FC97EE6A071
                                SHA-256:41F413DEBFE785B95D852A396AEFE1C814F3C13BDEDF85526F2DC4E83127D6CA
                                SHA-512:909EC8B2C1045CC11C03C6B82B7ED6AD96BC8E93F9C98CB8A668572C84CBBCE778C12365B2B2EB547218783A830BE41458E0AE21939E99339F54921D98D944D8
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.....U..U..U]..T..U]..T..U]..T..U]..T..U...T#.U...T..U...T..U...T..U..UW.U...T..U...T..U..[U..U...T..URich..U........................PE..L......d..........".......... ....../.............@.......................... ..................................................(....@...................\..............T........................... ...@............................................tp6............b.................. ..`.tp6.a..nZ.......\...f..............@..@.tp6......... ......................@..@.tp6.........@......................@..@.tp6d...5%.......&...f.............. ...................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\TEKujpTgCK.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2934784
                                Entropy (8bit):6.677264152867375
                                Encrypted:false
                                SSDEEP:49152:JCeuTwfSCMj8ctcrWLGFt3cai8e8jRJVJmfrO0jbjjeDXjRD6i+uSwZPSCdDS+Ok:JCeuEKCMj8XrW6z3caiYRJArO0jLeDXb
                                MD5:BBC7F7FACC3667AF1B57D80FD6D12839
                                SHA1:6CAC9DA94670F0A04ED7A4539C8FC2E71BD93563
                                SHA-256:C8E901576C91D2CE6821B4F807E3ACE7F28A81E5491C7779B89171E8187B76C6
                                SHA-512:928F7EF931D4B6F12717C42031C3B82E2594A38909DE5D2D1E9CD0F5314959AEF6BB123941A0C37CCB04799C3EFF6FED0E0BACEC1F2D0A69F5DF34CC1C85FBD5
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 3%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............._..._..._...^..._...^..._...^..._...^..._...^..._..._..._.T.^..._.T.^..._.T.^P.._HT.^..._HT.^..._HT._..._..p_..._HT.^..._Rich..._................PE..L....^<g...........!...*.T...p......O........p...............................@-.......-...@......................... j".L...lj"......p#..<....................*.\....p .p....................p .....Po .@............p...............................text....S.......T.................. ..`.rdata...5...p...6...X..............@..@.data...H....."..n....".............@....rsrc....<...p#..>....".............@..@.reloc..\.....*......:*.............@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\TEKujpTgCK.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):45728224
                                Entropy (8bit):7.9979617231953934
                                Encrypted:true
                                SSDEEP:786432:nDiGFUGfCK7mtYVMprAcknQyI1PnRbKPkBE25MmXeVYg9n:n1CLtYVMdAcYjGPnpfi25Mj5
                                MD5:45177991CB1978D5CB3C06461AE8BE12
                                SHA1:C2AA0581C86EAE32CC3D7DA720BF5E7B6E019E0E
                                SHA-256:B9C5F836DCBEF426B53B882FA4CD0CBEBD9C43F1734FC20B5001AB9823B8A318
                                SHA-512:1B56141CE39B0CBE585574B7C314ACBD7011B4352BF481B80D3C24863198974E885D61E4B92F9E26429E02AF5D3E8D467AF117EA38A2ACB22E8A836E5E7219A7
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: , Detection: malicious, Browse
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................R...........^.......p....@..........................@......O....@......@...................@....... .......p..<...............+...................................`......................."..T....0.......................text....9.......:.................. ..`.itext.......P.......>.............. ..`.data....7...p...8...V..............@....bss.....m...............................idata....... ......................@....didata......0......................@....edata.......@......................@..@.tls.........P...........................rdata..]....`......................@..@.rsrc...<....p......................@..@....................................@..@........................................................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1360
                                Entropy (8bit):5.407676655132095
                                Encrypted:false
                                SSDEEP:24:3vWSKco4KmZjKbm51s4RPT6moUebIKo+mZ9tXt/NK3R88bJ02raW3b1:fWSU4xymI4RfoUeW+mZ9tlNWR832Oab1
                                MD5:1A0E2627D1A4A2F7155D77FB0F659CDC
                                SHA1:26AADC0A5CDDB72C6DCC5B8F9798D50DA82C470A
                                SHA-256:AF045D0688C1DA168D42FE8E6F35398BDE8AB7A880C6132C9D0DC5AF4D6C024F
                                SHA-512:30A47CEA4533781E63730B28B49CA40635563A5B05F2F10A3B1128210C8A8B26008776C8BC35B965688E94379304479998D5367D93FC6B835CDF82F598F37911
                                Malicious:false
                                Preview:@...e...........................................................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                Process:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1893
                                Entropy (8bit):5.212287775015203
                                Encrypted:false
                                SSDEEP:48:c55XzDl4Q2ZbXL6Q0QFdOFQOzN33O4OiDdKrKsTLXbGMv:O5XzDl4Q2ZbGQhFdOFQOzBdKrKsTLXbV
                                MD5:E3FB2ECD2AD10C30913339D97E0E9042
                                SHA1:A004CE2B3D398312B80E2955E76BDA69EF9B7203
                                SHA-256:1BD6DB55FFF870C9DF7A0AAC11B895B50F57774F20A5744E63BBC3BD40D11F28
                                SHA-512:9D6F0C1E344F1DC5A0EF4CAAD86281F92A6C108E1085BACD8D6143F9C742198C2F759CA5BDFFAD4D9E40203E6B0460E84896D1C6B8B1759350452E1DE809B716
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2006-11-10T14:29:55.5851926</Date>. <Author>Microsoft Corporation</Author>. <Description>????? AD RMS ?????????????????? Web ?????????,???????????</Description>. <URI>\AS AMD updata</URI>. <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;WD)</SecurityDescriptor>. </RegistrationInfo>. <Triggers>. <LogonTrigger id="06b3f632-87ad-4ac0-9737-48ea5ddbaf11">. <Enabled>true</Enabled>. <Delay>PT30S</Delay>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id="AllUsers">. <GroupId>S-1-1-0</GroupId>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>. <AllowHardTerm
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):331
                                Entropy (8bit):5.087441810176568
                                Encrypted:false
                                SSDEEP:6:hZalWFWdVWCbi4WMkAIvWWdVW+KIaH9JZ1UhojWMkAIvEsDm1XWWChSwsFdWWCqJ:NFWdVWCeqlWdVW+EJzbSDm1BChSwkPCs
                                MD5:AB66A4F9D5D452803EA922D20618A4A3
                                SHA1:AC16D30EF88CF2211A01A7CC0C4F6BEB087346CE
                                SHA-256:C9291DC8A6270465AB76414712A2A96C83A6D05B0EC537B43BCE67ACE4332E2D
                                SHA-512:D7397E4F1997E090B7A76DC4F99A0BC52BC570D667FB6DD00F713FB6DCA224803C9F7C2510CED1F3EC9273D932E44F96E90F340EC569E6E441E9D0101D7D64C4
                                Malicious:false
                                Preview:@echo off..:CheckProcess..set "ProcessName=ShellExperienceHosts.exe"..set "ProcessPath=C:\Users\Public\Downloads\program\ShellExperienceHosts.exe"..tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul..if %ERRORLEVEL% neq 0 (.. start "" "%ProcessPath%"..)..timeout /t 30 /nobreak >nul..goto CheckProcess..
                                Process:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:mRR:m3
                                MD5:782086ACBE9F48126642E093BF6BA151
                                SHA1:295C439DE6A7CCD326761A140E1084810E081BC1
                                SHA-256:285506A8469E1A75E8DDC9AC00E52D72AF03D35D8923B1B199C45D7C770B1E14
                                SHA-512:1A386F77962FB6C84A3682E5D65018EC08F20CAFB4B7E4233C3E5B7459DA36E4E48E40790AA0A845FC37D2FBA795BF29EE89FF0F5411C33E84C9CDB1C26D3BB3
                                Malicious:false
                                Preview:7044
                                Process:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):151
                                Entropy (8bit):4.741657013789009
                                Encrypted:false
                                SSDEEP:3:41Ai+PBoAwnLFsI2FIERMJyjqLWAfXIhS/ytIEFMEQVGdAn:4yi+5dwnLFsI2F5KJy0fXnMFFQhn
                                MD5:AA0E1012D3B7C24FAD1BE4806756C2CF
                                SHA1:FE0D130AF9105D9044FF3D657D1ABEAF0B750516
                                SHA-256:FC47E1FA89397C3139D9047DC667531A9153A339F8E29AC713E518D51A995897
                                SHA-512:15FAE192951747A0C71059F608700F88548F3E60BB5C708B206BF793A7E3D059A278F2058D4AC86B86781B202037401A29602EE4D6C0CBAAFF532CEF311975F4
                                Malicious:true
                                Preview:$xmlPath = "XML??".$taskName = "????".$xmlContent = Get-Content -Path $xmlPath | Out-String.Register-ScheduledTask -Xml $xmlContent -TaskName $taskName
                                Process:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Nov 19 12:00:47 2024, mtime=Tue Nov 19 12:00:51 2024, atime=Wed Aug 28 17:05:37 2024, length=45728224, window=hide
                                Category:dropped
                                Size (bytes):1138
                                Entropy (8bit):4.678118947622308
                                Encrypted:false
                                SSDEEP:12:8UW/EKUYTCECHqXC/A4Xx3ACm6f2UmXM9CFrldLHbIAjAyzJ5SRTQ/azMXwCLCgv:81V1nn7IUAyzbSRkCAXwm1qygm
                                MD5:F637FAE116583F66B72B832799144C81
                                SHA1:23D66332D6308872556ADE88B9695E5559BD147A
                                SHA-256:5EC67F864CFFF137712B1C247B0E5B6D00E980AD9D8CBCBB2F14FB0B5CABBBCC
                                SHA-512:BC28A2139A990AFAEB3C308D22D04B872BB18DDF3B3184CFF6953A98B6933A3F1F9010DFBE4D16AE6F1464790F7452D3753B6E017CE0F87069899EF7A6FC9004
                                Malicious:false
                                Preview:L..................F.... ...f....:.......:..k9..t................................P.O. .:i.....+00.../C:\...................x.1.....DW(m..Users.d......OwHsY.h....................:.....NvM.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1.....CW!H..Public..f......O.IsY.h....+...............<.....r.E.P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.......1.....sY.h..Downloads.l......O.IsY.h....................B.........D.o.w.n.l.o.a.d.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.0.8.....v.2......Y.. .TSETUP~1.EXE..Z......sY.hsY.h............................I.t.s.e.t.u.p.-.x.6.4...5...4...0...e.x.e.......]...............-.......\...........P..j.....C:\Users\Public\Downloads\tsetup-x64.5.4.0.exe..+.....\.....\.P.u.b.l.i.c.\.D.o.w.n.l.o.a.d.s.\.t.s.e.t.u.p.-.x.6.4...5...4...0...e.x.e..........Ld=..0O.E.p#_y.....`.......X.......760639...........hT..CrF.f4... ..|2=.b...,...W..hT..CrF.f4... ..|2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1
                                Process:C:\Windows\SysWOW64\timeout.exe
                                File Type:ASCII text, with CRLF line terminators, with overstriking
                                Category:dropped
                                Size (bytes):118
                                Entropy (8bit):4.231779304291169
                                Encrypted:false
                                SSDEEP:3:hYFRZARcWmFsFJQZ/ctXvY/4to/9uF8cttEfYhnQUW:hYFRamFSQZ0lv5y/9JctESnQUW
                                MD5:EA4370C6D3E1915502DEABAFCFE379F1
                                SHA1:B32FFD2D69DF742E47EA86D0D739717CF6B147D3
                                SHA-256:A8DFD19D19766FFD7DBEE9742F933099850C2594A81BDD38CA900A8255FD3B92
                                SHA-512:C66EC971096851DF7A923F0602F6760AA544B84D474515E1A10B31FC44A473A7A3CA66370475084931A920BA45558EEE5BCCAEB82A4781FEF302CDF68AF00266
                                Malicious:false
                                Preview:..Waiting for 30 seconds, press CTRL+C to quit .....29..28..27..26..25..24..23..22..21..20..19..18..17..16..15..14..13
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.999165933604983
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:TEKujpTgCK.exe
                                File size:47'407'259 bytes
                                MD5:65c23b196d8c066197b3d6e9fc3282a2
                                SHA1:7a2412047c4c9d9bd3648600240482122173cb44
                                SHA256:c84ddc7daab32f1835872b0afe99f3691d7ced32cbd253af31ea8a2f121afc15
                                SHA512:1c98f3ee1262af666c22411c18e08b0175887468bf1c186e19fa5ddd845083f36006ded99e11878f303910547bee3324dcc730628cd1b3214d382c37042831f2
                                SSDEEP:786432:pOq/jN3x1O1e7yR4mUsc4dtCO6eZST5u3TzmFIlgkAAXSo8K2ZdTq87JEE+cL1QE:L/ZB17y+tVq6eAc3T6FpkAjozKdTDlxR
                                TLSH:42A733283398F069E27AC875C75342FE0C526D1AC926F4AA62753E4E7AF8D44F17B341
                                File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................p.......,.......................................P.............................
                                Icon Hash:55497933cc61714d
                                Entrypoint:0x411def
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:
                                Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:b5a014d7eeb4c2042897567e1288a095
                                Instruction
                                push ebp
                                mov ebp, esp
                                push FFFFFFFFh
                                push 00414C50h
                                push 00411F80h
                                mov eax, dword ptr fs:[00000000h]
                                push eax
                                mov dword ptr fs:[00000000h], esp
                                sub esp, 68h
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [ebp-18h], esp
                                xor ebx, ebx
                                mov dword ptr [ebp-04h], ebx
                                push 00000002h
                                call dword ptr [00413184h]
                                pop ecx
                                or dword ptr [00419924h], FFFFFFFFh
                                or dword ptr [00419928h], FFFFFFFFh
                                call dword ptr [00413188h]
                                mov ecx, dword ptr [0041791Ch]
                                mov dword ptr [eax], ecx
                                call dword ptr [0041318Ch]
                                mov ecx, dword ptr [00417918h]
                                mov dword ptr [eax], ecx
                                mov eax, dword ptr [00413190h]
                                mov eax, dword ptr [eax]
                                mov dword ptr [00419920h], eax
                                call 00007FAA3CF3C4B2h
                                cmp dword ptr [00417710h], ebx
                                jne 00007FAA3CF3C39Eh
                                push 00411F78h
                                call dword ptr [00413194h]
                                pop ecx
                                call 00007FAA3CF3C484h
                                push 00417048h
                                push 00417044h
                                call 00007FAA3CF3C46Fh
                                mov eax, dword ptr [00417914h]
                                mov dword ptr [ebp-6Ch], eax
                                lea eax, dword ptr [ebp-6Ch]
                                push eax
                                push dword ptr [00417910h]
                                lea eax, dword ptr [ebp-64h]
                                push eax
                                lea eax, dword ptr [ebp-70h]
                                push eax
                                lea eax, dword ptr [ebp-60h]
                                push eax
                                call dword ptr [0041319Ch]
                                push 00417040h
                                push 00417000h
                                call 00007FAA3CF3C43Ch
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x6cb00.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x1a0000x6cb000x6cc00bbd437e4641c3885ad89fc27ee6f1626False0.14299119971264368data5.721209360114448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_CURSOR0x1c6000x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"0.35714285714285715
                                RT_CURSOR0x1c7340x134data0.44155844155844154
                                RT_CURSOR0x1c8680x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.40584415584415584
                                RT_CURSOR0x1c99c0x134Targa image data 64 x 65536 x 1 +32 "\001"0.5746753246753247
                                RT_CURSOR0x1cad00x134AmigaOS bitmap font "(", fc_YSize 4294966287, 3840 elements, 2nd "\376\017\340\377\377\017\341\377\377\217\343\377\377\337\367\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.4642857142857143
                                RT_CURSOR0x1cc040x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.32142857142857145
                                RT_CURSOR0x1cd380x134data0.3409090909090909
                                RT_CURSOR0x1ce6c0x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.4837662337662338
                                RT_CURSOR0x1cfa00x134AmigaOS bitmap font "(", fc_YSize 4294935297, 3840 elements, 2nd "\200\003\377\201\300\007\377\203\300\017\377\003\340\037\376\007\360\037\370\017\370\003\300\037\374", 3rd0.711038961038961
                                RT_CURSOR0x1d0d40x134data0.6038961038961039
                                RT_CURSOR0x1d2080x134Targa image data 64 x 65536 x 1 +32 "\001"0.36038961038961037
                                RT_CURSOR0x1d33c0x134Targa image data 64 x 65536 x 1 +32 "\001"0.3474025974025974
                                RT_CURSOR0x1d4700x134AmigaOS bitmap font "(", fc_YSize 4294967040, 3840 elements, 2nd "\376", 3rd0.4383116883116883
                                RT_CURSOR0x1d5a40x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.35064935064935066
                                RT_CURSOR0x1d6d80x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4512987012987013
                                RT_CURSOR0x1d80c0x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.39285714285714285
                                RT_CURSOR0x1d9400x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                RT_CURSOR0x1da740x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.32142857142857145
                                RT_CURSOR0x1dba80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                RT_CURSOR0x1dcdc0x134data0.4642857142857143
                                RT_CURSOR0x1de100x134data0.4805194805194805
                                RT_CURSOR0x1df440x134data0.38311688311688313
                                RT_CURSOR0x1e0780x134data0.36038961038961037
                                RT_CURSOR0x1e1ac0x134data0.4090909090909091
                                RT_CURSOR0x1e2e00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                RT_BITMAP0x1e4140x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                RT_BITMAP0x1e5e40x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                RT_BITMAP0x1e7c80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                RT_BITMAP0x1e9980x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                RT_BITMAP0x1eb680x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                RT_BITMAP0x1ed380x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                RT_BITMAP0x1ef080x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                RT_BITMAP0x1f0d80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                RT_BITMAP0x1f2a80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                RT_BITMAP0x1f4780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                RT_BITMAP0x1f6480xc0Device independent bitmap graphic, 11 x 11 x 4, image size 88RussianRussia0.40625
                                RT_BITMAP0x1f7080xc0Device independent bitmap graphic, 11 x 11 x 4, image size 88RussianRussia0.40625
                                RT_BITMAP0x1f7c80xa8Device independent bitmap graphic, 10 x 8 x 4, image size 640.49404761904761907
                                RT_BITMAP0x1f8700x134Device independent bitmap graphic, 18 x 17 x 4, image size 2040.37337662337662336
                                RT_BITMAP0x1f9a40xb8Device independent bitmap graphic, 10 x 10 x 4, image size 80RussianRussia0.41304347826086957
                                RT_BITMAP0x1fa5c0xb8Device independent bitmap graphic, 11 x 10 x 4, image size 80RussianRussia0.45652173913043476
                                RT_BITMAP0x1fb140xb8Device independent bitmap graphic, 10 x 10 x 4, image size 80RussianRussia0.42391304347826086
                                RT_BITMAP0x1fbcc0xb8Device independent bitmap graphic, 11 x 10 x 4, image size 80RussianRussia0.44565217391304346
                                RT_BITMAP0x1fc840x90Device independent bitmap graphic, 8 x 10 x 4, image size 400.4861111111111111
                                RT_BITMAP0x1fd140x11cDevice independent bitmap graphic, 38 x 9 x 4, image size 1800.4507042253521127
                                RT_BITMAP0x1fe300xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
                                RT_BITMAP0x1fef00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
                                RT_BITMAP0x1ffd00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
                                RT_BITMAP0x200b00x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5285714285714286
                                RT_BITMAP0x2013c0xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96RussianRussia0.41
                                RT_BITMAP0x202040xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96RussianRussia0.39
                                RT_BITMAP0x202cc0x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.45
                                RT_BITMAP0x203580x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.25
                                RT_BITMAP0x205900x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.20950704225352113
                                RT_BITMAP0x207c80x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5071428571428571
                                RT_BITMAP0x208540x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5142857142857142
                                RT_BITMAP0x208e00x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.4857142857142857
                                RT_BITMAP0x2096c0x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.21654929577464788
                                RT_BITMAP0x20ba40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.3232758620689655
                                RT_BITMAP0x20c8c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.28448275862068967
                                RT_BITMAP0x20d740xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.2629310344827586
                                RT_BITMAP0x20e5c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.33189655172413796
                                RT_BITMAP0x20f440x4acDevice independent bitmap graphic, 11 x 11 x 8, image size 1320.4498327759197324
                                RT_BITMAP0x213f00x4acDevice independent bitmap graphic, 11 x 11 x 8, image size 1320.459866220735786
                                RT_BITMAP0x2189c0x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.5280303030303031
                                RT_BITMAP0x21dc40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.38392857142857145
                                RT_BITMAP0x21ea40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4947916666666667
                                RT_BITMAP0x21f640xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.484375
                                RT_BITMAP0x220240xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42410714285714285
                                RT_BITMAP0x221040xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5104166666666666
                                RT_BITMAP0x221c40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.5
                                RT_BITMAP0x222a40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                RT_BITMAP0x2238c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4895833333333333
                                RT_BITMAP0x2244c0x378Device independent bitmap graphic, 110 x 14 x 4, image size 784GermanGermany0.23085585585585586
                                RT_BITMAP0x227c40xd8Device independent bitmap graphic, 15 x 14 x 4, image size 112, resolution 2834 x 2834 px/mSerbianCyrillic0.4675925925925926
                                RT_BITMAP0x2289c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.3794642857142857
                                RT_ICON0x2297c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.21341463414634146
                                RT_ICON0x22fe40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.34139784946236557
                                RT_ICON0x232cc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.5202702702702703
                                RT_ICON0x233f40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.47334754797441364
                                RT_ICON0x2429c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6101083032490975
                                RT_ICON0x24b440x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.596820809248555
                                RT_ICON0x250ac0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2932572614107884
                                RT_ICON0x276540x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4343339587242026
                                RT_ICON0x286fc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7198581560283688
                                RT_DIALOG0x28b640x52data0.7682926829268293
                                RT_STRING0x28bb80x6cdata0.6851851851851852
                                RT_STRING0x28c240x2d0data0.46111111111111114
                                RT_STRING0x28ef40x250data0.49155405405405406
                                RT_STRING0x291440x214data0.4567669172932331
                                RT_STRING0x293580x180data0.5286458333333334
                                RT_STRING0x294d80x1a4data0.5428571428571428
                                RT_STRING0x2967c0x3c0data0.3489583333333333
                                RT_STRING0x29a3c0x6a4data0.36
                                RT_STRING0x2a0e00x48cdata0.38230240549828176
                                RT_STRING0x2a56c0x19cdata0.5145631067961165
                                RT_STRING0x2a7080xecdata0.597457627118644
                                RT_STRING0x2a7f40x1a8data0.5
                                RT_STRING0x2a99c0x2b8data0.4454022988505747
                                RT_STRING0x2ac540x414data0.36398467432950193
                                RT_STRING0x2b0680x3b4data0.37658227848101267
                                RT_STRING0x2b41c0x340data0.3762019230769231
                                RT_STRING0x2b75c0x354data0.35563380281690143
                                RT_STRING0x2bab00x2d0data0.4513888888888889
                                RT_STRING0x2bd800xd8data0.5694444444444444
                                RT_STRING0x2be580xf0data0.55
                                RT_STRING0x2bf480x350data0.4033018867924528
                                RT_STRING0x2c2980x384data0.37444444444444447
                                RT_STRING0x2c61c0x2d8data0.375
                                RT_RCDATA0x2c8f40x10data1.5
                                RT_RCDATA0x2c9040x590data0.6327247191011236
                                RT_RCDATA0x2ce940x133dbDelphi compiled form 'TCreatePluginForm'0.09238558069305046
                                RT_RCDATA0x402700x2f1aDelphi compiled form 'TdxBarCustomizingForm'0.25543207828827336
                                RT_RCDATA0x4318c0x4b0Delphi compiled form 'TdxBarItemAddEditor'0.4608333333333333
                                RT_RCDATA0x4363c0x287Delphi compiled form 'TdxBarNameEd'0.6058732612055642
                                RT_RCDATA0x438c40x171Delphi compiled form 'TdxBarSubMenuEditor'0.7100271002710027
                                RT_RCDATA0x43a380x1491Delphi compiled form 'TFindForm'0.2641975308641975
                                RT_RCDATA0x44ecc0x49cDelphi compiled form 'TfrmAddGroupItems'0.4610169491525424
                                RT_RCDATA0x453680x1595Delphi compiled form 'THintForm'0.11782805429864253
                                RT_RCDATA0x469000x1aafDelphi compiled form 'TInputStringForm'0.2577953447518665
                                RT_RCDATA0x483b00x36a23Delphi compiled form 'TMainForm'0.09694832848479974
                                RT_RCDATA0x7edd40x751eDelphi compiled form 'TPageForm'0.1721032619571743
                                RT_GROUP_CURSOR0x862f40x14data1.35
                                RT_GROUP_CURSOR0x863080x14data1.3
                                RT_GROUP_CURSOR0x8631c0x14data1.4
                                RT_GROUP_CURSOR0x863300x14data1.4
                                RT_GROUP_CURSOR0x863440x14data1.4
                                RT_GROUP_CURSOR0x863580x14data1.4
                                RT_GROUP_CURSOR0x8636c0x14data1.4
                                RT_GROUP_CURSOR0x863800x14data1.4
                                RT_GROUP_CURSOR0x863940x14data1.4
                                RT_GROUP_CURSOR0x863a80x14data1.4
                                RT_GROUP_CURSOR0x863bc0x14data1.4
                                RT_GROUP_CURSOR0x863d00x14data1.4
                                RT_GROUP_CURSOR0x863e40x14data1.4
                                RT_GROUP_CURSOR0x863f80x14data1.4
                                RT_GROUP_CURSOR0x8640c0x14data1.4
                                RT_GROUP_CURSOR0x864200x14data1.4
                                RT_GROUP_CURSOR0x864340x14data1.4
                                RT_GROUP_CURSOR0x864480x14data1.4
                                RT_GROUP_CURSOR0x8645c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864700x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864840x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864980x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864ac0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864c00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x864d40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_ICON0x864e80x84data0.6363636363636364
                                RT_VERSION0x8656c0x350dataEnglishUnited States0.47523584905660377
                                RT_MANIFEST0x868bc0x244XML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.453448275862069
                                DLLImport
                                COMCTL32.dll
                                KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                GermanGermany
                                SerbianCyrillic
                                EnglishUnited States
                                ChineseChina
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 19, 2024 14:02:04.909483910 CET4971818852192.168.2.527.124.18.16
                                Nov 19, 2024 14:02:05.921706915 CET4971818852192.168.2.527.124.18.16
                                Nov 19, 2024 14:02:07.937192917 CET4971818852192.168.2.527.124.18.16
                                Nov 19, 2024 14:02:11.937329054 CET4971818852192.168.2.527.124.18.16
                                Nov 19, 2024 14:02:19.939273119 CET4971818852192.168.2.527.124.18.16

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:08:00:46
                                Start date:19/11/2024
                                Path:C:\Users\user\Desktop\TEKujpTgCK.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\TEKujpTgCK.exe"
                                Imagebase:0x400000
                                File size:47'407'259 bytes
                                MD5 hash:65C23B196D8C066197B3D6E9FC3282A2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:08:00:53
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:08:00:53
                                Start date:19/11/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:08:00:53
                                Start date:19/11/2024
                                Path:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                Imagebase:0x400000
                                File size:649'416 bytes
                                MD5 hash:0922B22053A6D5D9516EA910D34A4771
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:08:02:03
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:9
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:10
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
                                Imagebase:0xdb0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:11
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "ShellExperienceHosts.exe"
                                Imagebase:0x4d0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:12
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout /t 30 /nobreak
                                Imagebase:0x810000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:13
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:14
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:16
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:17
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                Imagebase:0x4e0000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:18
                                Start time:08:02:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                Imagebase:0x4e0000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:19
                                Start time:08:02:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
                                Imagebase:0xdb0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:20
                                Start time:08:02:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "ShellExperienceHosts.exe"
                                Imagebase:0x4d0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:21
                                Start time:08:02:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout /t 30 /nobreak
                                Imagebase:0x810000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:22
                                Start time:08:03:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
                                Imagebase:0xdb0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:23
                                Start time:08:03:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "ShellExperienceHosts.exe"
                                Imagebase:0x4d0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:24
                                Start time:08:03:04
                                Start date:19/11/2024
                                Path:C:\Users\Public\Downloads\program\ShellExperienceHosts.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\Public\Downloads\program\ShellExperienceHosts.exe"
                                Imagebase:0x400000
                                File size:649'416 bytes
                                MD5 hash:0922B22053A6D5D9516EA910D34A4771
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:25
                                Start time:08:03:04
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout /t 30 /nobreak
                                Imagebase:0x810000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:26
                                Start time:08:03:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist /FI "IMAGENAME eq ShellExperienceHosts.exe"
                                Imagebase:0xdb0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:27
                                Start time:08:03:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "ShellExperienceHosts.exe"
                                Imagebase:0x4d0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:28
                                Start time:08:03:34
                                Start date:19/11/2024
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout /t 30 /nobreak
                                Imagebase:0x810000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:5.8%
                                  Dynamic/Decrypted Code Coverage:0.1%
                                  Signature Coverage:18.5%
                                  Total number of Nodes:1895
                                  Total number of Limit Nodes:47
                                  execution_graph 51405 6c841285 51410 6c86eccf 51405->51410 51407 6c84128a 51414 6c9c7dcb 194 API calls 51407->51414 51409 6c841294 51411 6c86ecdb __EH_prolog3 51410->51411 51415 6c86fab5 51411->51415 51413 6c86eec4 Concurrency::details::ExternalContextBase::~ExternalContextBase 51413->51407 51414->51409 51416 6c86fb5d 51415->51416 51417 6c86fad6 _memcpy_s 51415->51417 51589 6c9c8172 51416->51589 51419 6c86fb06 VerSetConditionMask VerSetConditionMask VerifyVersionInfoW GetSystemMetrics 51417->51419 51426 6c87056d 51419->51426 51420 6c86fb70 51420->51413 51422 6c86fb4f 51503 6c87004e 51422->51503 51596 6c9c81b2 51426->51596 51428 6c870579 GetSysColor 51429 6c87058e GetSysColor 51428->51429 51430 6c87059a GetSysColor 51428->51430 51429->51430 51432 6c8705bd 51430->51432 51433 6c8705b1 GetSysColor 51430->51433 51597 6c86d5b9 51432->51597 51433->51432 51435 6c8705d3 22 API calls 51436 6c870706 GetSysColor 51435->51436 51437 6c8706fd 51435->51437 51438 6c870718 GetSysColorBrush 51436->51438 51437->51438 51439 6c870985 51438->51439 51440 6c870734 GetSysColorBrush 51438->51440 51637 6c87191a 28 API calls Concurrency::cancel_current_task 51439->51637 51440->51439 51441 6c870747 GetSysColorBrush 51440->51441 51441->51439 51443 6c87075a 51441->51443 51605 6c86e03f 51443->51605 51444 6c87098a 51446 6c870767 CreateSolidBrush 51610 6c86decf 51446->51610 51449 6c86e03f 29 API calls 51450 6c870785 CreateSolidBrush 51449->51450 51451 6c86decf 28 API calls 51450->51451 51452 6c870796 51451->51452 51453 6c86e03f 29 API calls 51452->51453 51454 6c8707a3 CreateSolidBrush 51453->51454 51455 6c86decf 28 API calls 51454->51455 51456 6c8707b4 51455->51456 51457 6c86e03f 29 API calls 51456->51457 51458 6c8707c1 CreateSolidBrush 51457->51458 51459 6c86decf 28 API calls 51458->51459 51460 6c8707d5 51459->51460 51461 6c86e03f 29 API calls 51460->51461 51462 6c8707e2 CreateSolidBrush 51461->51462 51463 6c86decf 28 API calls 51462->51463 51464 6c8707f3 51463->51464 51465 6c86e03f 29 API calls 51464->51465 51466 6c870800 CreateSolidBrush 51465->51466 51467 6c86decf 28 API calls 51466->51467 51468 6c870811 51467->51468 51469 6c86e03f 29 API calls 51468->51469 51470 6c87081e CreateSolidBrush 51469->51470 51471 6c86decf 28 API calls 51470->51471 51472 6c87082f 51471->51472 51473 6c86e03f 29 API calls 51472->51473 51474 6c87083c CreatePen 51473->51474 51475 6c86decf 28 API calls 51474->51475 51476 6c870855 51475->51476 51477 6c86e03f 29 API calls 51476->51477 51478 6c870862 CreatePen 51477->51478 51479 6c86decf 28 API calls 51478->51479 51480 6c870879 51479->51480 51481 6c86e03f 29 API calls 51480->51481 51482 6c870886 CreatePen 51481->51482 51483 6c86decf 28 API calls 51482->51483 51484 6c87089d 51483->51484 51485 6c8708b4 51484->51485 51488 6c86e03f 29 API calls 51484->51488 51486 6c870921 51485->51486 51487 6c8708bd CreateSolidBrush 51485->51487 51633 6c86f4da 7 API calls 2 library calls 51486->51633 51489 6c86decf 28 API calls 51487->51489 51488->51485 51491 6c87091f 51489->51491 51616 6c915651 51491->51616 51492 6c87092b 51492->51439 51493 6c87092f 51492->51493 51495 6c86decf 28 API calls 51493->51495 51497 6c870948 CreatePatternBrush 51495->51497 51498 6c86decf 28 API calls 51497->51498 51500 6c870959 51498->51500 51634 6c8420f0 51500->51634 51501 6c87097f Concurrency::details::ExternalContextBase::~ExternalContextBase 51501->51422 51504 6c87005d __EH_prolog3_GS 51503->51504 51505 6c86d5b9 29 API calls 51504->51505 51506 6c87006c GetDeviceCaps 51505->51506 51508 6c8700a6 51506->51508 51507 6c8700da 51509 6c8700f8 51507->51509 51512 6c86e092 28 API calls 51507->51512 51508->51507 51511 6c86e092 28 API calls 51508->51511 51510 6c870116 51509->51510 51516 6c86e092 28 API calls 51509->51516 51513 6c870134 51510->51513 51520 6c86e092 28 API calls 51510->51520 51514 6c8700d3 DeleteObject 51511->51514 51515 6c8700f1 DeleteObject 51512->51515 51517 6c870152 51513->51517 51523 6c86e092 28 API calls 51513->51523 51514->51507 51515->51509 51519 6c87010f DeleteObject 51516->51519 51518 6c870170 51517->51518 51525 6c86e092 28 API calls 51517->51525 51521 6c87018e 51518->51521 51529 6c86e092 28 API calls 51518->51529 51519->51510 51522 6c87012d DeleteObject 51520->51522 51526 6c8701ac 51521->51526 51532 6c86e092 28 API calls 51521->51532 51522->51513 51524 6c87014b DeleteObject 51523->51524 51524->51517 51528 6c870169 DeleteObject 51525->51528 51527 6c8701ca 51526->51527 51533 6c86e092 28 API calls 51526->51533 51530 6c8701e8 51527->51530 51537 6c86e092 28 API calls 51527->51537 51528->51518 51531 6c870187 DeleteObject 51529->51531 51721 6c86fa11 51530->51721 51531->51521 51535 6c8701a5 DeleteObject 51532->51535 51536 6c8701c3 DeleteObject 51533->51536 51535->51526 51536->51527 51539 6c8701e1 DeleteObject 51537->51539 51538 6c870200 _memcpy_s 51540 6c87020d GetTextCharsetInfo 51538->51540 51539->51530 51541 6c870247 lstrcpyW 51540->51541 51543 6c8702e7 CreateFontIndirectW 51541->51543 51544 6c87027b 51541->51544 51546 6c86decf 28 API calls 51543->51546 51544->51543 51545 6c870284 EnumFontFamiliesW 51544->51545 51547 6c8702b5 EnumFontFamiliesW 51545->51547 51548 6c8702a0 lstrcpyW 51545->51548 51552 6c8702f9 51546->51552 51549 6c8702d4 lstrcpyW 51547->51549 51548->51543 51549->51543 51551 6c87032f CreateFontIndirectW 51553 6c86decf 28 API calls 51551->51553 51552->51551 51554 6c870341 51553->51554 51555 6c86fa11 SystemParametersInfoW 51554->51555 51556 6c87035c CreateFontIndirectW 51555->51556 51557 6c86decf 28 API calls 51556->51557 51558 6c870384 CreateFontIndirectW 51557->51558 51559 6c86decf 28 API calls 51558->51559 51560 6c8703b0 CreateFontIndirectW 51559->51560 51561 6c86decf 28 API calls 51560->51561 51562 6c8703d1 GetSystemMetrics lstrcpyW CreateFontIndirectW 51561->51562 51563 6c86decf 28 API calls 51562->51563 51564 6c87040d GetStockObject 51563->51564 51565 6c870505 51564->51565 51566 6c87043b GetObjectW 51564->51566 51724 6c87098b 51565->51724 51566->51565 51568 6c870450 lstrcpyW CreateFontIndirectW 51566->51568 51569 6c86decf 28 API calls 51568->51569 51570 6c87049f CreateFontIndirectW 51569->51570 51571 6c86decf 28 API calls 51570->51571 51573 6c8704b8 GetObjectW CreateFontIndirectW 51571->51573 51572 6c870541 51574 6c8420f0 29 API calls 51572->51574 51577 6c86decf 28 API calls 51573->51577 51578 6c870556 51574->51578 51575 6c870567 51746 6c87191a 28 API calls Concurrency::cancel_current_task 51575->51746 51576 6c87050c 51576->51572 51576->51575 51742 6c86718f 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51576->51742 51581 6c8704e4 CreateFontIndirectW 51577->51581 51582 6c86d707 30 API calls 51578->51582 51584 6c86decf 28 API calls 51581->51584 51585 6c870561 51582->51585 51583 6c87056c 51584->51565 51743 6c9c8194 51585->51743 51590 6c9c817a 51589->51590 51591 6c9c817b IsProcessorFeaturePresent 51589->51591 51590->51420 51593 6c9c84e9 51591->51593 51776 6c9c84ac SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 51593->51776 51595 6c9c85cc 51595->51420 51596->51428 51598 6c86d5c5 __EH_prolog3 51597->51598 51599 6c86d5e8 GetWindowDC 51598->51599 51638 6c86de8d 51599->51638 51602 6c86d5fe Concurrency::details::ExternalContextBase::~ExternalContextBase 51602->51435 51606 6c86e045 51605->51606 51607 6c86e048 51605->51607 51606->51446 51647 6c86e092 51607->51647 51609 6c86e04d DeleteObject 51609->51446 51611 6c86dedc 51610->51611 51615 6c86def1 51610->51615 51612 6c86eb24 28 API calls 51611->51612 51613 6c86dee6 51612->51613 51705 6c942c6a 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51613->51705 51615->51449 51617 6c91565a 51616->51617 51627 6c87096d 51616->51627 51617->51627 51706 6c87d4e5 37 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51617->51706 51619 6c91566d 51707 6c87d4e5 37 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51619->51707 51621 6c915677 51708 6c87d4e5 37 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51621->51708 51623 6c915681 51709 6c87d4e5 37 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51623->51709 51625 6c91568b 51710 6c87d4e5 37 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51625->51710 51628 6c86d707 51627->51628 51711 6c86e055 51628->51711 51630 6c86d737 ReleaseDC 51715 6c86d662 51630->51715 51633->51492 51635 6c86e03f 29 API calls 51634->51635 51636 6c842126 51635->51636 51636->51491 51637->51444 51639 6c86de9a 51638->51639 51643 6c86d5fa 51638->51643 51645 6c86eab3 28 API calls 2 library calls 51639->51645 51641 6c86dea5 51646 6c942c6a 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51641->51646 51643->51602 51644 6c86de59 RaiseException Concurrency::cancel_current_task 51643->51644 51645->51641 51646->51643 51648 6c86e0a4 51647->51648 51649 6c86e09d 51647->51649 51648->51609 51651 6c86eb24 51649->51651 51652 6c86eb30 __EH_prolog3 51651->51652 51659 6c873144 51652->51659 51654 6c86eb35 Concurrency::details::ExternalContextBase::~ExternalContextBase 51657 6c86eb7b Concurrency::details::ExternalContextBase::~ExternalContextBase 51654->51657 51669 6c864f63 51654->51669 51657->51648 51677 6c873111 51659->51677 51663 6c87191a 51664 6c87315e 51663->51664 51666 6c946c1a 51663->51666 51674 6c9cb8ae 51663->51674 51664->51654 51666->51663 51668 6c946c27 SendMessageW 51666->51668 51690 6c946d35 28 API calls 51666->51690 51668->51654 51672 6c864f6a 51669->51672 51671 6c864f95 51671->51657 51673 6c945e0c 28 API calls 3 library calls 51671->51673 51672->51671 51694 6c9d80fa 51672->51694 51673->51657 51675 6c9cb8f6 RaiseException 51674->51675 51676 6c9cb8c8 51674->51676 51675->51663 51676->51675 51678 6c9432a0 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 51677->51678 51679 6c873120 51678->51679 51681 6c87313a 51679->51681 51691 6c943244 28 API calls 2 library calls 51679->51691 51682 6c9432a0 51681->51682 51683 6c9432ac __EH_prolog3 51682->51683 51684 6c943325 51683->51684 51686 6c9432d3 51683->51686 51689 6c9432ed Concurrency::details::ExternalContextBase::~ExternalContextBase 51683->51689 51692 6c942f70 TlsAlloc InitializeCriticalSection RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 51683->51692 51693 6c87191a 28 API calls Concurrency::cancel_current_task 51684->51693 51686->51684 51686->51689 51688 6c94332a 51688->51663 51689->51663 51690->51666 51691->51681 51692->51686 51693->51688 51695 6c9e15d2 51694->51695 51696 6c9e1610 51695->51696 51697 6c9e15fb HeapAlloc 51695->51697 51701 6c9e15e4 __Getctype 51695->51701 51704 6c9d2d6c 14 API calls __dosmaperr 51696->51704 51699 6c9e160e 51697->51699 51697->51701 51700 6c9e1615 51699->51700 51700->51672 51701->51696 51701->51697 51703 6c9eaf17 EnterCriticalSection LeaveCriticalSection __Getctype 51701->51703 51703->51701 51704->51700 51705->51615 51706->51619 51707->51621 51708->51623 51709->51625 51710->51627 51712 6c86e068 51711->51712 51713 6c86e061 51711->51713 51712->51630 51720 6c86eab3 28 API calls 2 library calls 51713->51720 51716 6c86d690 51715->51716 51717 6c86d69c 51715->51717 51718 6c86e055 28 API calls 51716->51718 51717->51501 51719 6c86d695 DeleteDC 51718->51719 51719->51717 51720->51712 51722 6c86fa26 SystemParametersInfoW 51721->51722 51723 6c86fa20 51721->51723 51722->51538 51723->51722 51725 6c870997 __EH_prolog3_GS 51724->51725 51726 6c86d5b9 29 API calls 51725->51726 51727 6c8709a3 51726->51727 51747 6c86e6e0 51727->51747 51730 6c870a43 51755 6c87191a 28 API calls Concurrency::cancel_current_task 51730->51755 51731 6c8709c0 GetTextMetricsW 51733 6c86e6e0 30 API calls 51731->51733 51735 6c870a00 GetTextMetricsW 51733->51735 51734 6c870a48 51736 6c86e6e0 30 API calls 51735->51736 51737 6c870a35 51736->51737 51738 6c86d707 30 API calls 51737->51738 51739 6c870a3d 51738->51739 51740 6c9c8194 5 API calls 51739->51740 51741 6c870a42 51740->51741 51741->51576 51742->51576 51744 6c9c8172 _ValidateLocalCookies 5 API calls 51743->51744 51745 6c9c819e 51744->51745 51745->51745 51746->51583 51748 6c86e706 51747->51748 51749 6c86e6f7 SelectObject 51747->51749 51751 6c86e71c 51748->51751 51752 6c86e712 SelectObject 51748->51752 51749->51748 51756 6c86e1ab 51751->51756 51752->51751 51754 6c86e722 51754->51730 51754->51731 51755->51734 51757 6c86eb24 28 API calls 51756->51757 51758 6c86e1b5 51757->51758 51770 6c9460a5 Concurrency::details::ExternalContextBase::~ExternalContextBase 51758->51770 51771 6c942e14 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51758->51771 51760 6c9460b8 51760->51770 51772 6c942e14 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51760->51772 51762 6c9460c5 Concurrency::details::ExternalContextBase::~ExternalContextBase 51762->51770 51773 6c9aeb1d 28 API calls 51762->51773 51764 6c9460f4 51765 6c94614b 51764->51765 51766 6c9460fb 51764->51766 51775 6c871934 RaiseException Concurrency::cancel_current_task 51765->51775 51774 6c942c6a 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 51766->51774 51770->51754 51771->51760 51772->51762 51773->51764 51774->51770 51776->51595 51777 6c8413c6 51782 6c95c20e 51777->51782 51781 6c8413d5 51786 6c95bc7a 51782->51786 51784 6c8413cb 51785 6c9c7dcb 194 API calls 51784->51785 51785->51781 51787 6c95bc86 __EH_prolog3 51786->51787 51796 6c873221 51787->51796 51791 6c95bcbe 51792 6c95bcc7 GetProfileIntW GetProfileIntW 51791->51792 51793 6c95bcff 51791->51793 51792->51793 51810 6c945de8 51793->51810 51795 6c95bd06 Concurrency::details::ExternalContextBase::~ExternalContextBase 51795->51784 51797 6c873111 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 51796->51797 51798 6c873229 51797->51798 51799 6c945d74 51798->51799 51800 6c945d80 51799->51800 51801 6c945de2 51799->51801 51802 6c945d8e 51800->51802 51815 6c945d50 InitializeCriticalSection 51800->51815 51816 6c87191a 28 API calls Concurrency::cancel_current_task 51801->51816 51805 6c945dd0 EnterCriticalSection 51802->51805 51806 6c945d9e EnterCriticalSection 51802->51806 51805->51791 51808 6c945db5 InitializeCriticalSection 51806->51808 51809 6c945dc8 LeaveCriticalSection 51806->51809 51807 6c945de7 51808->51809 51809->51805 51811 6c945e06 51810->51811 51812 6c945df3 LeaveCriticalSection 51810->51812 51817 6c87191a 28 API calls Concurrency::cancel_current_task 51811->51817 51812->51795 51814 6c945e0b 51815->51802 51816->51807 51817->51814 51818 6c9c814f 51819 6c9c815d 51818->51819 51820 6c9c8158 51818->51820 51824 6c9c8019 51819->51824 51835 6c9c8ef7 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 51820->51835 51826 6c9c8025 ___scrt_is_nonwritable_in_current_image 51824->51826 51825 6c9c804e dllmain_raw 51827 6c9c8068 dllmain_crt_dispatch 51825->51827 51828 6c9c8034 51825->51828 51826->51825 51826->51828 51832 6c9c8049 __DllMainCRTStartup@12 51826->51832 51827->51828 51827->51832 51829 6c9c80ba 51829->51828 51830 6c9c80c3 dllmain_crt_dispatch 51829->51830 51830->51828 51831 6c9c80d6 dllmain_raw 51830->51831 51831->51828 51832->51829 51836 6c9c7f6b 248 API calls 4 library calls 51832->51836 51834 6c9c80af dllmain_raw 51834->51829 51835->51819 51836->51834 51837 4a152f 51841 6c857210 GetModuleHandleA FindResourceW 51837->51841 51846 6c858130 GetLastInputInfo GetTickCount 51837->51846 51838 4a1535 51842 6c857237 LoadResource SizeofResource LockResource 51841->51842 51845 6c85727c 51841->51845 51843 6c857258 Concurrency::details::ExternalContextBase::~ExternalContextBase _memcpy_s 51842->51843 51842->51845 51892 6c856620 51843->51892 51845->51838 51847 6c858477 MessageBoxA 51846->51847 51848 6c85816f 51846->51848 51850 6c9d7ee9 194 API calls 51847->51850 52195 6c857dd0 GetModuleFileNameA 51848->52195 51852 6c8584a0 51850->51852 51851 6c858187 52204 6c8487f0 51851->52204 51854 6c9d2c7e 194 API calls 51852->51854 51856 6c8584a5 51854->51856 51855 6c858193 52209 6c856d30 51855->52209 51858 6c9d2c7e 194 API calls 51856->51858 51860 6c8584aa 51858->51860 51859 6c8581dc std::ios_base::_Ios_base_dtor 51859->51852 51890 6c858354 std::ios_base::_Ios_base_dtor 51859->51890 52236 6c857060 51859->52236 51861 6c9d2c7e 194 API calls 51860->51861 51862 6c8584af 51861->51862 51863 6c9d2c7e 194 API calls 51862->51863 51864 6c8584b4 51863->51864 51864->51838 51866 6c8583c4 CreateThread 51867 6c858436 51866->51867 51868 6c8583db WaitForSingleObject 51866->51868 53354 6c8572a0 Sleep 51866->53354 52294 6c857f60 GetModuleFileNameA 51867->52294 51868->51867 51872 6c8583ee CloseHandle 51868->51872 51869 6c858271 51873 6c857dd0 195 API calls 51869->51873 51871 6c8583a1 CreateThread 51871->51866 53330 6c857560 51871->53330 51875 6c8583fe 51872->51875 51878 6c858421 std::ios_base::_Ios_base_dtor 51872->51878 51876 6c85827a 51873->51876 51875->51862 51875->51878 51885 6c85828b std::ios_base::_Ios_base_dtor _memcpy_s 51876->51885 52437 6c84b8a0 194 API calls 4 library calls 51876->52437 51877 6c85843f 52306 6c857d70 GetModuleFileNameA 51877->52306 51878->51838 51883 6c858455 51884 6c857210 276 API calls 51883->51884 51886 6c85845a CreateThread 51884->51886 51885->51856 52245 6c9d8085 51885->52245 52407 6c8562b0 WSAStartup 51886->52407 53351 6c857290 51886->53351 51889 6c858470 52438 6c9d7ee9 51889->52438 51890->51860 51890->51866 52258 6c857850 51890->52258 51893 6c856697 51892->51893 51893->51893 51943 6c8458c0 51893->51943 51895 6c8566ad 51896 6c8458c0 194 API calls 51895->51896 51897 6c8566e3 51896->51897 51958 6c8452a0 51897->51958 51899 6c856774 std::ios_base::_Ios_base_dtor 51975 6c84a7a0 51899->51975 51900 6c856c80 52034 6c9d2c7e 51900->52034 51901 6c8566f9 std::ios_base::_Ios_base_dtor 51901->51899 51901->51900 51903 6c856c85 52039 6c9c93d9 RaiseException Concurrency::cancel_current_task 51903->52039 51908 6c856c8a 52040 6c844d00 194 API calls 2 library calls 51908->52040 51909 6c85682f 51909->51903 51912 6c856865 51909->51912 51911 6c856c8f 52041 6c84a950 51911->52041 51915 6c856871 51912->51915 51916 6c856898 51912->51916 51928 6c856882 std::ios_base::_Ios_base_dtor _memcpy_s 51912->51928 51914 6c856bf4 std::ios_base::_Ios_base_dtor 51917 6c9d2c7e 194 API calls 51914->51917 51942 6c856c63 std::ios_base::_Ios_base_dtor 51914->51942 51915->51908 51918 6c85687c 51915->51918 51919 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51916->51919 51920 6c856c99 51917->51920 51921 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51918->51921 51919->51928 52044 6c852090 194 API calls std::ios_base::_Ios_base_dtor 51920->52044 51921->51928 51924 6c856ce0 std::ios_base::_Ios_base_dtor 51924->51845 51926 6c856b02 52011 6c84aae0 51926->52011 51928->51911 51928->51914 51928->51926 51935 6c8458c0 194 API calls 51928->51935 51993 6c84a960 51928->51993 52010 6c858e50 261 API calls 51928->52010 51933 6c856b3a 51934 6c84aae0 231 API calls 51933->51934 51936 6c856b4c 51934->51936 51935->51928 51937 6c84d430 231 API calls 51936->51937 51938 6c856b6c 51937->51938 52032 6c852530 261 API calls 51938->52032 51941 6c856b75 std::ios_base::_Ios_base_dtor 51941->51914 52033 6c852090 194 API calls std::ios_base::_Ios_base_dtor 51941->52033 51942->51845 51944 6c845982 51943->51944 51945 6c8458d7 51943->51945 52045 6c844da0 194 API calls 51944->52045 51947 6c84590b 51945->51947 51950 6c8458dc _memcpy_s 51945->51950 51953 6c845953 51945->51953 51954 6c84594a 51945->51954 51951 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51947->51951 51948 6c845987 52046 6c844d00 194 API calls 2 library calls 51948->52046 51950->51895 51952 6c84591e 51951->51952 51952->51950 51956 6c9d2c7e 194 API calls 51952->51956 51955 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51953->51955 51954->51947 51954->51948 51955->51950 51957 6c845991 51956->51957 52047 6c844e30 51958->52047 51960 6c8452df _memcpy_s 52060 6c844f50 CryptAcquireContextW 51960->52060 51962 6c8453a1 CryptAcquireContextW 51963 6c8453c8 CryptImportKey 51962->51963 51964 6c84541b CryptReleaseContext 51963->51964 51965 6c8456de 51964->51965 51966 6c844db0 194 API calls 51965->51966 51967 6c8456e6 51966->51967 51968 6c9cb8ae Concurrency::cancel_current_task RaiseException 51967->51968 51969 6c8456f4 51968->51969 51970 6c9d2c7e 194 API calls 51969->51970 51971 6c8456fe 51970->51971 51972 6c845726 std::ios_base::_Ios_base_dtor 51971->51972 51973 6c9d2c7e 194 API calls 51971->51973 51972->51901 51974 6c84574d 51973->51974 52086 6c846840 51975->52086 51977 6c84a80f 51978 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51977->51978 51979 6c84a816 51978->51979 51980 6c84a82d 51979->51980 52097 6c9c9b4c 198 API calls 6 library calls 51979->52097 51982 6c84a960 233 API calls 51980->51982 51984 6c84a864 51982->51984 51983 6c84a8ab 51986 6c84a8b7 51983->51986 52098 6c9c9d65 9 API calls 2 library calls 51983->52098 51984->51983 51985 6c846840 231 API calls 51984->51985 51985->51983 51988 6c84a6e0 51986->51988 51989 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 51988->51989 51990 6c84a75d 51989->51990 51991 6c84a774 51990->51991 52100 6c9c9b4c 198 API calls 6 library calls 51990->52100 51991->51909 52101 6c9c996b 51993->52101 51996 6c9c996b std::_Lockit::_Lockit 7 API calls 51997 6c84a9ab 51996->51997 52001 6c9c99c3 std::_Lockit::~_Lockit 2 API calls 51997->52001 51999 6c84a9cb 52002 6c84aa18 51999->52002 52114 6c846410 233 API calls 6 library calls 51999->52114 52000 6c84aa58 52000->51928 52001->51999 52107 6c9c99c3 52002->52107 52004 6c84aa28 52005 6c84aa30 52004->52005 52006 6c84aa6b 52004->52006 52115 6c9c9b19 16 API calls 2 library calls 52005->52115 52116 6c846250 194 API calls 2 library calls 52006->52116 52009 6c84aa70 52010->51928 52012 6c84ab16 52011->52012 52016 6c84ab7c 52012->52016 52121 6c84a380 231 API calls 52012->52121 52015 6c846840 231 API calls 52018 6c84ad3c 52015->52018 52020 6c84abb1 52016->52020 52122 6c84d1c0 52016->52122 52017 6c84ad4f 52021 6c84d430 52017->52021 52018->52017 52125 6c84a4a0 231 API calls 52018->52125 52020->52015 52022 6c84d46d 52021->52022 52026 6c84d4a4 52022->52026 52190 6c84a380 231 API calls 52022->52190 52024 6c846840 231 API calls 52027 6c84d63a 52024->52027 52025 6c84d1c0 228 API calls 52029 6c84d4d9 52025->52029 52026->52025 52026->52029 52028 6c84d64d 52027->52028 52191 6c84a4a0 231 API calls 52027->52191 52031 6c852530 261 API calls 52028->52031 52029->52024 52031->51933 52032->51941 52033->51914 52192 6c9d2bba 194 API calls 2 library calls 52034->52192 52036 6c9d2c8d 52193 6c9d2c9b 11 API calls std::locale::_Setgloballocale 52036->52193 52038 6c9d2c9a 52040->51911 52194 6c9c9416 194 API calls 2 library calls 52041->52194 52044->51924 52046->51952 52048 6c844e71 52047->52048 52049 6c844e73 CryptStringToBinaryA 52047->52049 52048->52049 52050 6c844e93 52049->52050 52058 6c844f10 52049->52058 52051 6c844ec6 _memcpy_s 52050->52051 52055 6c844f45 52050->52055 52072 6c8459b0 194 API calls 3 library calls 52050->52072 52052 6c844efc CryptStringToBinaryA 52051->52052 52057 6c844f17 52052->52057 52052->52058 52057->51960 52073 6c844db0 52058->52073 52059 6c9cb8ae Concurrency::cancel_current_task RaiseException 52059->52055 52061 6c845243 52060->52061 52062 6c844db0 194 API calls 52061->52062 52063 6c845250 52062->52063 52064 6c9cb8ae Concurrency::cancel_current_task RaiseException 52063->52064 52065 6c84525e CryptDestroyHash CryptReleaseContext 52064->52065 52066 6c844db0 194 API calls 52065->52066 52067 6c84527f 52066->52067 52068 6c9cb8ae Concurrency::cancel_current_task RaiseException 52067->52068 52069 6c84528d 52068->52069 52070 6c9d2c7e 194 API calls 52069->52070 52071 6c845292 52070->52071 52072->52051 52076 6c9cad11 52073->52076 52077 6c9cad1e 52076->52077 52083 6c844ddd 52076->52083 52078 6c9d80fa ___std_exception_copy 15 API calls 52077->52078 52077->52083 52079 6c9cad3b 52078->52079 52080 6c9cad4b 52079->52080 52084 6c9e14c2 194 API calls 2 library calls 52079->52084 52085 6c9d2d7f 14 API calls ___free_lconv_mon 52080->52085 52083->52059 52084->52080 52085->52083 52087 6c846862 52086->52087 52088 6c84685a 52086->52088 52087->51977 52089 6c9cb8ae Concurrency::cancel_current_task RaiseException 52088->52089 52090 6c846872 52088->52090 52089->52090 52099 6c846760 231 API calls 3 library calls 52090->52099 52092 6c8468a8 52093 6c9cb8ae Concurrency::cancel_current_task RaiseException 52092->52093 52094 6c8468b7 52093->52094 52095 6c9cad11 ___std_exception_copy 194 API calls 52094->52095 52096 6c8468e4 52095->52096 52096->51977 52097->51980 52098->51986 52099->52092 52100->51991 52102 6c9c997a 52101->52102 52103 6c9c9981 52101->52103 52117 6c9e0a74 6 API calls std::_Lockit::_Lockit 52102->52117 52105 6c84a988 52103->52105 52118 6c9ca49f EnterCriticalSection 52103->52118 52105->51996 52105->51999 52108 6c9c99cd 52107->52108 52109 6c9e0a82 52107->52109 52113 6c9c99e0 52108->52113 52119 6c9ca4ad LeaveCriticalSection 52108->52119 52120 6c9e0a5d LeaveCriticalSection 52109->52120 52112 6c9e0a89 52112->52000 52113->52000 52114->52004 52115->52002 52116->52009 52117->52105 52118->52105 52119->52113 52120->52112 52121->52016 52126 6c8478c0 52122->52126 52123 6c84d1d6 52123->52020 52125->52017 52129 6c8478da _memcpy_s 52126->52129 52130 6c8479b8 _memcpy_s 52126->52130 52127 6c847a61 52127->52123 52129->52123 52130->52127 52131 6c9d709a 52130->52131 52132 6c9d70ad swprintf 52131->52132 52137 6c9d6e7c 52132->52137 52134 6c9d70c2 52145 6c9d0710 52134->52145 52138 6c9d6e8a 52137->52138 52139 6c9d6eb2 52137->52139 52138->52139 52140 6c9d6eb9 52138->52140 52141 6c9d6e97 52138->52141 52139->52134 52151 6c9d6dd5 52140->52151 52159 6c9d2bf1 29 API calls 2 library calls 52141->52159 52146 6c9d071c 52145->52146 52147 6c9d0733 52146->52147 52188 6c9d0990 194 API calls 2 library calls 52146->52188 52149 6c9d0746 52147->52149 52189 6c9d0990 194 API calls 2 library calls 52147->52189 52149->52127 52152 6c9d6de1 ___scrt_is_nonwritable_in_current_image 52151->52152 52160 6c9d6d85 EnterCriticalSection 52152->52160 52154 6c9d6def 52161 6c9d6e30 52154->52161 52158 6c9d6e0d 52158->52134 52159->52139 52160->52154 52169 6c9e255f 52161->52169 52167 6c9d6dfc 52168 6c9d6e24 LeaveCriticalSection __fread_nolock 52167->52168 52168->52158 52170 6c9e2521 194 API calls 52169->52170 52172 6c9e2570 52170->52172 52171 6c9d6e48 52178 6c9d6ef3 52171->52178 52172->52171 52173 6c9e25bf 52172->52173 52174 6c9e15d2 std::_Locinfo::_Locinfo_dtor 15 API calls 52173->52174 52175 6c9e25c9 52174->52175 52176 6c9e1598 ___free_lconv_mon 14 API calls 52175->52176 52177 6c9e25d2 52176->52177 52177->52171 52181 6c9d6f05 52178->52181 52182 6c9d6e66 52178->52182 52179 6c9d6f13 52180 6c9d2bf1 _memcpy_s 29 API calls 52179->52180 52180->52182 52181->52179 52181->52182 52186 6c9d6f49 _memcpy_s 52181->52186 52187 6c9e260a 226 API calls ___scrt_uninitialize_crt 52182->52187 52183 6c9d6801 ___scrt_uninitialize_crt 226 API calls 52183->52186 52184 6c9de713 __fread_nolock 194 API calls 52184->52186 52185 6c9e5242 __wsopen_s 226 API calls 52185->52186 52186->52182 52186->52183 52186->52184 52186->52185 52187->52167 52188->52147 52189->52149 52190->52026 52191->52028 52192->52036 52193->52038 52196 6c857e40 52195->52196 52196->52196 52197 6c8458c0 194 API calls 52196->52197 52198 6c857e59 52197->52198 52199 6c857ec4 52198->52199 52201 6c8458c0 194 API calls 52198->52201 52200 6c857eea std::ios_base::_Ios_base_dtor 52199->52200 52202 6c9d2c7e 194 API calls 52199->52202 52200->51851 52201->52199 52203 6c857f5c 52202->52203 52205 6c848800 52204->52205 52205->52205 52206 6c848817 _memcpy_s 52205->52206 52441 6c84b8a0 194 API calls 4 library calls 52205->52441 52206->51855 52208 6c848852 52208->51855 52442 6c8474f0 52209->52442 52212 6c856d8e 52496 6c848140 52212->52496 52213 6c856e18 52452 6c858a20 52213->52452 52220 6c856de5 std::ios_base::_Ios_base_dtor 52220->51859 52221 6c856e4e 52482 6c858c80 52221->52482 52224 6c856f52 52490 6c8499e0 52224->52490 52225 6c856e7b 52226 6c856ed1 std::ios_base::_Ios_base_dtor 52225->52226 52231 6c85704c 52225->52231 52228 6c848140 231 API calls 52226->52228 52228->52220 52230 6c856f8a 52233 6c848140 231 API calls 52230->52233 52234 6c9d2c7e 194 API calls 52231->52234 52232 6c846840 231 API calls 52232->52230 52233->52220 52235 6c857051 52234->52235 52237 6c8570d0 52236->52237 52237->52237 52238 6c8458c0 194 API calls 52237->52238 52239 6c8570e6 52238->52239 52240 6c8452a0 202 API calls 52239->52240 52241 6c8570fb std::ios_base::_Ios_base_dtor 52240->52241 52242 6c8571ec std::ios_base::_Ios_base_dtor 52241->52242 52243 6c9d2c7e 194 API calls 52241->52243 52242->51869 52244 6c85720d 52243->52244 52246 6c9d809d 52245->52246 52247 6c9d8093 52245->52247 53012 6c9d7fce 52246->53012 52248 6c9e7420 16 API calls 52247->52248 52250 6c9d809a 52248->52250 52250->51890 52255 6c9d80cb 52256 6c9d80e9 52255->52256 52257 6c9e1598 ___free_lconv_mon 14 API calls 52255->52257 52256->51890 52257->52256 52259 6c8578c7 52258->52259 52259->52259 52260 6c8458c0 194 API calls 52259->52260 52261 6c8578e0 52260->52261 53063 6c8525f0 52261->53063 52263 6c8578fd 52264 6c85793b GetFileAttributesA 52263->52264 52265 6c857931 std::ios_base::_Ios_base_dtor 52263->52265 52267 6c857d5a 52263->52267 52266 6c857977 SHGetFolderPathA 52264->52266 52291 6c857bd4 std::ios_base::_Ios_base_dtor 52264->52291 52265->52264 52269 6c857994 52266->52269 52266->52291 52270 6c9d2c7e 194 API calls 52267->52270 52268 6c857c40 std::ios_base::_Ios_base_dtor 52268->51871 52274 6c8458c0 194 API calls 52269->52274 52271 6c857d5f 52270->52271 52272 6c9d2c7e 194 API calls 52271->52272 52272->52291 52273 6c9d2c7e 194 API calls 52275 6c857d69 52273->52275 52276 6c8579cb 52274->52276 52278 6c9d2c7e 194 API calls 52275->52278 52277 6c8579de 52276->52277 53067 6c84b8a0 194 API calls 4 library calls 52276->53067 52281 6c8525f0 194 API calls 52277->52281 52280 6c857d6e 52278->52280 52282 6c857a5c 52281->52282 52286 6c857a74 std::ios_base::_Ios_base_dtor 52282->52286 53068 6c84b8a0 194 API calls 4 library calls 52282->53068 52284 6c857bab GetFileAttributesA 52287 6c857c45 CoInitialize CoCreateInstance 52284->52287 52284->52291 52285 6c857ba1 std::ios_base::_Ios_base_dtor 52285->52284 52286->52271 52286->52284 52286->52285 52288 6c857d05 CoUninitialize 52287->52288 52289 6c857c6d MultiByteToWideChar 52287->52289 52288->52291 52290 6c857cac 52289->52290 52292 6c857cc1 MultiByteToWideChar 52290->52292 52293 6c857cf3 52290->52293 52291->52268 52291->52273 52291->52275 52292->52293 52293->52288 52295 6c857fd0 52294->52295 52295->52295 52296 6c8458c0 194 API calls 52295->52296 52298 6c857fe9 _memcpy_s 52296->52298 52297 6c8580d6 std::ios_base::_Ios_base_dtor 52297->51877 52298->52297 52299 6c85808d 52298->52299 52300 6c85811c 52298->52300 52302 6c8458c0 194 API calls 52299->52302 52301 6c84a950 194 API calls 52300->52301 52303 6c8580b0 52301->52303 52302->52303 52303->52297 52304 6c9d2c7e 194 API calls 52303->52304 52305 6c858126 52304->52305 52307 6c857db0 52306->52307 52307->52307 52308 6c8458c0 194 API calls 52307->52308 52309 6c857dc8 52308->52309 52310 6c846970 GetTempPathA 52309->52310 52311 6c8469e0 52310->52311 52311->52311 52312 6c8458c0 194 API calls 52311->52312 52313 6c8469f9 52312->52313 52315 6c846a16 _memcpy_s 52313->52315 53093 6c84b8a0 194 API calls 4 library calls 52313->53093 53070 6c8484a0 52315->53070 52317 6c846b15 std::ios_base::_Ios_base_dtor 52320 6c846c5c 52317->52320 52322 6c84aae0 231 API calls 52317->52322 52318 6c8473ac 52321 6c9d2c7e 194 API calls 52318->52321 52319 6c846a9d std::ios_base::_Ios_base_dtor 52319->52317 52319->52318 52325 6c8458c0 194 API calls 52320->52325 52323 6c8473b1 52321->52323 52324 6c846b4e 52322->52324 52326 6c9d2c7e 194 API calls 52323->52326 52327 6c84aae0 231 API calls 52324->52327 52329 6c846c99 52325->52329 52330 6c8473b6 52326->52330 52328 6c846b5e 52327->52328 52332 6c84aae0 231 API calls 52328->52332 52337 6c846cb3 _memcpy_s 52329->52337 53094 6c84b8a0 194 API calls 4 library calls 52329->53094 52331 6c9d2c7e 194 API calls 52330->52331 52333 6c8473bb 52331->52333 52334 6c846b6e 52332->52334 52336 6c9d2c7e 194 API calls 52333->52336 52339 6c84d430 231 API calls 52334->52339 52338 6c8473c0 52336->52338 53080 6c845dc0 52337->53080 52341 6c848140 231 API calls 52338->52341 52342 6c846b82 52339->52342 52343 6c847410 std::ios_base::_Ios_base_dtor 52341->52343 52344 6c84aae0 231 API calls 52342->52344 52343->51883 52346 6c846b91 52344->52346 52345 6c846db3 std::ios_base::_Ios_base_dtor 52350 6c8458c0 194 API calls 52345->52350 52348 6c84aae0 231 API calls 52346->52348 52347 6c846d3c std::ios_base::_Ios_base_dtor 52347->52323 52347->52345 52349 6c846ba1 52348->52349 52351 6c84d430 231 API calls 52349->52351 52352 6c846e4f 52350->52352 52353 6c846bb5 52351->52353 52357 6c846e69 _memcpy_s 52352->52357 53095 6c84b8a0 194 API calls 4 library calls 52352->53095 52355 6c84aae0 231 API calls 52353->52355 52356 6c846bc4 52355->52356 52358 6c84aae0 231 API calls 52356->52358 52359 6c8474f0 285 API calls 52357->52359 52360 6c846bd4 52358->52360 52366 6c846ef6 std::ios_base::_Ios_base_dtor 52359->52366 52361 6c84aae0 231 API calls 52360->52361 52362 6c846be4 52361->52362 52365 6c84aae0 231 API calls 52362->52365 52363 6c846f74 std::ios_base::_Ios_base_dtor 52364 6c84700c CreateProcessA 52363->52364 53096 6c84ad80 261 API calls 3 library calls 52363->53096 52369 6c84703d 52364->52369 52370 6c8472aa 52364->52370 52368 6c846bf4 52365->52368 52366->52330 52366->52363 52373 6c84aae0 231 API calls 52368->52373 52377 6c8458c0 194 API calls 52369->52377 52371 6c848140 231 API calls 52370->52371 52374 6c8472dc std::ios_base::_Ios_base_dtor 52371->52374 52372 6c846faf 52375 6c8499e0 231 API calls 52372->52375 52376 6c846c04 52373->52376 52383 6c848140 231 API calls 52374->52383 52378 6c846fba 52375->52378 52379 6c84aae0 231 API calls 52376->52379 52380 6c847079 52377->52380 52381 6c846fe7 52378->52381 52384 6c846840 231 API calls 52378->52384 52382 6c846c14 52379->52382 52387 6c847093 _memcpy_s 52380->52387 53097 6c84b8a0 194 API calls 4 library calls 52380->53097 52381->52364 52385 6c846fee OpenProcess 52381->52385 52386 6c84aae0 231 API calls 52382->52386 52389 6c847352 std::ios_base::_Ios_base_dtor 52383->52389 52384->52381 52385->52364 52390 6c847000 CloseHandle 52385->52390 52391 6c846c24 52386->52391 52393 6c8484a0 285 API calls 52387->52393 52389->51883 52390->52370 52392 6c8499e0 231 API calls 52391->52392 52394 6c846c2f 52392->52394 52397 6c847129 std::ios_base::_Ios_base_dtor 52393->52397 52394->52320 52395 6c846840 231 API calls 52394->52395 52395->52320 52396 6c8471b0 std::ios_base::_Ios_base_dtor 52398 6c84721e CloseHandle CloseHandle 52396->52398 53083 6c8485b0 52396->53083 52397->52333 52397->52396 52400 6c848140 231 API calls 52398->52400 52402 6c847266 std::ios_base::_Ios_base_dtor 52400->52402 52402->52370 52403 6c8499e0 231 API calls 52404 6c8471f1 52403->52404 52404->52398 52405 6c8471f5 52404->52405 52406 6c846840 231 API calls 52405->52406 52406->52398 53125 6c856130 52407->53125 52409 6c856130 205 API calls 52411 6c8563d2 std::ios_base::_Ios_base_dtor 52409->52411 52410 6c8565e3 52413 6c9d2c7e 194 API calls 52410->52413 52414 6c85648c getaddrinfo 52411->52414 52415 6c8565e8 52411->52415 52412 6c85630b std::ios_base::_Ios_base_dtor 52412->52409 52412->52410 52413->52415 52416 6c8565d6 WSACleanup 52414->52416 52420 6c8564ca 52414->52420 52417 6c9d2c7e 194 API calls 52415->52417 52421 6c9d7ee9 194 API calls 52416->52421 52418 6c8565ed WSACleanup 52417->52418 53165 6c9d2d7f 14 API calls ___free_lconv_mon 52418->53165 52419 6c856527 freeaddrinfo 52419->52416 52430 6c85653b 52419->52430 52420->52419 52422 6c8564e0 socket 52420->52422 52421->52410 52422->52416 52424 6c8564fd connect 52422->52424 52426 6c856524 52424->52426 52427 6c85650b closesocket 52424->52427 52426->52419 52427->52422 52427->52426 52428 6c856550 recv 52429 6c85659d 52428->52429 52428->52430 52429->52418 52432 6c85659f VirtualAlloc 52429->52432 52430->52428 53164 6c9d80ef 16 API calls 4 library calls 52430->53164 52431 6c856606 52433 6c9d7ee9 194 API calls 52431->52433 52435 6c8565c8 _memcpy_s 52432->52435 52436 6c856610 52433->52436 52435->51889 52437->51885 53168 6c9d7d09 52438->53168 52441->52208 52443 6c847523 52442->52443 52444 6c84a7a0 263 API calls 52443->52444 52445 6c847579 52444->52445 52500 6c84a280 52445->52500 52449 6c8475b3 52450 6c8475d8 52449->52450 52451 6c846840 231 API calls 52449->52451 52450->52212 52450->52213 52451->52450 52453 6c858a56 52452->52453 52770 6c84d1e0 52453->52770 52455 6c858a6b 52456 6c856e2a 52455->52456 52781 6c8477b0 52455->52781 52458 6c858b30 52456->52458 52459 6c846840 231 API calls 52458->52459 52460 6c858b7e 52459->52460 52461 6c84d1e0 261 API calls 52460->52461 52462 6c858ba3 52461->52462 52463 6c858bd2 52462->52463 52466 6c8477b0 229 API calls 52462->52466 52464 6c846840 231 API calls 52463->52464 52465 6c856e43 52464->52465 52467 6c848860 52465->52467 52466->52463 52468 6c84893e 52467->52468 52473 6c84888b 52467->52473 52869 6c844da0 194 API calls 52468->52869 52470 6c8488c3 52474 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 52470->52474 52471 6c848943 52870 6c844d00 194 API calls 2 library calls 52471->52870 52473->52470 52476 6c848902 52473->52476 52477 6c84890b 52473->52477 52478 6c848890 _memcpy_s 52473->52478 52475 6c8488d6 52474->52475 52475->52478 52479 6c9d2c7e 194 API calls 52475->52479 52476->52470 52476->52471 52480 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 52477->52480 52478->52221 52481 6c84894d 52479->52481 52480->52478 52483 6c858cc1 52482->52483 52484 6c84d1e0 261 API calls 52483->52484 52487 6c858cd6 52484->52487 52485 6c846840 231 API calls 52486 6c856e6b 52485->52486 52486->52224 52486->52225 52488 6c858d0d 52487->52488 52871 6c847a80 52487->52871 52488->52485 52491 6c849a3a 52490->52491 52492 6c8499fd 52490->52492 52491->52230 52491->52232 52493 6c849850 228 API calls 52492->52493 52494 6c849a2b 52493->52494 52495 6c9d6a50 231 API calls 52494->52495 52495->52491 52497 6c848168 52496->52497 52498 6c8499e0 231 API calls 52497->52498 52499 6c848193 std::ios_base::_Ios_base_dtor 52497->52499 52498->52499 52499->52220 52501 6c84a6e0 198 API calls 52500->52501 52502 6c84759f 52501->52502 52503 6c84a1d0 52502->52503 52504 6c84a1f5 52503->52504 52505 6c84a269 52503->52505 52512 6c9c9f24 52504->52512 52505->52449 52509 6c84a213 52521 6c84afd0 227 API calls 3 library calls 52509->52521 52511 6c84a233 52511->52449 52513 6c9c9e9f 52512->52513 52514 6c84a202 52513->52514 52522 6c9e0dcf 52513->52522 52514->52505 52520 6c8498f0 194 API calls 52514->52520 52520->52509 52521->52511 52523 6c9e0d18 ___scrt_is_nonwritable_in_current_image 52522->52523 52524 6c9e0d2b 52523->52524 52527 6c9e0d4b 52523->52527 52567 6c9d2d6c 14 API calls __dosmaperr 52524->52567 52526 6c9e0d30 52568 6c9d2c6e 194 API calls _memcpy_s 52526->52568 52529 6c9e0d5d 52527->52529 52530 6c9e0d50 52527->52530 52553 6c9e5773 52529->52553 52569 6c9d2d6c 14 API calls __dosmaperr 52530->52569 52531 6c9c9ef3 52531->52514 52541 6c9d7b7f 52531->52541 52535 6c9e0d6d 52570 6c9d2d6c 14 API calls __dosmaperr 52535->52570 52536 6c9e0d7a 52561 6c9eba22 52536->52561 52542 6c9d7b92 swprintf 52541->52542 52660 6c9d78d6 52542->52660 52545 6c9d0710 swprintf 194 API calls 52546 6c9c9f0e 52545->52546 52546->52514 52547 6c9d6a50 52546->52547 52548 6c9d6a63 swprintf 52547->52548 52721 6c9d692b 52548->52721 52550 6c9d6a6f 52551 6c9d0710 swprintf 194 API calls 52550->52551 52552 6c9d6a7b 52551->52552 52552->52514 52554 6c9e577f ___scrt_is_nonwritable_in_current_image 52553->52554 52572 6c9e0a15 EnterCriticalSection 52554->52572 52556 6c9e578d 52573 6c9e5817 52556->52573 52562 6c9eb99f 52561->52562 52610 6c9de3d5 52562->52610 52565 6c9e0d8f 52571 6c9e0db8 LeaveCriticalSection __fread_nolock 52565->52571 52567->52526 52568->52531 52569->52531 52570->52531 52571->52531 52572->52556 52574 6c9e583a 52573->52574 52575 6c9e5892 52574->52575 52582 6c9e579a 52574->52582 52589 6c9d6d85 EnterCriticalSection 52574->52589 52590 6c9d6d99 LeaveCriticalSection 52574->52590 52591 6c9e47ac 52575->52591 52586 6c9e57d3 52582->52586 52583 6c9e58c3 52605 6c9d6d85 EnterCriticalSection 52583->52605 52609 6c9e0a5d LeaveCriticalSection 52586->52609 52588 6c9e0d66 52588->52535 52588->52536 52589->52574 52590->52574 52595 6c9e47b9 __Getctype 52591->52595 52592 6c9e47f9 52607 6c9d2d6c 14 API calls __dosmaperr 52592->52607 52593 6c9e47e4 RtlAllocateHeap 52594 6c9e47f7 52593->52594 52593->52595 52598 6c9e1598 52594->52598 52595->52592 52595->52593 52606 6c9eaf17 EnterCriticalSection LeaveCriticalSection __Getctype 52595->52606 52599 6c9e15a3 RtlFreeHeap 52598->52599 52600 6c9e15cd 52598->52600 52599->52600 52601 6c9e15b8 GetLastError 52599->52601 52600->52582 52604 6c9e60a7 6 API calls std::_Lockit::_Lockit 52600->52604 52602 6c9e15c5 __dosmaperr 52601->52602 52608 6c9d2d6c 14 API calls __dosmaperr 52602->52608 52604->52583 52605->52582 52606->52595 52607->52594 52608->52600 52609->52588 52611 6c9de3f4 52610->52611 52612 6c9de407 52611->52612 52620 6c9de41c 52611->52620 52630 6c9d2d6c 14 API calls __dosmaperr 52612->52630 52614 6c9de40c 52631 6c9d2c6e 194 API calls _memcpy_s 52614->52631 52616 6c9de417 52616->52565 52627 6c9f1673 52616->52627 52618 6c9de5ed 52636 6c9d2c6e 194 API calls _memcpy_s 52618->52636 52625 6c9de53c 52620->52625 52632 6c9daffd 203 API calls 2 library calls 52620->52632 52622 6c9de58c 52622->52625 52633 6c9daffd 203 API calls 2 library calls 52622->52633 52624 6c9de5aa 52624->52625 52634 6c9daffd 203 API calls 2 library calls 52624->52634 52625->52616 52635 6c9d2d6c 14 API calls __dosmaperr 52625->52635 52637 6c9f101b 52627->52637 52630->52614 52631->52616 52632->52622 52633->52624 52634->52625 52635->52618 52636->52616 52640 6c9f1027 ___scrt_is_nonwritable_in_current_image 52637->52640 52638 6c9f102e 52657 6c9d2d6c 14 API calls __dosmaperr 52638->52657 52640->52638 52642 6c9f1059 52640->52642 52641 6c9f1033 52658 6c9d2c6e 194 API calls _memcpy_s 52641->52658 52648 6c9f1605 52642->52648 52647 6c9f103d 52647->52565 52649 6c9d7fce __wsopen_s 203 API calls 52648->52649 52650 6c9f1627 52649->52650 52651 6c9d7fb1 __wsopen_s 17 API calls 52650->52651 52652 6c9f1634 52651->52652 52653 6c9f1693 __wsopen_s 250 API calls 52652->52653 52654 6c9f163b 52652->52654 52653->52654 52655 6c9f107d 52654->52655 52656 6c9e1598 ___free_lconv_mon 14 API calls 52654->52656 52659 6c9f10b0 LeaveCriticalSection __wsopen_s 52655->52659 52656->52655 52657->52641 52658->52647 52659->52647 52662 6c9d78e2 ___scrt_is_nonwritable_in_current_image 52660->52662 52661 6c9d78e8 52681 6c9d2bf1 29 API calls 2 library calls 52661->52681 52662->52661 52665 6c9d792b 52662->52665 52664 6c9d7903 52664->52545 52671 6c9d6d85 EnterCriticalSection 52665->52671 52667 6c9d7937 52672 6c9d7a59 52667->52672 52669 6c9d794d 52682 6c9d7976 LeaveCriticalSection __fread_nolock 52669->52682 52671->52667 52673 6c9d7a6c 52672->52673 52674 6c9d7a7f 52672->52674 52673->52669 52683 6c9d7980 52674->52683 52676 6c9d7aa2 52680 6c9d7b30 52676->52680 52687 6c9d6801 52676->52687 52680->52669 52681->52664 52682->52664 52684 6c9d7991 52683->52684 52686 6c9d79e9 52683->52686 52684->52686 52696 6c9e727a 196 API calls 2 library calls 52684->52696 52686->52676 52688 6c9d6841 52687->52688 52689 6c9d681a 52687->52689 52693 6c9e72ba 52688->52693 52689->52688 52697 6c9de713 52689->52697 52691 6c9d6836 52704 6c9e5242 52691->52704 52715 6c9e7199 52693->52715 52695 6c9e72d3 52695->52680 52696->52686 52698 6c9de71f 52697->52698 52699 6c9de734 52697->52699 52700 6c9d2d6c __dosmaperr 14 API calls 52698->52700 52699->52691 52701 6c9de724 52700->52701 52702 6c9d2c6e _memcpy_s 194 API calls 52701->52702 52703 6c9de72f 52702->52703 52703->52691 52705 6c9e524e ___scrt_is_nonwritable_in_current_image 52704->52705 52706 6c9e528f 52705->52706 52708 6c9e52d5 52705->52708 52714 6c9e5256 52705->52714 52707 6c9d2bf1 _memcpy_s 29 API calls 52706->52707 52707->52714 52709 6c9deec0 __wsopen_s EnterCriticalSection 52708->52709 52710 6c9e52db 52709->52710 52711 6c9e52f9 52710->52711 52712 6c9e5353 __wsopen_s 224 API calls 52710->52712 52713 6c9e534b __wsopen_s LeaveCriticalSection 52711->52713 52712->52711 52713->52714 52714->52688 52716 6c9df13c __wsopen_s 194 API calls 52715->52716 52717 6c9e71ab 52716->52717 52718 6c9e71c7 SetFilePointerEx 52717->52718 52720 6c9e71b3 __wsopen_s 52717->52720 52719 6c9e71df GetLastError 52718->52719 52718->52720 52719->52720 52720->52695 52722 6c9d6937 ___scrt_is_nonwritable_in_current_image 52721->52722 52723 6c9d6941 52722->52723 52725 6c9d6964 52722->52725 52747 6c9d2bf1 29 API calls 2 library calls 52723->52747 52731 6c9d695c 52725->52731 52732 6c9d6d85 EnterCriticalSection 52725->52732 52727 6c9d6982 52733 6c9d69c2 52727->52733 52729 6c9d698f 52748 6c9d69ba LeaveCriticalSection __fread_nolock 52729->52748 52731->52550 52732->52727 52734 6c9d69cf 52733->52734 52735 6c9d69f2 52733->52735 52760 6c9d2bf1 29 API calls 2 library calls 52734->52760 52737 6c9d69ea 52735->52737 52738 6c9d6801 ___scrt_uninitialize_crt 226 API calls 52735->52738 52737->52729 52739 6c9d6a0a 52738->52739 52749 6c9e58d9 52739->52749 52742 6c9de713 __fread_nolock 194 API calls 52743 6c9d6a1e 52742->52743 52753 6c9e5600 52743->52753 52746 6c9e1598 ___free_lconv_mon 14 API calls 52746->52737 52747->52731 52748->52731 52750 6c9e58f0 52749->52750 52752 6c9d6a12 52749->52752 52751 6c9e1598 ___free_lconv_mon 14 API calls 52750->52751 52750->52752 52751->52752 52752->52742 52754 6c9e5629 52753->52754 52759 6c9d6a25 52753->52759 52755 6c9e5678 52754->52755 52757 6c9e5650 52754->52757 52769 6c9d2bf1 29 API calls 2 library calls 52755->52769 52761 6c9e556f 52757->52761 52759->52737 52759->52746 52760->52737 52762 6c9e557b ___scrt_is_nonwritable_in_current_image 52761->52762 52763 6c9deec0 __wsopen_s EnterCriticalSection 52762->52763 52764 6c9e5589 52763->52764 52765 6c9e55ba 52764->52765 52766 6c9e56d3 __wsopen_s 197 API calls 52764->52766 52767 6c9e55f4 LeaveCriticalSection 52765->52767 52766->52765 52768 6c9e55dd 52767->52768 52768->52759 52769->52759 52771 6c84d214 52770->52771 52772 6c84d242 52770->52772 52773 6c846840 231 API calls 52771->52773 52777 6c84d24e 52772->52777 52789 6c84a380 231 API calls 52772->52789 52775 6c84d22d 52773->52775 52774 6c84d31d 52774->52455 52775->52455 52777->52774 52778 6c84a960 233 API calls 52777->52778 52779 6c84d28d 52778->52779 52779->52774 52780 6c846840 231 API calls 52779->52780 52780->52774 52782 6c8477c8 52781->52782 52788 6c84782e 52782->52788 52790 6c849850 52782->52790 52785 6c84781a 52785->52788 52800 6c9d70d4 52785->52800 52788->52456 52789->52777 52791 6c84985f 52790->52791 52792 6c8477f9 52790->52792 52791->52792 52793 6c9d709a 228 API calls 52791->52793 52792->52785 52792->52788 52794 6c9d7b45 52792->52794 52793->52792 52795 6c9d7b58 swprintf 52794->52795 52796 6c9d78d6 228 API calls 52795->52796 52797 6c9d7b6d 52796->52797 52798 6c9d0710 swprintf 194 API calls 52797->52798 52799 6c9d7b7a 52798->52799 52799->52785 52801 6c9d70df 52800->52801 52802 6c9d70f4 52800->52802 52820 6c9d2d6c 14 API calls __dosmaperr 52801->52820 52804 6c9d70fc 52802->52804 52805 6c9d7111 52802->52805 52822 6c9d2d6c 14 API calls __dosmaperr 52804->52822 52814 6c9ded31 52805->52814 52806 6c9d70e4 52821 6c9d2c6e 194 API calls _memcpy_s 52806->52821 52810 6c9d7101 52823 6c9d2c6e 194 API calls _memcpy_s 52810->52823 52811 6c9d70ef 52811->52788 52813 6c9d710c 52813->52788 52815 6c9ded45 swprintf 52814->52815 52824 6c9de73a 52815->52824 52818 6c9d0710 swprintf 194 API calls 52819 6c9ded5f 52818->52819 52819->52813 52820->52806 52821->52811 52822->52810 52823->52813 52825 6c9de746 ___scrt_is_nonwritable_in_current_image 52824->52825 52826 6c9de74d 52825->52826 52827 6c9de770 52825->52827 52850 6c9d2bf1 29 API calls 2 library calls 52826->52850 52835 6c9d6d85 EnterCriticalSection 52827->52835 52830 6c9de77e 52836 6c9de7c9 52830->52836 52831 6c9de766 52831->52818 52833 6c9de78d 52851 6c9de7bf LeaveCriticalSection __fread_nolock 52833->52851 52835->52830 52837 6c9de7d8 52836->52837 52838 6c9de800 52836->52838 52855 6c9d2bf1 29 API calls 2 library calls 52837->52855 52840 6c9de713 __fread_nolock 194 API calls 52838->52840 52841 6c9de809 52840->52841 52852 6c9e725c 52841->52852 52844 6c9de8b3 52856 6c9deb35 199 API calls 4 library calls 52844->52856 52846 6c9de8ca 52849 6c9de7f3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 52846->52849 52857 6c9de96a 198 API calls 2 library calls 52846->52857 52847 6c9de8c2 52847->52849 52849->52833 52850->52831 52851->52831 52858 6c9e7074 52852->52858 52855->52849 52856->52847 52857->52849 52859 6c9e7080 ___scrt_is_nonwritable_in_current_image 52858->52859 52860 6c9de827 52859->52860 52861 6c9e70c3 52859->52861 52863 6c9e7109 52859->52863 52860->52844 52860->52846 52860->52849 52862 6c9d2bf1 _memcpy_s 29 API calls 52861->52862 52862->52860 52864 6c9deec0 __wsopen_s EnterCriticalSection 52863->52864 52865 6c9e710f 52864->52865 52866 6c9e7130 52865->52866 52867 6c9e7199 __fread_nolock 196 API calls 52865->52867 52868 6c9e7191 LeaveCriticalSection 52866->52868 52867->52866 52868->52860 52870->52475 52874 6c847a98 _memcpy_s 52871->52874 52872 6c847c44 52876 6c847a9e _memcpy_s 52872->52876 52877 6c9d77a2 52872->52877 52873 6c9d77a2 __fread_nolock 207 API calls 52873->52874 52874->52872 52874->52873 52874->52876 52876->52488 52880 6c9d77bf 52877->52880 52881 6c9d77cb ___scrt_is_nonwritable_in_current_image 52880->52881 52882 6c9d77ba 52881->52882 52883 6c9d77de _memcpy_s 52881->52883 52884 6c9d7815 52881->52884 52882->52876 52907 6c9d2d6c 14 API calls __dosmaperr 52883->52907 52893 6c9d6d85 EnterCriticalSection 52884->52893 52886 6c9d781f 52894 6c9d75c9 52886->52894 52889 6c9d77f8 52908 6c9d2c6e 194 API calls _memcpy_s 52889->52908 52893->52886 52895 6c9d75f8 52894->52895 52898 6c9d75db _memcpy_s 52894->52898 52909 6c9d7854 LeaveCriticalSection __fread_nolock 52895->52909 52896 6c9d75e8 52977 6c9d2d6c 14 API calls __dosmaperr 52896->52977 52898->52895 52898->52896 52900 6c9d7639 __fread_nolock 52898->52900 52900->52895 52901 6c9d7764 _memcpy_s 52900->52901 52903 6c9de713 __fread_nolock 194 API calls 52900->52903 52910 6c9e6ce9 52900->52910 52979 6c9d6519 194 API calls 2 library calls 52900->52979 52980 6c9d2d6c 14 API calls __dosmaperr 52901->52980 52903->52900 52905 6c9d75ed 52978 6c9d2c6e 194 API calls _memcpy_s 52905->52978 52907->52889 52908->52882 52909->52882 52911 6c9e6cfb 52910->52911 52912 6c9e6d13 52910->52912 52990 6c9d2d59 14 API calls __dosmaperr 52911->52990 52914 6c9e7055 52912->52914 52919 6c9e6d56 52912->52919 53006 6c9d2d59 14 API calls __dosmaperr 52914->53006 52915 6c9e6d00 52991 6c9d2d6c 14 API calls __dosmaperr 52915->52991 52918 6c9e705a 53007 6c9d2d6c 14 API calls __dosmaperr 52918->53007 52921 6c9e6d61 52919->52921 52922 6c9e6d08 52919->52922 52926 6c9e6d91 52919->52926 52992 6c9d2d59 14 API calls __dosmaperr 52921->52992 52922->52900 52923 6c9e6d6e 53008 6c9d2c6e 194 API calls _memcpy_s 52923->53008 52925 6c9e6d66 52993 6c9d2d6c 14 API calls __dosmaperr 52925->52993 52929 6c9e6daa 52926->52929 52930 6c9e6db7 52926->52930 52931 6c9e6de5 52926->52931 52929->52930 52936 6c9e6dd3 52929->52936 52994 6c9d2d59 14 API calls __dosmaperr 52930->52994 52997 6c9e15d2 15 API calls 2 library calls 52931->52997 52935 6c9e6dbc 52995 6c9d2d6c 14 API calls __dosmaperr 52935->52995 52981 6c9edb87 52936->52981 52937 6c9e6df6 52940 6c9e1598 ___free_lconv_mon 14 API calls 52937->52940 52943 6c9e6dff 52940->52943 52941 6c9e6dc3 52996 6c9d2c6e 194 API calls _memcpy_s 52941->52996 52942 6c9e6f31 52945 6c9e6fa5 52942->52945 52948 6c9e6f4a GetConsoleMode 52942->52948 52946 6c9e1598 ___free_lconv_mon 14 API calls 52943->52946 52947 6c9e6fa9 ReadFile 52945->52947 52950 6c9e6e06 52946->52950 52951 6c9e701d GetLastError 52947->52951 52952 6c9e6fc1 52947->52952 52948->52945 52949 6c9e6f5b 52948->52949 52949->52947 52953 6c9e6f61 ReadConsoleW 52949->52953 52954 6c9e6e2b 52950->52954 52955 6c9e6e10 52950->52955 52956 6c9e702a 52951->52956 52957 6c9e6f81 52951->52957 52952->52951 52958 6c9e6f9a 52952->52958 52953->52958 52959 6c9e6f7b GetLastError 52953->52959 53000 6c9e727a 196 API calls 2 library calls 52954->53000 52998 6c9d2d6c 14 API calls __dosmaperr 52955->52998 53004 6c9d2d6c 14 API calls __dosmaperr 52956->53004 52974 6c9e6dce __fread_nolock 52957->52974 53001 6c9d2d12 14 API calls __dosmaperr 52957->53001 52969 6c9e6ffd 52958->52969 52970 6c9e6fe6 52958->52970 52958->52974 52959->52957 52960 6c9e1598 ___free_lconv_mon 14 API calls 52960->52922 52964 6c9e6e39 52964->52936 52966 6c9e6e15 52999 6c9d2d59 14 API calls __dosmaperr 52966->52999 52967 6c9e702f 53005 6c9d2d59 14 API calls __dosmaperr 52967->53005 52973 6c9e7016 52969->52973 52969->52974 53002 6c9e69fb 199 API calls 3 library calls 52970->53002 53003 6c9e6841 197 API calls __fread_nolock 52973->53003 52974->52960 52976 6c9e6e20 52976->52974 52977->52905 52978->52895 52979->52900 52980->52905 52982 6c9edb94 52981->52982 52983 6c9edba1 52981->52983 53009 6c9d2d6c 14 API calls __dosmaperr 52982->53009 52987 6c9edbad 52983->52987 53010 6c9d2d6c 14 API calls __dosmaperr 52983->53010 52986 6c9edb99 52986->52942 52987->52942 52988 6c9edbce 53011 6c9d2c6e 194 API calls _memcpy_s 52988->53011 52990->52915 52991->52922 52992->52925 52993->52923 52994->52935 52995->52941 52996->52974 52997->52937 52998->52966 52999->52976 53000->52964 53001->52974 53002->52974 53003->52976 53004->52967 53005->52974 53006->52918 53007->52923 53008->52922 53009->52986 53010->52988 53011->52986 53025 6c9d3b40 53012->53025 53015 6c9d7ff2 53017 6c9d7fb1 53015->53017 53037 6c9d7eff 53017->53037 53020 6c9e7420 DeleteFileW 53021 6c9e7444 53020->53021 53022 6c9e7432 GetLastError 53020->53022 53021->52255 53062 6c9d2d12 14 API calls __dosmaperr 53022->53062 53024 6c9e743e 53024->52255 53026 6c9d3b5e 53025->53026 53027 6c9d3b57 53025->53027 53026->53027 53034 6c9e29b2 194 API calls 2 library calls 53026->53034 53027->53015 53033 6c9e5e5d 5 API calls std::_Lockit::_Lockit 53027->53033 53029 6c9d3b7f 53035 6c9e1620 194 API calls __Getctype 53029->53035 53031 6c9d3b95 53036 6c9e167e 203 API calls __wsopen_s 53031->53036 53033->53015 53034->53029 53035->53031 53036->53027 53038 6c9d7f0d 53037->53038 53039 6c9d7f27 53037->53039 53055 6c9d800d 14 API calls ___free_lconv_mon 53038->53055 53041 6c9d7f4d 53039->53041 53042 6c9d7f2e 53039->53042 53057 6c9e73f6 MultiByteToWideChar __wsopen_s 53041->53057 53043 6c9d7f17 53042->53043 53056 6c9d8027 15 API calls __wsopen_s 53042->53056 53043->52255 53043->53020 53046 6c9d7f5c 53047 6c9d7f63 GetLastError 53046->53047 53053 6c9d7f89 53046->53053 53060 6c9d8027 15 API calls __wsopen_s 53046->53060 53058 6c9d2d12 14 API calls __dosmaperr 53047->53058 53049 6c9d7f6f 53059 6c9d2d6c 14 API calls __dosmaperr 53049->53059 53053->53043 53061 6c9e73f6 MultiByteToWideChar __wsopen_s 53053->53061 53054 6c9d7fa0 53054->53043 53054->53047 53055->53043 53056->53043 53057->53046 53058->53049 53059->53043 53060->53053 53061->53054 53062->53024 53064 6c85260b 53063->53064 53065 6c85261f _memcpy_s 53064->53065 53069 6c84b8a0 194 API calls 4 library calls 53064->53069 53065->52263 53067->52277 53068->52286 53069->53065 53071 6c8484d3 53070->53071 53072 6c84a7a0 263 API calls 53071->53072 53073 6c84851b 53072->53073 53074 6c84a280 198 API calls 53073->53074 53075 6c848541 53074->53075 53076 6c84a1d0 277 API calls 53075->53076 53077 6c848555 53076->53077 53078 6c84857a 53077->53078 53079 6c846840 231 API calls 53077->53079 53078->52319 53079->53078 53098 6c845d40 53080->53098 53084 6c8485eb 53083->53084 53088 6c848604 53084->53088 53122 6c84a380 231 API calls 53084->53122 53085 6c84865e 53087 6c846840 231 API calls 53085->53087 53091 6c848720 53087->53091 53088->53085 53123 6c84b0f0 227 API calls 3 library calls 53088->53123 53090 6c8471e6 53090->52403 53091->53090 53124 6c84a4a0 231 API calls 53091->53124 53093->52315 53094->52337 53095->52357 53096->52372 53097->52387 53099 6c845d56 __snprintf_s 53098->53099 53102 6c9d2945 53099->53102 53103 6c9d2959 swprintf 53102->53103 53108 6c9ce7c0 53103->53108 53106 6c9d0710 swprintf 194 API calls 53107 6c845d64 53106->53107 53107->52347 53109 6c9ce7ec 53108->53109 53110 6c9ce80f 53108->53110 53119 6c9d2bf1 29 API calls 2 library calls 53109->53119 53110->53109 53114 6c9ce817 53110->53114 53112 6c9ce804 53113 6c9c8172 _ValidateLocalCookies 5 API calls 53112->53113 53115 6c9ce932 53113->53115 53120 6c9d0dc2 206 API calls 3 library calls 53114->53120 53115->53106 53117 6c9ce898 53121 6c9d074c 14 API calls ___free_lconv_mon 53117->53121 53119->53112 53120->53117 53121->53112 53122->53088 53123->53085 53124->53090 53127 6c85614e _memcpy_s 53125->53127 53126 6c8561b2 53126->52412 53127->53126 53128 6c8562a1 53127->53128 53129 6c856273 53127->53129 53130 6c84a950 194 API calls 53128->53130 53133 6c8458c0 194 API calls 53129->53133 53131 6c8562a6 WSAStartup 53130->53131 53134 6c856130 195 API calls 53131->53134 53135 6c856298 53133->53135 53139 6c85630b std::ios_base::_Ios_base_dtor 53134->53139 53135->52412 53136 6c856130 195 API calls 53138 6c8563d2 std::ios_base::_Ios_base_dtor 53136->53138 53137 6c8565e3 53140 6c9d2c7e 194 API calls 53137->53140 53141 6c85648c getaddrinfo 53138->53141 53142 6c8565e8 53138->53142 53139->53136 53139->53137 53140->53142 53143 6c8565d6 WSACleanup 53141->53143 53147 6c8564ca 53141->53147 53144 6c9d2c7e 194 API calls 53142->53144 53148 6c9d7ee9 194 API calls 53143->53148 53145 6c8565ed WSACleanup 53144->53145 53167 6c9d2d7f 14 API calls ___free_lconv_mon 53145->53167 53146 6c856527 freeaddrinfo 53146->53143 53157 6c85653b 53146->53157 53147->53146 53149 6c8564e0 socket 53147->53149 53148->53137 53149->53143 53151 6c8564fd connect 53149->53151 53153 6c856524 53151->53153 53154 6c85650b closesocket 53151->53154 53153->53146 53154->53149 53154->53153 53155 6c856550 recv 53156 6c85659d 53155->53156 53155->53157 53156->53145 53159 6c85659f VirtualAlloc 53156->53159 53157->53155 53166 6c9d80ef 16 API calls 4 library calls 53157->53166 53158 6c856606 53160 6c9d7ee9 194 API calls 53158->53160 53162 6c8565c8 _memcpy_s 53159->53162 53163 6c856610 53160->53163 53162->52412 53164->52430 53165->52431 53166->53157 53167->53158 53169 6c9d7d48 53168->53169 53170 6c9d7d36 53168->53170 53180 6c9d7bb9 53169->53180 53195 6c9d7dd1 GetModuleHandleW 53170->53195 53174 6c9d7d3b 53174->53169 53196 6c9d7e2c GetModuleHandleExW 53174->53196 53175 6c9d7d85 53175->51847 53179 6c9d7d9a 53181 6c9d7bc5 ___scrt_is_nonwritable_in_current_image 53180->53181 53202 6c9e0a15 EnterCriticalSection 53181->53202 53183 6c9d7bcf 53203 6c9d7c21 53183->53203 53188 6c9d7da0 53326 6c9d7e13 53188->53326 53190 6c9d7daa 53191 6c9d7dbe 53190->53191 53192 6c9d7dae GetCurrentProcess TerminateProcess 53190->53192 53193 6c9d7e2c std::locale::_Setgloballocale 3 API calls 53191->53193 53192->53191 53194 6c9d7dc6 ExitProcess 53193->53194 53195->53174 53197 6c9d7e8c 53196->53197 53198 6c9d7e6b GetProcAddress 53196->53198 53200 6c9d7d47 53197->53200 53201 6c9d7e92 FreeLibrary 53197->53201 53198->53197 53199 6c9d7e7f 53198->53199 53199->53197 53200->53169 53201->53200 53202->53183 53206 6c9d7c2d ___scrt_is_nonwritable_in_current_image std::locale::_Setgloballocale 53203->53206 53204 6c9d7bdc 53211 6c9d7bfa 53204->53211 53205 6c9d7c91 53207 6c9d7cae 53205->53207 53215 6c9e002a 53205->53215 53206->53204 53206->53205 53214 6c9dfe2e 14 API calls 3 library calls 53206->53214 53208 6c9e002a std::locale::_Setgloballocale 194 API calls 53207->53208 53208->53204 53325 6c9e0a5d LeaveCriticalSection 53211->53325 53213 6c9d7be8 53213->53175 53213->53188 53214->53205 53216 6c9e0038 53215->53216 53217 6c9e0051 53215->53217 53216->53217 53219 6c8410d0 53216->53219 53217->53207 53228 6c8aa01f 53219->53228 53221 6c8410fb 53240 6c8fd67b 53221->53240 53225 6c84113c 53246 6c9c7dcb 194 API calls 53225->53246 53227 6c841146 53227->53216 53229 6c8aa02b __EH_prolog3 53228->53229 53247 6c8f666d 53229->53247 53235 6c8aa090 53275 6c85ba70 53235->53275 53237 6c8aa09d 53286 6c86d081 53237->53286 53239 6c8aa0ac Concurrency::details::ExternalContextBase::~ExternalContextBase 53239->53221 53312 6c8f5d15 53240->53312 53242 6c84110f 53243 6c8f8711 GetModuleHandleW 53242->53243 53244 6c8f8726 GetProcAddress 53243->53244 53245 6c8f8739 53243->53245 53244->53245 53245->53225 53246->53227 53248 6c8f667c __EH_prolog3_GS 53247->53248 53293 6c895c4c 53248->53293 53250 6c8f6692 53251 6c8f66a7 53250->53251 53299 6c9da10c 194 API calls 2 library calls 53250->53299 53253 6c873111 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 53251->53253 53254 6c8f66b4 53253->53254 53255 6c8f67c7 53254->53255 53257 6c9432a0 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 53254->53257 53300 6c87191a 28 API calls Concurrency::cancel_current_task 53255->53300 53259 6c8f66cb 53257->53259 53258 6c8f67cc 53259->53255 53260 6c8f66d3 GetCurrentThread GetCurrentThreadId GetVersionExW 53259->53260 53261 6c8f678a 53260->53261 53262 6c9c8194 5 API calls 53261->53262 53263 6c8aa038 53262->53263 53264 6c842b90 53263->53264 53265 6c842b98 53264->53265 53266 6c842b9e 53265->53266 53301 6c841ee0 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 53265->53301 53269 6c8aa549 53266->53269 53270 6c8aa555 __EH_prolog3 53269->53270 53271 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53270->53271 53273 6c8aa560 Concurrency::details::ExternalContextBase::~ExternalContextBase 53270->53273 53272 6c8aa56c 53271->53272 53272->53273 53302 6c96ecc0 53272->53302 53273->53235 53276 6c85ba94 53275->53276 53277 6c85baf2 53276->53277 53280 6c85ba9a 53276->53280 53309 6c841ee0 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 53277->53309 53282 6c85bab9 53280->53282 53308 6c842f30 194 API calls 2 library calls 53280->53308 53282->53237 53284 6c85badf 53284->53237 53287 6c86d099 53286->53287 53292 6c86d0ac 53286->53292 53288 6c86d0be 53287->53288 53289 6c86d0a5 53287->53289 53311 6c842e10 194 API calls 2 library calls 53288->53311 53310 6c85c239 194 API calls 3 library calls 53289->53310 53292->53239 53294 6c895c58 __EH_prolog3 53293->53294 53295 6c873221 28 API calls 53294->53295 53296 6c895c62 53295->53296 53297 6c895f33 30 API calls 53296->53297 53298 6c895c7a Concurrency::details::ExternalContextBase::~ExternalContextBase 53297->53298 53298->53250 53299->53251 53300->53258 53303 6c96ecd2 SHGetMalloc 53302->53303 53304 6c96ecee 53302->53304 53303->53304 53306 6c96ecea 53303->53306 53305 6c87191a Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 53304->53305 53307 6c96ecf3 53305->53307 53306->53273 53307->53273 53308->53284 53310->53292 53311->53292 53313 6c8f5d21 __EH_prolog3 53312->53313 53314 6c873221 28 API calls 53313->53314 53315 6c8f5d2b 53314->53315 53318 6c8f5ef3 53315->53318 53317 6c8f5d51 Concurrency::details::ExternalContextBase::~ExternalContextBase 53317->53242 53319 6c873111 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 53318->53319 53320 6c8f5f35 53319->53320 53321 6c945d74 Concurrency::details::ExternalContextBase::~ExternalContextBase 28 API calls 53320->53321 53322 6c8f5f3e 53321->53322 53323 6c945de8 ~refcount_ptr 28 API calls 53322->53323 53324 6c8f5f4e 53323->53324 53324->53317 53325->53213 53329 6c9e7337 5 API calls std::locale::_Setgloballocale 53326->53329 53328 6c9d7e18 std::locale::_Setgloballocale 53328->53190 53329->53328 53350 6c857594 std::ios_base::_Ios_base_dtor _memcpy_s 53330->53350 53331 6c8458c0 194 API calls 53332 6c8575c4 CreateToolhelp32Snapshot 53331->53332 53332->53350 53333 6c857606 Process32FirstW 53336 6c857755 CloseHandle 53333->53336 53333->53350 53334 6c8577c3 53342 6c8458c0 194 API calls 53334->53342 53335 6c8577a3 Sleep 53335->53350 53336->53350 53337 6c857620 WideCharToMultiByte 53337->53350 53338 6c857849 53340 6c9d2c7e 194 API calls 53338->53340 53341 6c85784e 53340->53341 53343 6c8577f3 53342->53343 53355 6c8572b0 203 API calls 2 library calls 53343->53355 53344 6c8458c0 194 API calls 53344->53350 53346 6c857802 53346->53338 53347 6c857828 std::ios_base::_Ios_base_dtor 53346->53347 53348 6c8577b3 CloseHandle 53348->53338 53348->53350 53349 6c85773f Process32NextW 53349->53336 53349->53337 53350->53331 53350->53333 53350->53334 53350->53335 53350->53337 53350->53338 53350->53344 53350->53348 53350->53349 53356 6c8500a0 53351->53356 53353 6c857296 53355->53346 53357 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53356->53357 53358 6c8500ea GetModuleFileNameA 53357->53358 53359 6c850180 53358->53359 53359->53359 53360 6c8458c0 194 API calls 53359->53360 53361 6c85019c 53360->53361 53365 6c851a4a 53361->53365 53367 6c85040c _memcpy_s 53361->53367 53661 6c8459b0 194 API calls 3 library calls 53361->53661 53370 6c9d2c7e 194 API calls 53365->53370 53367->53365 53368 6c850482 _memcpy_s 53367->53368 53662 6c8459b0 194 API calls 3 library calls 53367->53662 53557 6c84ffb0 53368->53557 53369 6c84ffb0 194 API calls 53371 6c8504c6 53369->53371 53372 6c851a59 53370->53372 53563 6c84f910 53371->53563 53374 6c9d2c7e 194 API calls 53372->53374 53375 6c851a5e 53374->53375 53379 6c9d2c7e 194 API calls 53375->53379 53376 6c850584 std::ios_base::_Ios_base_dtor 53378 6c84f910 198 API calls 53376->53378 53377 6c850522 53377->53365 53377->53376 53383 6c85059f 53378->53383 53380 6c851a68 53379->53380 53386 6c9d2c7e 194 API calls 53380->53386 53381 6c85060b SHGetFolderPathA 53384 6c850674 53381->53384 53385 6c85062b 53381->53385 53382 6c850601 std::ios_base::_Ios_base_dtor 53382->53381 53383->53372 53383->53381 53383->53382 53387 6c84aae0 231 API calls 53384->53387 53390 6c8458c0 194 API calls 53385->53390 53388 6c851a72 53386->53388 53389 6c850683 53387->53389 53391 6c9d2c7e 194 API calls 53388->53391 53663 6c852530 261 API calls 53389->53663 53396 6c85066c 53390->53396 53393 6c851a77 53391->53393 53395 6c9d2c7e 194 API calls 53393->53395 53394 6c84ffb0 194 API calls 53397 6c85072a 53394->53397 53398 6c851a81 53395->53398 53396->53375 53401 6c8506ff _memcpy_s 53396->53401 53664 6c8459b0 194 API calls 3 library calls 53396->53664 53397->53375 53400 6c850758 std::ios_base::_Ios_base_dtor 53397->53400 53404 6c9d2c7e 194 API calls 53398->53404 53593 6c848950 53400->53593 53401->53394 53403 6c850780 53611 6c84fdc0 53403->53611 53406 6c851a8b 53404->53406 53671 6c844da0 194 API calls 53406->53671 53409 6c851a90 53672 6c844d00 194 API calls 2 library calls 53409->53672 53411 6c84ffb0 194 API calls 53413 6c85081d 53411->53413 53412 6c851a95 53416 6c9d2c7e 194 API calls 53412->53416 53422 6c85084d std::ios_base::_Ios_base_dtor _memcpy_s 53413->53422 53666 6c853050 207 API calls 4 library calls 53413->53666 53415 6c8507f2 _memcpy_s 53415->53411 53417 6c851a9a 53416->53417 53419 6c9d2c7e 194 API calls 53417->53419 53420 6c851a9f 53419->53420 53421 6c9d2c7e 194 API calls 53420->53421 53433 6c851aa4 53421->53433 53422->53380 53423 6c8509b0 std::ios_base::_Ios_base_dtor 53422->53423 53424 6c8458c0 194 API calls 53423->53424 53425 6c8509fb 53424->53425 53615 6c84fe80 53425->53615 53427 6c850a0d 53427->53388 53428 6c850a45 Sleep 53427->53428 53430 6c850a3b std::ios_base::_Ios_base_dtor 53427->53430 53429 6c850a80 53428->53429 53429->53429 53431 6c8458c0 194 API calls 53429->53431 53430->53428 53432 6c850a93 53431->53432 53432->53393 53437 6c850adc _memcpy_s 53432->53437 53667 6c8459b0 194 API calls 3 library calls 53432->53667 53433->53353 53434 6c84ffb0 194 API calls 53436 6c850b06 53434->53436 53438 6c848950 231 API calls 53436->53438 53437->53434 53439 6c850b1d 53438->53439 53440 6c84fdc0 194 API calls 53439->53440 53442 6c850b2a std::ios_base::_Ios_base_dtor 53440->53442 53441 6c850bec std::ios_base::_Ios_base_dtor 53443 6c8458c0 194 API calls 53441->53443 53442->53393 53442->53441 53444 6c850c29 53443->53444 53444->53398 53449 6c850c6f _memcpy_s 53444->53449 53668 6c8459b0 194 API calls 3 library calls 53444->53668 53445 6c84ffb0 194 API calls 53446 6c850c99 53445->53446 53448 6c848950 231 API calls 53446->53448 53450 6c850cb0 53448->53450 53449->53445 53451 6c84fdc0 194 API calls 53450->53451 53453 6c850cbd std::ios_base::_Ios_base_dtor 53451->53453 53452 6c850e5d std::ios_base::_Ios_base_dtor 53452->53406 53455 6c850e7d 53452->53455 53453->53398 53453->53452 53454 6c850ec8 53457 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53454->53457 53455->53454 53458 6c850f0d 53455->53458 53459 6c850f1a 53455->53459 53462 6c850edb _memcpy_s 53455->53462 53457->53462 53458->53409 53458->53454 53460 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53459->53460 53460->53462 53462->53412 53626 6c8526a0 53462->53626 53463 6c8526a0 194 API calls 53464 6c850f7e 53463->53464 53465 6c8526a0 194 API calls 53464->53465 53466 6c850f94 53465->53466 53467 6c8526a0 194 API calls 53466->53467 53468 6c850faa 53467->53468 53469 6c8526a0 194 API calls 53468->53469 53470 6c850fc0 53469->53470 53471 6c8526a0 194 API calls 53470->53471 53472 6c850fd6 53471->53472 53473 6c8526a0 194 API calls 53472->53473 53474 6c850fec 53473->53474 53475 6c8526a0 194 API calls 53474->53475 53476 6c850fff 53475->53476 53477 6c8526a0 194 API calls 53476->53477 53478 6c851015 53477->53478 53479 6c8526a0 194 API calls 53478->53479 53480 6c85102b 53479->53480 53481 6c8526a0 194 API calls 53480->53481 53483 6c851041 std::ios_base::_Ios_base_dtor 53481->53483 53482 6c8513d4 std::ios_base::_Ios_base_dtor 53484 6c8458c0 194 API calls 53482->53484 53483->53412 53483->53482 53485 6c851423 53484->53485 53486 6c84fe80 285 API calls 53485->53486 53487 6c851435 53486->53487 53487->53417 53488 6c85146d Sleep 53487->53488 53489 6c851463 std::ios_base::_Ios_base_dtor 53487->53489 53630 6c852320 53488->53630 53489->53488 53491 6c85154a 53492 6c852320 194 API calls 53491->53492 53493 6c851577 53492->53493 53494 6c84ffb0 194 API calls 53493->53494 53495 6c851586 53494->53495 53496 6c84ffb0 194 API calls 53495->53496 53497 6c85159a 53496->53497 53638 6c8525d0 53497->53638 53501 6c8515ba 53502 6c845760 194 API calls 53501->53502 53503 6c8515c2 53502->53503 53646 6c845700 53503->53646 53505 6c8515ca 53506 6c845700 194 API calls 53505->53506 53507 6c8515d6 53506->53507 53508 6c8515e3 WinExec 53507->53508 53509 6c852320 194 API calls 53508->53509 53510 6c851662 53509->53510 53511 6c84ffb0 194 API calls 53510->53511 53512 6c851674 53511->53512 53513 6c845700 194 API calls 53512->53513 53514 6c851680 53513->53514 53515 6c852320 194 API calls 53514->53515 53516 6c8516a9 53515->53516 53517 6c84ffb0 194 API calls 53516->53517 53518 6c8516bb 53517->53518 53519 6c8525f0 194 API calls 53518->53519 53520 6c8516d3 53519->53520 53651 6c84aa80 53520->53651 53524 6c851704 53525 6c845760 194 API calls 53524->53525 53526 6c85170f 53525->53526 53527 6c845760 194 API calls 53526->53527 53528 6c85171a 53527->53528 53529 6c845760 194 API calls 53528->53529 53530 6c851725 53529->53530 53531 6c845700 194 API calls 53530->53531 53532 6c85172d 53531->53532 53533 6c85173a WinExec Sleep 53532->53533 53659 6c845750 53533->53659 53537 6c85175a 53670 6c850090 DeleteFileA 53537->53670 53539 6c85176c 53540 6c845760 194 API calls 53539->53540 53541 6c851777 53540->53541 53542 6c845760 194 API calls 53541->53542 53543 6c851782 53542->53543 53544 6c845760 194 API calls 53543->53544 53545 6c85178d 53544->53545 53546 6c845760 194 API calls 53545->53546 53547 6c851798 53546->53547 53548 6c845760 194 API calls 53547->53548 53549 6c8517a3 53548->53549 53550 6c845760 194 API calls 53549->53550 53551 6c8517ae 53550->53551 53552 6c845760 194 API calls 53551->53552 53553 6c8517b9 53552->53553 53554 6c845760 194 API calls 53553->53554 53556 6c8517c4 std::ios_base::_Ios_base_dtor 53554->53556 53555 6c8519c4 std::ios_base::_Ios_base_dtor 53555->53353 53556->53420 53556->53555 53558 6c850018 53557->53558 53561 6c850025 53557->53561 53673 6c8528f0 194 API calls 4 library calls 53558->53673 53560 6c85007b 53560->53369 53561->53560 53674 6c84b760 194 API calls 4 library calls 53561->53674 53564 6c84f96e 53563->53564 53585 6c84f97a 53563->53585 53675 6c852730 194 API calls 4 library calls 53564->53675 53566 6c84fc2b MultiByteToWideChar 53569 6c84fc6c Concurrency::details::ExternalContextBase::~ExternalContextBase _memcpy_s 53566->53569 53567 6c84fda4 53677 6c844da0 194 API calls 53567->53677 53575 6c84fc78 MultiByteToWideChar WideCharToMultiByte 53569->53575 53570 6c84fb7c 53574 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53570->53574 53571 6c84fda9 53678 6c844d00 194 API calls 2 library calls 53571->53678 53573 6c84fb63 53573->53570 53576 6c84fbec 53573->53576 53577 6c84fbdf 53573->53577 53578 6c84fb38 _memcpy_s 53573->53578 53574->53578 53580 6c84fcb2 Concurrency::details::ExternalContextBase::~ExternalContextBase _memcpy_s 53575->53580 53582 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53576->53582 53577->53570 53577->53571 53578->53566 53591 6c84fd14 std::ios_base::_Ios_base_dtor 53578->53591 53579 6c9d2c7e 194 API calls 53584 6c84fdb3 53579->53584 53587 6c84fcc0 WideCharToMultiByte 53580->53587 53581 6c84faf0 53583 6c84fae8 53581->53583 53676 6c852f10 194 API calls 4 library calls 53581->53676 53582->53578 53583->53567 53583->53573 53583->53578 53585->53581 53585->53583 53588 6c852f10 194 API calls 53585->53588 53589 6c84fcdd 53587->53589 53588->53585 53590 6c8458c0 194 API calls 53589->53590 53590->53591 53591->53579 53592 6c84fd85 std::ios_base::_Ios_base_dtor 53591->53592 53592->53377 53594 6c84897a 53593->53594 53595 6c848a2b 53594->53595 53600 6c84898e 53594->53600 53679 6c844da0 194 API calls 53595->53679 53597 6c8489b9 53602 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53597->53602 53598 6c848a30 53680 6c844d00 194 API calls 2 library calls 53598->53680 53600->53597 53601 6c848993 _memcpy_s 53600->53601 53604 6c848a01 53600->53604 53605 6c8489f8 53600->53605 53601->53403 53603 6c8489cc 53602->53603 53603->53601 53607 6c9d2c7e 194 API calls 53603->53607 53606 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53604->53606 53605->53597 53605->53598 53606->53601 53608 6c848a3a 53607->53608 53609 6c848140 231 API calls 53608->53609 53610 6c848a81 std::ios_base::_Ios_base_dtor 53609->53610 53610->53403 53614 6c84fdf0 53611->53614 53612 6c84fe3f 53612->53380 53612->53415 53665 6c8459b0 194 API calls 3 library calls 53612->53665 53614->53612 53681 6c8523c0 194 API calls _memcpy_s 53614->53681 53616 6c8484a0 285 API calls 53615->53616 53617 6c84feb2 53616->53617 53618 6c84ff1f 53617->53618 53682 6c8521b0 53617->53682 53619 6c848140 231 API calls 53618->53619 53621 6c84ff51 std::ios_base::_Ios_base_dtor 53619->53621 53621->53427 53623 6c8499e0 231 API calls 53624 6c84fef2 53623->53624 53624->53618 53625 6c846840 231 API calls 53624->53625 53625->53618 53627 6c8526d4 53626->53627 53628 6c850f68 53626->53628 53694 6c84b760 194 API calls 4 library calls 53627->53694 53628->53463 53631 6c85235b _memcpy_s 53630->53631 53632 6c85234b 53630->53632 53631->53491 53633 6c852352 53632->53633 53634 6c85237e 53632->53634 53695 6c8459b0 194 API calls 3 library calls 53633->53695 53696 6c852090 194 API calls std::ios_base::_Ios_base_dtor 53634->53696 53637 6c85239b std::ios_base::_Ios_base_dtor 53637->53491 53697 6c852d30 53638->53697 53640 6c8515ac 53641 6c845760 53640->53641 53642 6c84576b 53641->53642 53643 6c845786 std::ios_base::_Ios_base_dtor 53641->53643 53642->53643 53644 6c9d2c7e 194 API calls 53642->53644 53643->53501 53645 6c8457aa 53644->53645 53647 6c845709 53646->53647 53648 6c845726 std::ios_base::_Ios_base_dtor 53646->53648 53647->53648 53649 6c9d2c7e 194 API calls 53647->53649 53648->53505 53650 6c84574d 53649->53650 53652 6c8487f0 194 API calls 53651->53652 53653 6c84aa96 53652->53653 53654 6c84a8d0 53653->53654 53655 6c84a8de 53654->53655 53657 6c84a901 std::ios_base::_Ios_base_dtor 53654->53657 53656 6c9d2c7e 194 API calls 53655->53656 53655->53657 53658 6c84a94c 53656->53658 53657->53524 53660 6c845756 53659->53660 53669 6c850090 DeleteFileA 53660->53669 53661->53367 53662->53368 53663->53396 53664->53401 53665->53415 53666->53422 53667->53437 53668->53449 53669->53537 53670->53539 53672->53412 53673->53561 53674->53561 53675->53585 53676->53583 53678->53591 53680->53603 53681->53614 53683 6c8521eb 53682->53683 53685 6c852204 53683->53685 53692 6c84a380 231 API calls 53683->53692 53687 6c84d1c0 228 API calls 53685->53687 53688 6c852239 53685->53688 53686 6c846840 231 API calls 53690 6c8522d4 53686->53690 53687->53688 53688->53686 53689 6c84fee7 53689->53623 53690->53689 53693 6c84a4a0 231 API calls 53690->53693 53692->53685 53693->53689 53694->53628 53695->53631 53696->53637 53698 6c852d73 53697->53698 53699 6c852ef7 53698->53699 53700 6c852e3d 53698->53700 53710 6c852d78 _memcpy_s 53698->53710 53714 6c844da0 194 API calls 53699->53714 53701 6c852e4a 53700->53701 53706 6c852e91 53700->53706 53707 6c852e9a 53700->53707 53713 6c852e6a _memcpy_s 53700->53713 53705 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53701->53705 53703 6c852efc 53715 6c844d00 194 API calls 2 library calls 53703->53715 53708 6c852e5f 53705->53708 53706->53701 53706->53703 53709 6c864f63 Concurrency::details::ExternalContextBase::~ExternalContextBase 15 API calls 53707->53709 53711 6c9d2c7e 194 API calls 53708->53711 53708->53713 53709->53713 53710->53640 53712 6c852f06 53711->53712 53713->53640 53715->53708 53716 6c8411ae 53721 6c865069 53716->53721 53720 6c8411c4 53722 6c873221 28 API calls 53721->53722 53723 6c8411ba 53722->53723 53724 6c9c7dcb 194 API calls 53723->53724 53724->53720 53725 6c9d7421 53726 6c9d742d ___scrt_is_nonwritable_in_current_image 53725->53726 53727 6c9d7449 53726->53727 53728 6c9d7434 53726->53728 53738 6c9d6d85 EnterCriticalSection 53727->53738 53750 6c9d2d6c 14 API calls __dosmaperr 53728->53750 53731 6c9d7453 53739 6c9d732d 53731->53739 53732 6c9d7439 53751 6c9d2c6e 194 API calls _memcpy_s 53732->53751 53737 6c9d7444 53738->53731 53740 6c9d7345 53739->53740 53742 6c9d73b5 53739->53742 53741 6c9de713 __fread_nolock 194 API calls 53740->53741 53746 6c9d734b 53741->53746 53744 6c9d73ad 53742->53744 53753 6c9e6412 53742->53753 53752 6c9d748c LeaveCriticalSection __fread_nolock 53744->53752 53745 6c9d739d 53758 6c9d2d6c 14 API calls __dosmaperr 53745->53758 53746->53742 53746->53745 53748 6c9d73a2 53759 6c9d2c6e 194 API calls _memcpy_s 53748->53759 53750->53732 53751->53737 53752->53737 53754 6c9e47ac __Getctype 14 API calls 53753->53754 53755 6c9e642f 53754->53755 53756 6c9e1598 ___free_lconv_mon 14 API calls 53755->53756 53757 6c9e6439 53756->53757 53757->53744 53758->53748 53759->53744 53760 6c9c7e11 53761 6c9c7e1c 53760->53761 53762 6c9c7e4f 53760->53762 53764 6c9c7e41 53761->53764 53765 6c9c7e21 53761->53765 53790 6c9c7f6b 248 API calls 4 library calls 53762->53790 53772 6c9c7e64 53764->53772 53766 6c9c7e26 53765->53766 53767 6c9c7e37 53765->53767 53771 6c9c7e2b 53766->53771 53788 6c9c7b93 21 API calls 53766->53788 53789 6c9c7b74 23 API calls 53767->53789 53773 6c9c7e70 ___scrt_is_nonwritable_in_current_image 53772->53773 53791 6c9c7c04 53773->53791 53775 6c9c7eed ___scrt_is_nonwritable_in_current_image 53775->53771 53776 6c9c7e77 __DllMainCRTStartup@12 53776->53775 53777 6c9c7e9e 53776->53777 53778 6c9c7f63 53776->53778 53799 6c9c7b66 53777->53799 53807 6c9c8d8d 4 API calls 2 library calls 53778->53807 53781 6c9c7f6a 53782 6c9c7ead __RTC_Initialize 53782->53775 53802 6c9c8f42 InitializeSListHead 53782->53802 53784 6c9c7ebb 53784->53775 53803 6c9c7b3b 53784->53803 53786 6c9c7eda 53786->53775 53787 6c9e002a std::locale::_Setgloballocale 194 API calls 53786->53787 53787->53775 53788->53771 53789->53771 53790->53771 53792 6c9c7c0d 53791->53792 53808 6c9c8a54 IsProcessorFeaturePresent 53792->53808 53794 6c9c7c19 53809 6c9cce1b 10 API calls 2 library calls 53794->53809 53796 6c9c7c1e 53798 6c9c7c22 53796->53798 53810 6c9cce4d 7 API calls 2 library calls 53796->53810 53798->53776 53811 6c9c7c3d 53799->53811 53801 6c9c7b6d 53801->53782 53802->53784 53804 6c9c7b40 ___scrt_release_startup_lock 53803->53804 53806 6c9c7b49 53804->53806 53818 6c9c8a54 IsProcessorFeaturePresent 53804->53818 53806->53786 53807->53781 53808->53794 53809->53796 53810->53798 53812 6c9c7c4d 53811->53812 53813 6c9c7c49 53811->53813 53816 6c9c7c5a ___scrt_release_startup_lock 53812->53816 53817 6c9c8d8d 4 API calls 2 library calls 53812->53817 53813->53801 53815 6c9c7cc3 53816->53801 53817->53815 53818->53806
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C85014C
                                  • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,?), ref: 6C850621
                                  • Sleep.KERNELBASE(000000C8,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6C850A4A
                                  • Sleep.KERNELBASE(000000C8,?,?), ref: 6C851472
                                  • WinExec.KERNEL32(00000000,00000000), ref: 6C8515EA
                                  • WinExec.KERNEL32(00000000,00000000), ref: 6C85173B
                                  • Sleep.KERNELBASE(00007530,?,?,65776F70), ref: 6C851742
                                    • Part of subcall function 6C850090: DeleteFileA.KERNEL32(00000000,6C85175A,?,?,65776F70), ref: 6C850091
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C851A90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Sleep$ExecFile$Concurrency::cancel_current_taskDeleteFolderModuleNamePath
                                  • String ID: Cur$ Unr$"Set$-Exe$.30320$56ew$5Lu7$5Yqh$5ZCN$5b6E$6Lev$Bypa$Comm$Error retrieving folder path$Exec$File$IC1Q$IC1Y$ICR0$ICR4$IEdl$IHwg$Igok$Igok$JHht$JHht$LVN0$LVRh$PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+CjxUYXNrIHZlcnNpb249IjEuMyIgeG1sbnM9Imh0dHA6Ly9zY2hlbWFzLm1pY3Jvc29mdC5jb20vd2luZG93cy8yMDA0LzAyL21pdC90YXNrIj4KICA8UmVnaXN0cmF0aW9uSW5mbz4KICAgIDxEYXRlPjIwMDYtMTEtMTBUMTQ6Mjk6NTUuNTg1MTkyNjwvRGF0ZT4KICAgIDxB$PSAi$PSAi$Q29u$T3V0$TmFt$User$WE1M$Y2hl$YW1l$YXNr$YXNr$YXRo$YXRo$ZHVs$ZQ==$ZW50$ZWRU$ZWdp$ZwpS$\Pol$a05h$anag$and $b250$bENv$bFBh$bWUg$bWwg$bWxQ$bnQg$bnRl$c2tO$c3Rl$ci1T$cmd.$cmlu$cope$cuti$d -S$dC1D$dCA9$dGFz$dGVu$dGgg$eG1s$emen$estr$exe $icte$icy $icyM$licy$ll -$ll -$nPol$onPo$powe$powe$rent$rshe$rshe$ss -$t.xm$utio
                                  • API String ID: 1974682518-963388687
                                  • Opcode ID: b5be79af9e76442d18040a77862b21f7c1cc2d356b19823ac6c1ec425b80e506
                                  • Instruction ID: b5a2718541d0880724677857ca8381001f4f0dbb578c3e50f848bcd389330cad
                                  • Opcode Fuzzy Hash: b5be79af9e76442d18040a77862b21f7c1cc2d356b19823ac6c1ec425b80e506
                                  • Instruction Fuzzy Hash: 88F2F271D012588BDB25CF24CE987DDBBB1AF51308F6486E8D0486BB91DBB49B88CF51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 906 6c844e30-6c844e6f 907 6c844e71 906->907 908 6c844e73-6c844e8d CryptStringToBinaryA 906->908 907->908 909 6c844e93-6c844eb1 908->909 910 6c844f2a 908->910 911 6c844ee6-6c844ef8 909->911 912 6c844eb3-6c844eb8 909->912 913 6c844f2f-6c844f40 call 6c844db0 call 6c9cb8ae 910->913 916 6c844efc-6c844f0e CryptStringToBinaryA 911->916 917 6c844efa 911->917 914 6c844f45-6c844f4a call 6c8459a0 912->914 915 6c844ebe-6c844ee4 call 6c8459b0 call 6c9cb340 912->915 913->914 915->911 922 6c844f17-6c844f29 916->922 923 6c844f10-6c844f15 916->923 917->916 923->913
                                  APIs
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C844E89
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C844F0A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: BinaryCryptString
                                  • String ID: Failed to acquire cryptographic context.$Failed to calculate base64 decoded size.$Failed to create hash object.$Failed to decode base64 string.$Failed to decrypt data.$Failed to get hash length.$Failed to get hash value.$Failed to hash data.$Failed to import key.$Failed to set IV.$Failed to set cipher mode.$Invalid encrypted data header.$Salt$`nt$ed__$wi65
                                  • API String ID: 80407269-2278120152
                                  • Opcode ID: 936f203e3d98c94ccbb2fadfaa69464c7497ceaf8dfe7b90567d8910ad38e475
                                  • Instruction ID: 59298fe12a29c2fd444a88fef95c9a774947132b3cc8aa5b9b153f692936ba8e
                                  • Opcode Fuzzy Hash: 936f203e3d98c94ccbb2fadfaa69464c7497ceaf8dfe7b90567d8910ad38e475
                                  • Instruction Fuzzy Hash: E531A471A00209EBEB10CF58DD85BAEBBB8FB44714F208569F514EB7C0D7B4A944CBA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 929 6c856130-6c85614c 930 6c856153-6c856157 929->930 931 6c85614e-6c856150 929->931 932 6c8561b2-6c8561df 930->932 933 6c856159-6c85616f call 6c9cb340 930->933 931->930 936 6c856174-6c856186 933->936 936->936 937 6c856188-6c856192 936->937 937->932 938 6c856194-6c856198 937->938 939 6c8561a0-6c8561ab 938->939 940 6c8561e0-6c8561e5 939->940 941 6c8561ad-6c8561b0 939->941 940->932 942 6c8561e7-6c8561ee 940->942 941->932 941->939 943 6c8561f5-6c85620b call 6c9cb340 942->943 944 6c8561f0-6c8561f2 942->944 947 6c856210-6c856222 943->947 944->943 947->947 948 6c856224-6c856241 947->948 949 6c856256 948->949 950 6c856243-6c856245 948->950 953 6c856258-6c856271 949->953 951 6c856275-6c856278 950->951 952 6c856247-6c856254 950->952 951->953 952->949 952->950 954 6c8562a1-6c856313 call 6c84a950 WSAStartup call 6c856130 953->954 955 6c856273-6c856288 953->955 966 6c856315-6c85631e 954->966 967 6c856391-6c856397 954->967 959 6c85628c-6c8562a0 call 6c8458c0 955->959 960 6c85628a 955->960 960->959 968 6c856320-6c85632c 966->968 969 6c85634e-6c85638e 966->969 970 6c8563c5-6c8563da call 6c856130 967->970 971 6c856399-6c8563a5 967->971 975 6c856344-6c85634b call 6c9c7de0 968->975 976 6c85632e-6c85633c 968->976 969->967 983 6c8563dc-6c8563e5 970->983 984 6c856458-6c85645e 970->984 972 6c8563a7-6c8563b5 971->972 973 6c8563bb-6c8563c2 call 6c9c7de0 971->973 972->973 977 6c8565e3 call 6c9d2c7e 972->977 973->970 975->969 976->977 980 6c856342 976->980 991 6c8565e8 call 6c9d2c7e 977->991 980->975 989 6c856415-6c856455 983->989 990 6c8563e7-6c8563f3 983->990 987 6c856460-6c85646c 984->987 988 6c85648c-6c8564c4 getaddrinfo 984->988 992 6c856482-6c856489 call 6c9c7de0 987->992 993 6c85646e-6c85647c 987->993 994 6c8565d6-6c8565de WSACleanup call 6c9d7ee9 988->994 995 6c8564ca-6c8564d5 988->995 989->984 996 6c8563f5-6c856403 990->996 997 6c85640b-6c856412 call 6c9c7de0 990->997 999 6c8565ed-6c856610 WSACleanup call 6c9d2d7f call 6c9d7ee9 991->999 992->988 993->991 993->992 994->977 1001 6c856527-6c856535 freeaddrinfo 995->1001 1002 6c8564d7-6c8564dd 995->1002 996->991 1003 6c856409 996->1003 997->989 1001->994 1008 6c85653b 1001->1008 1007 6c8564e0-6c8564f7 socket 1002->1007 1003->997 1007->994 1011 6c8564fd-6c856509 connect 1007->1011 1012 6c856541-6c85654c 1008->1012 1014 6c856524 1011->1014 1015 6c85650b-6c856522 closesocket 1011->1015 1016 6c856550-6c856567 recv 1012->1016 1014->1001 1015->1007 1015->1014 1017 6c85659d 1016->1017 1018 6c856569-6c85657e 1016->1018 1017->999 1021 6c85659f-6c8565d5 VirtualAlloc call 6c9cadc0 1017->1021 1018->1016 1020 6c856580-6c85659b call 6c9d80ef 1018->1020 1020->1012
                                  APIs
                                  • WSAStartup.WS2_32(00000202,?), ref: 6C8562CF
                                  • getaddrinfo.WS2_32(6CA6CB64,6CA6CB4C,00000000,00000000), ref: 6C8564BC
                                  • socket.WS2_32(?,?,?), ref: 6C8564E9
                                  • connect.WS2_32(00000000,?,?), ref: 6C856504
                                  • closesocket.WS2_32 ref: 6C856511
                                  • freeaddrinfo.WS2_32(00000000), ref: 6C856528
                                  • recv.WS2_32(005EC0B0,00001000,00000000), ref: 6C856563
                                  • VirtualAlloc.KERNEL32(00000000,00003000,00000040), ref: 6C8565AE
                                  • WSACleanup.WS2_32 ref: 6C8565D6
                                  • WSACleanup.WS2_32 ref: 6C8565F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Cleanup$AllocStartupVirtualclosesocketconnectfreeaddrinfogetaddrinforecvsocket
                                  • String ID: $IOVA
                                  • API String ID: 2484549806-670572268
                                  • Opcode ID: faa562d619d856c6b7fd531fe23a27fbe61aae09e5bd9242e79a628b1c101ca3
                                  • Instruction ID: 5b4531b045e17b0b208db765082a00f56135a302539e2a07a362ac3b422240dd
                                  • Opcode Fuzzy Hash: faa562d619d856c6b7fd531fe23a27fbe61aae09e5bd9242e79a628b1c101ca3
                                  • Instruction Fuzzy Hash: 7AD14370B007158FCF299F38C9547B9BBB1BB46308F508A6CE410DBB91D7B0999ACB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1156 6c857850-6c8578c0 1157 6c8578c7-6c8578cc 1156->1157 1157->1157 1158 6c8578ce-6c85790a call 6c8458c0 call 6c8525f0 1157->1158 1163 6c85790c-6c85791b 1158->1163 1164 6c85793b-6c857971 GetFileAttributesA 1158->1164 1165 6c857931-6c857938 call 6c9c7de0 1163->1165 1166 6c85791d-6c85792b 1163->1166 1167 6c857977-6c85798e SHGetFolderPathA 1164->1167 1168 6c857c08-6c857c11 1164->1168 1165->1164 1166->1165 1169 6c857d5a call 6c9d2c7e 1166->1169 1167->1168 1173 6c857994-6c8579af 1167->1173 1170 6c857c17-6c857c26 1168->1170 1171 6c857d48-6c857d59 1168->1171 1183 6c857d5f call 6c9d2c7e 1169->1183 1174 6c857c2c-6c857c3a 1170->1174 1175 6c857d3e-6c857d45 call 6c9c7de0 1170->1175 1177 6c8579b2-6c8579b7 1173->1177 1179 6c857d64 call 6c9d2c7e 1174->1179 1180 6c857c40 1174->1180 1175->1171 1177->1177 1182 6c8579b9-6c8579dc call 6c8458c0 1177->1182 1188 6c857d69-6c857d6f call 6c9d2c7e 1179->1188 1180->1175 1190 6c8579de-6c8579f7 1182->1190 1191 6c8579f9-6c857a0c call 6c84b8a0 1182->1191 1183->1179 1193 6c857a11-6c857a72 call 6c8525f0 1190->1193 1191->1193 1198 6c857a74-6c857a7f 1193->1198 1199 6c857a91-6c857aa6 call 6c84b8a0 1193->1199 1200 6c857a81 1198->1200 1201 6c857a83-6c857a8f 1198->1201 1203 6c857aa8-6c857ae9 1199->1203 1200->1201 1201->1203 1205 6c857b17-6c857b33 1203->1205 1206 6c857aeb-6c857af7 1203->1206 1207 6c857b35-6c857b41 1205->1207 1208 6c857b61-6c857b7d 1205->1208 1209 6c857b0d-6c857b14 call 6c9c7de0 1206->1209 1210 6c857af9-6c857b07 1206->1210 1212 6c857b57-6c857b5e call 6c9c7de0 1207->1212 1213 6c857b43-6c857b51 1207->1213 1214 6c857b7f-6c857b8b 1208->1214 1215 6c857bab-6c857bd2 GetFileAttributesA 1208->1215 1209->1205 1210->1183 1210->1209 1212->1208 1213->1183 1213->1212 1218 6c857ba1-6c857ba8 call 6c9c7de0 1214->1218 1219 6c857b8d-6c857b9b 1214->1219 1220 6c857c45-6c857c67 CoInitialize CoCreateInstance 1215->1220 1221 6c857bd4-6c857bda 1215->1221 1218->1215 1219->1183 1219->1218 1224 6c857d05-6c857d11 CoUninitialize 1220->1224 1225 6c857c6d-6c857cbf MultiByteToWideChar 1220->1225 1221->1168 1222 6c857bdc-6c857be8 1221->1222 1227 6c857bfe-6c857c05 call 6c9c7de0 1222->1227 1228 6c857bea-6c857bf8 1222->1228 1224->1168 1229 6c857d17-6c857d23 1224->1229 1237 6c857cc1-6c857cee MultiByteToWideChar 1225->1237 1238 6c857cfc-6c857d00 1225->1238 1227->1168 1228->1188 1228->1227 1229->1227 1232 6c857d29-6c857d37 1229->1232 1232->1188 1235 6c857d39 1232->1235 1235->1227 1239 6c857cf3-6c857cf7 1237->1239 1238->1224 1239->1238
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(?), ref: 6C857968
                                  • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?), ref: 6C857986
                                  • GetFileAttributesA.KERNELBASE(?,00000004,00000000,.lnk,00000004,?), ref: 6C857BC9
                                  • CoInitialize.OLE32(00000000), ref: 6C857C47
                                  • CoCreateInstance.OLE32(6CA39BD8,00000000,00000001,6CA44A88,?), ref: 6C857C5F
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 6C857C9A
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 6C857CDF
                                  • CoUninitialize.COMBASE ref: 6C857D05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AttributesByteCharFileMultiWide$CreateFolderInitializeInstancePathUninitialize
                                  • String ID: .lnk$Down$load
                                  • API String ID: 120116150-380299436
                                  • Opcode ID: 4751bbc896243b835280e133e9e2ab12d050c980fd35d057fb0f0ac736357b96
                                  • Instruction ID: 4c241217844ecc9f887af4e86945a3a3f638efb6511e18db5588706f38aced1c
                                  • Opcode Fuzzy Hash: 4751bbc896243b835280e133e9e2ab12d050c980fd35d057fb0f0ac736357b96
                                  • Instruction Fuzzy Hash: 3BE12570E102489FDB15CF64CD84BEDBBB1FF45308F60C298E019ABA91D7B1AA85CB51

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleA.KERNEL32(yyzyBase.dll,?,00000000), ref: 6C857218
                                  • FindResourceW.KERNEL32(00000000,CONFIG,AFX_DIALOG_LAYOUT), ref: 6C85722B
                                  • LoadResource.KERNEL32(00000000,00000000), ref: 6C857239
                                  • SizeofResource.KERNEL32(00000000,00000000), ref: 6C857243
                                  • LockResource.KERNEL32(00000000), ref: 6C85724C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$FindHandleLoadLockModuleSizeof
                                  • String ID: AFX_DIALOG_LAYOUT$CONFIG$yyzyBase.dll
                                  • API String ID: 1601749889-1902995937
                                  • Opcode ID: 5790e06dfc6854ad84b9d99a00ccccd12d51e62bbf6a61fccaf3754bbc295af2
                                  • Instruction ID: b3258376107e630a22949d5ec84ded6cbc3af0ea7c0f0439edc96fde4d3e8fa7
                                  • Opcode Fuzzy Hash: 5790e06dfc6854ad84b9d99a00ccccd12d51e62bbf6a61fccaf3754bbc295af2
                                  • Instruction Fuzzy Hash: 5CF0C8727017126BE75616F64C88EFB3A6CDF9619D704843CF502C2600EF65DC0786B6

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 6C844E30: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C844E89
                                    • Part of subcall function 6C844E30: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C844F0A
                                  • CryptAcquireContextW.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 6C8453BA
                                  • CryptImportKey.ADVAPI32(00000000,00000208,00000014,00000000,00000000,?), ref: 6C84540F
                                  • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84541E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Crypt$BinaryContextString$AcquireImportRelease
                                  • String ID: Failed to import key.$Salt$ed__$wi65
                                  • API String ID: 552557845-1924075180
                                  • Opcode ID: 869f5e1d6a8c0403f1a4672384f6bf6b347ce6bea8910be6bfd89428c4684865
                                  • Instruction ID: d678ac9fa3a2972079eb143b65a79a9a44065226fc96b1a46a821d5b255241c0
                                  • Opcode Fuzzy Hash: 869f5e1d6a8c0403f1a4672384f6bf6b347ce6bea8910be6bfd89428c4684865
                                  • Instruction Fuzzy Hash: 7751717190030C9FEB14CFA4CD58BDEBBB8FF01308F248528E555AB680DB75A949CBA1
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?), ref: 6C8575CF
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 6C857611
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C85763D
                                  • Process32NextW.KERNEL32(?,0000022C), ref: 6C857747
                                  • CloseHandle.KERNELBASE(00000000,?,?), ref: 6C857756
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Process32$ByteCharCloseCreateFirstHandleMultiNextSnapshotToolhelp32Wide
                                  • String ID:
                                  • API String ID: 4013288513-0
                                  • Opcode ID: 4f71460264d732ec7a6e5450bb37a515d00e30d0f6fb8723ce5088fab1f79ea2
                                  • Instruction ID: 7e2001eb5dc6f7d9155c3223227da0263ca32ca0ecca9b33f27f6afdb9b279ed
                                  • Opcode Fuzzy Hash: 4f71460264d732ec7a6e5450bb37a515d00e30d0f6fb8723ce5088fab1f79ea2
                                  • Instruction Fuzzy Hash: 2E716570E102089FDB14CF64CD94BEDBBB9EF06318F64C358E415A7A81D7B06A85CB91
                                  APIs
                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,74E96E60), ref: 6C844FA2
                                  • CryptDestroyHash.ADVAPI32(?,?,6CA668B4,Failed to acquire cryptographic context.), ref: 6C845261
                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C84526C
                                  Strings
                                  • Failed to acquire cryptographic context., xrefs: 6C845243
                                  • Failed to hash data., xrefs: 6C845272
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Crypt$Context$AcquireDestroyHashRelease
                                  • String ID: Failed to acquire cryptographic context.$Failed to hash data.
                                  • API String ID: 2937476097-442885999
                                  • Opcode ID: c15e1bd028af755f89ddd1b8c19553607166984e7206e5feb00466ef724317bf
                                  • Instruction ID: 114fa611f1e938159167c3e8ff3218e4c4fe69528f8cc1e07ec82fab619646f3
                                  • Opcode Fuzzy Hash: c15e1bd028af755f89ddd1b8c19553607166984e7206e5feb00466ef724317bf
                                  • Instruction Fuzzy Hash: AD11F5B1D00259AEDF10DFE8CD45BDEBBF8BB18700F20492AE114F6A40EB745A498B61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 519 6c87004e-6c8700a4 call 6c9c81e5 call 6c86d5b9 GetDeviceCaps 524 6c8700a6-6c8700b2 519->524 525 6c8700bc-6c8700c4 519->525 524->525 526 6c8700b4 524->526 527 6c8700c6-6c8700ca 525->527 528 6c8700da-6c8700e2 525->528 526->525 527->528 529 6c8700cc-6c8700d4 call 6c86e092 DeleteObject 527->529 530 6c8700e4-6c8700e8 528->530 531 6c8700f8-6c870100 528->531 529->528 530->531 535 6c8700ea-6c8700f2 call 6c86e092 DeleteObject 530->535 532 6c870116-6c87011e 531->532 533 6c870102-6c870106 531->533 538 6c870134-6c87013c 532->538 539 6c870120-6c870124 532->539 533->532 537 6c870108-6c870110 call 6c86e092 DeleteObject 533->537 535->531 537->532 544 6c870152-6c87015a 538->544 545 6c87013e-6c870142 538->545 539->538 543 6c870126-6c87012e call 6c86e092 DeleteObject 539->543 543->538 546 6c870170-6c870178 544->546 547 6c87015c-6c870160 544->547 545->544 550 6c870144-6c87014c call 6c86e092 DeleteObject 545->550 552 6c87018e-6c870196 546->552 553 6c87017a-6c87017e 546->553 547->546 551 6c870162-6c87016a call 6c86e092 DeleteObject 547->551 550->544 551->546 559 6c8701ac-6c8701b4 552->559 560 6c870198-6c87019c 552->560 553->552 558 6c870180-6c870188 call 6c86e092 DeleteObject 553->558 558->552 561 6c8701b6-6c8701ba 559->561 562 6c8701ca-6c8701d2 559->562 560->559 565 6c87019e-6c8701a6 call 6c86e092 DeleteObject 560->565 561->562 566 6c8701bc-6c8701c4 call 6c86e092 DeleteObject 561->566 567 6c8701d4-6c8701d8 562->567 568 6c8701e8-6c870245 call 6c86fa11 call 6c9cb340 GetTextCharsetInfo 562->568 565->559 566->562 567->568 572 6c8701da-6c8701e2 call 6c86e092 DeleteObject 567->572 581 6c870247-6c87024a 568->581 582 6c87024c-6c870250 568->582 572->568 583 6c870253-6c870279 lstrcpyW 581->583 582->583 584 6c870252 582->584 585 6c8702e7-6c870328 CreateFontIndirectW call 6c86decf call 6c9d97db 583->585 586 6c87027b-6c870282 583->586 584->583 597 6c87032f-6c870435 CreateFontIndirectW call 6c86decf call 6c86fa11 CreateFontIndirectW call 6c86decf CreateFontIndirectW call 6c86decf CreateFontIndirectW call 6c86decf GetSystemMetrics lstrcpyW CreateFontIndirectW call 6c86decf GetStockObject 585->597 598 6c87032a-6c87032c 585->598 586->585 587 6c870284-6c87029e EnumFontFamiliesW 586->587 589 6c8702b5-6c8702d2 EnumFontFamiliesW 587->589 590 6c8702a0-6c8702b3 lstrcpyW 587->590 592 6c8702d4-6c8702d9 589->592 593 6c8702db 589->593 590->585 595 6c8702e0-6c8702e1 lstrcpyW 592->595 593->595 595->585 611 6c870505-6c870512 call 6c87098b 597->611 612 6c87043b-6c87044a GetObjectW 597->612 598->597 618 6c87053d-6c87053f 611->618 612->611 614 6c870450-6c870500 lstrcpyW CreateFontIndirectW call 6c86decf CreateFontIndirectW call 6c86decf GetObjectW CreateFontIndirectW call 6c86decf CreateFontIndirectW call 6c86decf 612->614 614->611 620 6c870514-6c87051b 618->620 621 6c870541-6c870551 call 6c8420f0 618->621 624 6c870567-6c87056c call 6c87191a 620->624 625 6c87051d-6c870527 call 6c86718f 620->625 627 6c870556-6c870566 call 6c86d707 call 6c9c8194 621->627 625->618 636 6c870529-6c870539 625->636 636->618
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C870058
                                    • Part of subcall function 6C86D5B9: __EH_prolog3.LIBCMT ref: 6C86D5C0
                                    • Part of subcall function 6C86D5B9: GetWindowDC.USER32(00000000,00000004,6C8705D3,00000000), ref: 6C86D5EC
                                  • GetDeviceCaps.GDI32(?,00000058), ref: 6C870078
                                  • DeleteObject.GDI32(00000000), ref: 6C8700D4
                                  • DeleteObject.GDI32(00000000), ref: 6C8700F2
                                  • DeleteObject.GDI32(00000000), ref: 6C870110
                                  • DeleteObject.GDI32(00000000), ref: 6C87012E
                                  • DeleteObject.GDI32(00000000), ref: 6C87014C
                                  • DeleteObject.GDI32(00000000), ref: 6C87016A
                                  • DeleteObject.GDI32(00000000), ref: 6C870188
                                  • DeleteObject.GDI32(00000000), ref: 6C8701A6
                                  • DeleteObject.GDI32(00000000), ref: 6C8701C4
                                  • DeleteObject.GDI32(00000000), ref: 6C8701E2
                                  • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 6C87021A
                                  • lstrcpyW.KERNEL32(?,?), ref: 6C87026F
                                  • EnumFontFamiliesW.GDI32(?,00000000,6C86F89C,Segoe UI), ref: 6C870296
                                  • lstrcpyW.KERNEL32(?,Segoe UI), ref: 6C8702A9
                                  • EnumFontFamiliesW.GDI32(?,00000000,6C86F89C,Tahoma), ref: 6C8702C7
                                  • lstrcpyW.KERNEL32(?,MS Sans Serif), ref: 6C8702E1
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8702EB
                                  • CreateFontIndirectW.GDI32(?), ref: 6C870333
                                  • CreateFontIndirectW.GDI32(?), ref: 6C870372
                                  • CreateFontIndirectW.GDI32(?), ref: 6C87039E
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8703BF
                                  • GetSystemMetrics.USER32(00000048), ref: 6C8703DE
                                  • lstrcpyW.KERNEL32(?,Marlett), ref: 6C8703F1
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8703FB
                                  • GetStockObject.GDI32(00000011), ref: 6C870427
                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C870442
                                  • lstrcpyW.KERNEL32(?,Arial), ref: 6C870483
                                  • CreateFontIndirectW.GDI32(?), ref: 6C87048D
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8704A6
                                  • GetObjectW.GDI32(?,0000005C,?), ref: 6C8704C4
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8704D2
                                  • CreateFontIndirectW.GDI32(?), ref: 6C8704F3
                                    • Part of subcall function 6C87098B: __EH_prolog3_GS.LIBCMT ref: 6C870992
                                    • Part of subcall function 6C87098B: GetTextMetricsW.GDI32(?,?), ref: 6C8709C7
                                    • Part of subcall function 6C87098B: GetTextMetricsW.GDI32(?,?), ref: 6C870A07
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Font$CreateDeleteIndirect$lstrcpy$MetricsText$EnumFamiliesH_prolog3_$CapsCharsetDeviceH_prolog3InfoStockSystemWindow
                                  • String ID: Arial$MS Sans Serif$Marlett$Segoe UI$Tahoma
                                  • API String ID: 2837096512-1395034203
                                  • Opcode ID: f77024a678303ec4aa83481e38749ab72d872954be8693b3b7e9dbf9279e5ca3
                                  • Instruction ID: e8423bf8a43030cf164db843f544eb565d225a8578ded561f5f2e93c7598e8c1
                                  • Opcode Fuzzy Hash: f77024a678303ec4aa83481e38749ab72d872954be8693b3b7e9dbf9279e5ca3
                                  • Instruction Fuzzy Hash: BFE17071A013499BDF25DFB4CE48BDEB7B8BF05349F008969E05AE7640EB34954ACB21

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 640 6c87056d-6c87058c call 6c9c81b2 GetSysColor 643 6c87058e-6c870598 GetSysColor 640->643 644 6c87059d 640->644 643->644 645 6c87059a-6c87059b 643->645 646 6c87059f-6c8705af GetSysColor 644->646 645->646 647 6c8705c2 646->647 648 6c8705b1-6c8705bb GetSysColor 646->648 650 6c8705c4-6c8706fb call 6c86d5b9 GetDeviceCaps GetSysColor * 21 647->650 648->647 649 6c8705bd-6c8705c0 648->649 649->650 653 6c870706-6c870712 GetSysColor 650->653 654 6c8706fd-6c870704 650->654 655 6c870718-6c87072e GetSysColorBrush 653->655 654->655 656 6c870985-6c87098a call 6c87191a 655->656 657 6c870734-6c870741 GetSysColorBrush 655->657 657->656 658 6c870747-6c870754 GetSysColorBrush 657->658 658->656 660 6c87075a-6c8708a5 call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreateSolidBrush call 6c86decf call 6c86e03f CreatePen call 6c86decf call 6c86e03f CreatePen call 6c86decf call 6c86e03f CreatePen call 6c86decf 658->660 702 6c8708a7-6c8708ab 660->702 703 6c8708b4-6c8708bb 660->703 702->703 704 6c8708ad-6c8708af call 6c86e03f 702->704 705 6c870921-6c87092d call 6c86f4da 703->705 706 6c8708bd-6c87091f CreateSolidBrush call 6c86decf 703->706 704->703 705->656 713 6c87092f-6c870963 call 6c86decf CreatePatternBrush call 6c86decf call 6c8420f0 705->713 712 6c870968-6c870984 call 6c915651 call 6c86d707 call 6c9c8180 706->712 713->712
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C870574
                                  • GetSysColor.USER32(00000016), ref: 6C87057D
                                  • GetSysColor.USER32(0000000F), ref: 6C870590
                                  • GetSysColor.USER32(00000015), ref: 6C8705A7
                                  • GetSysColor.USER32(0000000F), ref: 6C8705B3
                                  • GetDeviceCaps.GDI32(?,0000000C), ref: 6C8705DB
                                  • GetSysColor.USER32(0000000F), ref: 6C8705E9
                                  • GetSysColor.USER32(00000010), ref: 6C8705F7
                                  • GetSysColor.USER32(00000015), ref: 6C870605
                                  • GetSysColor.USER32(00000016), ref: 6C870613
                                  • GetSysColor.USER32(00000014), ref: 6C870621
                                  • GetSysColor.USER32(00000012), ref: 6C87062F
                                  • GetSysColor.USER32(00000011), ref: 6C87063D
                                  • GetSysColor.USER32(00000006), ref: 6C870648
                                  • GetSysColor.USER32(0000000D), ref: 6C870653
                                  • GetSysColor.USER32(0000000E), ref: 6C87065E
                                  • GetSysColor.USER32(00000005), ref: 6C870669
                                  • GetSysColor.USER32(00000008), ref: 6C870677
                                  • GetSysColor.USER32(00000009), ref: 6C870682
                                  • GetSysColor.USER32(00000007), ref: 6C87068D
                                  • GetSysColor.USER32(00000002), ref: 6C870698
                                  • GetSysColor.USER32(00000003), ref: 6C8706A3
                                  • GetSysColor.USER32(0000001B), ref: 6C8706B1
                                  • GetSysColor.USER32(0000001C), ref: 6C8706BF
                                  • GetSysColor.USER32(0000000A), ref: 6C8706CD
                                  • GetSysColor.USER32(0000000B), ref: 6C8706DB
                                  • GetSysColor.USER32(00000013), ref: 6C8706E9
                                  • GetSysColor.USER32(0000001A), ref: 6C870712
                                  • GetSysColorBrush.USER32(00000010), ref: 6C870723
                                  • GetSysColorBrush.USER32(00000014), ref: 6C870736
                                  • GetSysColorBrush.USER32(00000005), ref: 6C870749
                                  • CreateSolidBrush.GDI32(?), ref: 6C87076A
                                  • CreateSolidBrush.GDI32(?), ref: 6C870788
                                  • CreateSolidBrush.GDI32(00000006), ref: 6C8707A6
                                  • CreateSolidBrush.GDI32(?), ref: 6C8707C7
                                  • CreateSolidBrush.GDI32(?), ref: 6C8707E5
                                  • CreateSolidBrush.GDI32(?), ref: 6C870803
                                  • CreateSolidBrush.GDI32(?), ref: 6C870821
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C870847
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C87086B
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C87088F
                                  • CreateSolidBrush.GDI32(?), ref: 6C87090D
                                  • CreatePatternBrush.GDI32(00000000), ref: 6C87094B
                                    • Part of subcall function 6C86E03F: DeleteObject.GDI32(00000000), ref: 6C86E04E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                  • String ID:
                                  • API String ID: 3754413814-0
                                  • Opcode ID: 5cd4c9d80e3f5e6cbe087070d5f7d52f0fe6d33686def40d3751ff4055b2ec7e
                                  • Instruction ID: d52d33baee548aaf536eff6509433e10ac4187fa219e03fd82763d510bbdac64
                                  • Opcode Fuzzy Hash: 5cd4c9d80e3f5e6cbe087070d5f7d52f0fe6d33686def40d3751ff4055b2ec7e
                                  • Instruction Fuzzy Hash: 14C1B271B00702AFDB199FB589087ACBBB0BF19349F008529E515D7A80DB35A95BCFE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 725 6c846970-6c8469db GetTempPathA 726 6c8469e0-6c8469e5 725->726 726->726 727 6c8469e7-6c846a14 call 6c8458c0 726->727 730 6c846a16-6c846a3b call 6c9cadc0 727->730 731 6c846a3d-6c846a49 call 6c84b8a0 727->731 735 6c846a4e-6c846aa7 call 6c8484a0 730->735 731->735 738 6c846ad5-6c846af1 735->738 739 6c846aa9-6c846ab5 735->739 742 6c846af3-6c846aff 738->742 743 6c846b1f-6c846b38 738->743 740 6c846ab7-6c846ac5 739->740 741 6c846acb-6c846ad2 call 6c9c7de0 739->741 740->741 744 6c8473ac call 6c9d2c7e 740->744 741->738 746 6c846b15-6c846b1c call 6c9c7de0 742->746 747 6c846b01-6c846b0f 742->747 748 6c846c5c-6c846c7a 743->748 749 6c846b3e-6c846b74 call 6c84aae0 * 3 743->749 757 6c8473b1 call 6c9d2c7e 744->757 746->743 747->744 747->746 750 6c846c80-6c846c85 748->750 774 6c846b76 749->774 775 6c846b78-6c846ba7 call 6c84d430 call 6c84aae0 * 2 749->775 750->750 755 6c846c87-6c846cb1 call 6c8458c0 750->755 767 6c846cd7-6c846ce3 call 6c84b8a0 755->767 768 6c846cb3-6c846cd5 call 6c9cadc0 755->768 764 6c8473b6 call 6c9d2c7e 757->764 769 6c8473bb-6c84744e call 6c9d2c7e call 6c848140 call 6c9c9de4 764->769 777 6c846ce8-6c846d45 call 6c845dc0 767->777 768->777 774->775 805 6c846ba9 775->805 806 6c846bab-6c846c2a call 6c84d430 call 6c84aae0 * 7 call 6c8499e0 775->806 786 6c846d47-6c846d53 777->786 787 6c846d73-6c846d8f 777->787 792 6c846d55-6c846d63 786->792 793 6c846d69-6c846d70 call 6c9c7de0 786->793 788 6c846d91-6c846d9d 787->788 789 6c846dbd-6c846e33 787->789 795 6c846db3-6c846dba call 6c9c7de0 788->795 796 6c846d9f-6c846dad 788->796 799 6c846e36-6c846e3b 789->799 792->757 792->793 793->787 795->789 796->757 796->795 799->799 803 6c846e3d-6c846e67 call 6c8458c0 799->803 811 6c846e8d-6c846e99 call 6c84b8a0 803->811 812 6c846e69-6c846e8b call 6c9cadc0 803->812 805->806 878 6c846c2f-6c846c31 806->878 818 6c846e9e-6c846f00 call 6c8474f0 811->818 812->818 824 6c846f31-6c846f50 818->824 825 6c846f02-6c846f11 818->825 829 6c846f52-6c846f5e 824->829 830 6c846f7e-6c846f9e 824->830 827 6c846f27-6c846f2e call 6c9c7de0 825->827 828 6c846f13-6c846f21 825->828 827->824 828->764 828->827 835 6c846f74-6c846f7b call 6c9c7de0 829->835 836 6c846f60-6c846f6e 829->836 831 6c846fa0-6c846fbc call 6c84ad80 call 6c8499e0 830->831 832 6c84700c-6c847037 CreateProcessA 830->832 858 6c846fe7-6c846fec 831->858 859 6c846fbe-6c846fe2 call 6c846840 831->859 840 6c84703d-6c84705b 832->840 841 6c8472aa-6c8473ab call 6c848140 call 6c9c9de4 call 6c848140 call 6c9c9de4 832->841 835->830 836->764 836->835 847 6c847060-6c847065 840->847 847->847 851 6c847067-6c847091 call 6c8458c0 847->851 861 6c8470b7-6c8470c3 call 6c84b8a0 851->861 862 6c847093-6c8470b5 call 6c9cadc0 851->862 858->832 865 6c846fee-6c846ffe OpenProcess 858->865 859->858 873 6c8470c8-6c847136 call 6c8484a0 861->873 862->873 865->832 870 6c847000-6c847007 CloseHandle 865->870 870->841 882 6c847167-6c84718c 873->882 883 6c847138-6c847147 873->883 878->748 880 6c846c33-6c846c57 call 6c846840 878->880 880->748 884 6c84718e-6c84719a 882->884 885 6c8471ba-6c8471d3 882->885 886 6c84715d-6c847164 call 6c9c7de0 883->886 887 6c847149-6c847157 883->887 888 6c8471b0-6c8471b7 call 6c9c7de0 884->888 889 6c84719c-6c8471aa 884->889 890 6c8471d5-6c8471ec call 6c8485b0 call 6c8499e0 885->890 891 6c84721e-6c8472a7 CloseHandle * 2 call 6c848140 call 6c9c9de4 885->891 886->882 887->769 887->886 888->885 889->769 889->888 903 6c8471f1-6c8471f3 890->903 891->841 903->891 904 6c8471f5-6c847219 call 6c846840 903->904 904->891
                                  APIs
                                  • GetTempPathA.KERNEL32(00000104,?,75920F10,00000000), ref: 6C8469B7
                                  • OpenProcess.KERNEL32(00000410,00000000,00000000,00000000,?,00000001,?,?,?,?,00000002,?,?), ref: 6C846FF6
                                  • CloseHandle.KERNEL32(00000000), ref: 6C847001
                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00000001,?,?,?,?), ref: 6C84702F
                                  • CloseHandle.KERNEL32(?,?,00000002,?,?,?,?,?,monitor.pid,0000000B,?,?), ref: 6C84722A
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,monitor.pid,0000000B,?,?), ref: 6C847232
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C8472A2
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C847318
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C847391
                                    • Part of subcall function 6C84B8A0: Concurrency::cancel_current_task.LIBCPMT ref: 6C84B9E7
                                    • Part of subcall function 6C846840: ___std_exception_copy.LIBVCRUNTIME ref: 6C8468DF
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C847437
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_$CloseHandle$Process$Concurrency::cancel_current_taskCreateOpenPathTemp___std_exception_copy
                                  • String ID: start "" "%ProcessPath%"$:CheckProcess$@echo off$\monitor.bat$cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($monitor.pid$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul
                                  • API String ID: 1691980302-515577167
                                  • Opcode ID: f6dc7dccee37814a5e1b6131b7c861faf868bb93a0b8029e714bc3f6c06116c3
                                  • Instruction ID: 88e1cbcaf739ae1c4650f23b2c27ad19b29b9562064481303327fb8235acd8de
                                  • Opcode Fuzzy Hash: f6dc7dccee37814a5e1b6131b7c861faf868bb93a0b8029e714bc3f6c06116c3
                                  • Instruction Fuzzy Hash: 5062D170D0025C8FDB25CF68CD84BEEBBB5BF55308F1486A9D408AB651DB31AA89CF51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1029 6c856620-6c856690 1030 6c856697-6c85669c 1029->1030 1030->1030 1031 6c85669e-6c8566ce call 6c8458c0 1030->1031 1034 6c8566d0-6c8566d5 1031->1034 1034->1034 1035 6c8566d7-6c8566f4 call 6c8458c0 call 6c8452a0 1034->1035 1039 6c8566f9-6c856706 1035->1039 1040 6c856734-6c856750 1039->1040 1041 6c856708-6c856714 1039->1041 1044 6c856752-6c85675e 1040->1044 1045 6c85677e-6c85685f call 6c84a5b0 call 6c84a7a0 call 6c84a6e0 1040->1045 1042 6c856716-6c856724 1041->1042 1043 6c85672a-6c856731 call 6c9c7de0 1041->1043 1042->1043 1046 6c856c80 call 6c9d2c7e 1042->1046 1043->1040 1048 6c856774-6c85677b call 6c9c7de0 1044->1048 1049 6c856760-6c85676e 1044->1049 1056 6c856c85 call 6c9c93d9 1045->1056 1065 6c856865-6c856867 1045->1065 1046->1056 1048->1045 1049->1046 1049->1048 1061 6c856c8a call 6c844d00 1056->1061 1064 6c856c8f call 6c84a950 1061->1064 1070 6c856c94-6c856d1e call 6c9d2c7e call 6c852090 call 6c9c9de4 1064->1070 1067 6c856869-6c85686f 1065->1067 1068 6c8568d8 1065->1068 1071 6c856871-6c856876 1067->1071 1072 6c856898-6c8568a1 call 6c864f63 1067->1072 1069 6c8568e2-6c856905 1068->1069 1073 6c856910-6c856951 call 6c84a960 1069->1073 1071->1061 1075 6c85687c-6c856887 call 6c864f63 1071->1075 1083 6c8568a3-6c8568d6 call 6c9cadc0 1072->1083 1093 6c856953-6c85695e 1073->1093 1094 6c856968-6c856986 call 6c858e50 1073->1094 1075->1070 1086 6c85688d-6c856896 1075->1086 1083->1069 1086->1083 1093->1094 1100 6c856960-6c856964 1093->1100 1098 6c856b02-6c856b82 call 6c84aae0 call 6c84d430 call 6c852530 call 6c84aae0 call 6c84d430 call 6c852530 1094->1098 1099 6c85698c-6c8569b1 call 6c8527f0 1094->1099 1139 6c856b84-6c856b90 1098->1139 1140 6c856bb0-6c856c3e call 6c852090 call 6c9c9de4 1098->1140 1106 6c8569b7-6c8569c7 1099->1106 1107 6c856a4a-6c856a69 call 6c8527f0 1099->1107 1100->1094 1106->1064 1110 6c8569cd-6c8569fd call 6c8458c0 1106->1110 1107->1073 1114 6c856a6f-6c856a7f 1107->1114 1119 6c856a2d-6c856a45 1110->1119 1120 6c8569ff-6c856a0b 1110->1120 1114->1064 1117 6c856a85-6c856ab5 call 6c8458c0 1114->1117 1129 6c856ae5-6c856afd 1117->1129 1130 6c856ab7-6c856ac3 1117->1130 1119->1073 1123 6c856a23-6c856a2a call 6c9c7de0 1120->1123 1124 6c856a0d-6c856a1b 1120->1124 1123->1119 1124->1070 1127 6c856a21 1124->1127 1127->1123 1129->1073 1133 6c856ac5-6c856ad3 1130->1133 1134 6c856adb-6c856ae2 call 6c9c7de0 1130->1134 1133->1070 1136 6c856ad9 1133->1136 1134->1129 1136->1134 1143 6c856ba6-6c856bad call 6c9c7de0 1139->1143 1144 6c856b92-6c856ba0 1139->1144 1150 6c856c40-6c856c51 1140->1150 1151 6c856c6d-6c856c7f 1140->1151 1143->1140 1144->1070 1144->1143 1152 6c856c63-6c856c6a call 6c9c7de0 1150->1152 1153 6c856c53-6c856c61 1150->1153 1152->1151 1153->1070 1153->1152
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C856C30
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C856C85
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C856C8A
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C856D07
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_taskIos_base_dtorstd::ios_base::_
                                  • String ID: IP: $IP=$Port: $Port=$re41$vi65$vwer
                                  • API String ID: 4106036149-4278047753
                                  • Opcode ID: 1b1faac752712a9536cdd070e1299053f2638b2bea7054b791a61f991cee5ca5
                                  • Instruction ID: ece75995a0871ee655f1c84503cdd6dd33c433dbd1ae2f33a6fa7f7d1c3d277e
                                  • Opcode Fuzzy Hash: 1b1faac752712a9536cdd070e1299053f2638b2bea7054b791a61f991cee5ca5
                                  • Instruction Fuzzy Hash: BC12B171E00258CFDB24CF68C994BDDB7B1FF45308F1486A9E405AB791DB70AA85CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1240 6c858130-6c858169 GetLastInputInfo GetTickCount 1241 6c858477-6c85849b MessageBoxA call 6c9d7ee9 1240->1241 1242 6c85816f-6c8581e3 call 6c857dd0 call 6c8487f0 call 6c856d30 1240->1242 1246 6c8584a0 call 6c9d2c7e 1241->1246 1255 6c8581e5-6c8581f2 1242->1255 1256 6c858212-6c85822e 1242->1256 1250 6c8584a5 call 6c9d2c7e 1246->1250 1254 6c8584aa call 6c9d2c7e 1250->1254 1262 6c8584af-6c8584c5 call 6c9d2c7e 1254->1262 1258 6c8581f4-6c858202 1255->1258 1259 6c858208-6c85820f call 6c9c7de0 1255->1259 1260 6c858230-6c85823d 1256->1260 1261 6c85825d-6c858262 1256->1261 1258->1246 1258->1259 1259->1256 1266 6c858253-6c85825a call 6c9c7de0 1260->1266 1267 6c85823f-6c85824d 1260->1267 1263 6c85838d-6c85839a 1261->1263 1264 6c858268-6c858289 call 6c857060 call 6c857dd0 1261->1264 1272 6c8583c4-6c8583d9 CreateThread 1263->1272 1273 6c85839c-6c8583c2 call 6c857850 CreateThread 1263->1273 1290 6c8582b3-6c8582cc call 6c84b8a0 1264->1290 1291 6c85828b-6c858296 1264->1291 1266->1261 1267->1246 1267->1266 1276 6c858436-6c85846b call 6c857f60 call 6c857d70 call 6c846970 call 6c857210 CreateThread call 6c8562b0 1272->1276 1277 6c8583db-6c8583ec WaitForSingleObject 1272->1277 1273->1272 1316 6c858470-6c858472 call 6c9d7ee9 1276->1316 1277->1276 1281 6c8583ee-6c8583fc CloseHandle 1277->1281 1284 6c8583fe-6c85840b 1281->1284 1285 6c85842b-6c858435 1281->1285 1288 6c858421-6c858428 call 6c9c7de0 1284->1288 1289 6c85840d-6c85841b 1284->1289 1288->1285 1289->1262 1289->1288 1304 6c8582ce-6c858311 1290->1304 1294 6c858298 1291->1294 1295 6c85829a-6c8582b1 call 6c9cadc0 1291->1295 1294->1295 1295->1304 1305 6c858340-6c85834f call 6c9d8085 1304->1305 1306 6c858313-6c858320 1304->1306 1314 6c858354-6c85835e 1305->1314 1308 6c858336-6c85833d call 6c9c7de0 1306->1308 1309 6c858322-6c858330 1306->1309 1308->1305 1309->1250 1309->1308 1314->1263 1317 6c858360-6c85836d 1314->1317 1316->1241 1319 6c858383-6c85838a call 6c9c7de0 1317->1319 1320 6c85836f-6c85837d 1317->1320 1319->1263 1320->1254 1320->1319
                                  APIs
                                  • GetLastInputInfo.USER32 ref: 6C858154
                                  • GetTickCount.KERNEL32 ref: 6C85815A
                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 6C858493
                                    • Part of subcall function 6C857DD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C857E17
                                    • Part of subcall function 6C856D30: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C85702F
                                  • CreateThread.KERNELBASE(00000000,00000000,6C857560,6CA6CB7C,00000000,00000000), ref: 6C8583C2
                                  • CreateThread.KERNELBASE(00000000,00000000,6C8572A0,00000000,00000000,00000000), ref: 6C8583D3
                                  • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C8583E1
                                  • CloseHandle.KERNEL32(00000000), ref: 6C8583EF
                                    • Part of subcall function 6C857F60: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 6C857FA7
                                    • Part of subcall function 6C857D70: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 6C857D8D
                                    • Part of subcall function 6C846970: GetTempPathA.KERNEL32(00000104,?,75920F10,00000000), ref: 6C8469B7
                                    • Part of subcall function 6C857210: GetModuleHandleA.KERNEL32(yyzyBase.dll,?,00000000), ref: 6C857218
                                    • Part of subcall function 6C857210: FindResourceW.KERNEL32(00000000,CONFIG,AFX_DIALOG_LAYOUT), ref: 6C85722B
                                    • Part of subcall function 6C857210: LoadResource.KERNEL32(00000000,00000000), ref: 6C857239
                                    • Part of subcall function 6C857210: SizeofResource.KERNEL32(00000000,00000000), ref: 6C857243
                                    • Part of subcall function 6C857210: LockResource.KERNEL32(00000000), ref: 6C85724C
                                  • CreateThread.KERNELBASE(00000000,00000000,6C857290,00000000,00000000,00000000), ref: 6C858469
                                    • Part of subcall function 6C8562B0: WSAStartup.WS2_32(00000202,?), ref: 6C8562CF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ModuleResource$CreateFileNameThread$Handle$CloseCountFindInfoInputIos_base_dtorLastLoadLockMessageObjectPathSingleSizeofStartupTempTickWaitstd::ios_base::_
                                  • String ID: IOVA$IOVAS$S
                                  • API String ID: 1854476981-1164367841
                                  • Opcode ID: f2e938a9aa97a02bfbae806102142d314a40c5147f0890b009fee5d5121e4b00
                                  • Instruction ID: cecf48b562ac24e1b5d9cbce761559e8d44ccc82ea304a4ffb721ed222484ab2
                                  • Opcode Fuzzy Hash: f2e938a9aa97a02bfbae806102142d314a40c5147f0890b009fee5d5121e4b00
                                  • Instruction Fuzzy Hash: C19122306547419BD324CF28CD44BAEB7E1BF95308F508E1EF1849BA91DBB0E5998B93

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1323 6c8572b0-6c8572fc SHGetFolderPathA 1324 6c857542-6c857553 1323->1324 1325 6c857302-6c857315 1323->1325 1326 6c857318-6c85731d 1325->1326 1326->1326 1327 6c85731f-6c857345 call 6c8458c0 1326->1327 1330 6c857347-6c857360 1327->1330 1331 6c857362-6c857375 call 6c84b8a0 1327->1331 1332 6c85737a-6c8573d7 call 6c8525f0 1330->1332 1331->1332 1336 6c8573f6-6c85740b call 6c84b8a0 1332->1336 1337 6c8573d9-6c8573e4 1332->1337 1341 6c85740d-6c85744a 1336->1341 1338 6c8573e6 1337->1338 1339 6c8573e8-6c8573f4 1337->1339 1338->1339 1339->1341 1343 6c85744c-6c857458 1341->1343 1344 6c857478-6c857490 1341->1344 1347 6c85746e-6c857475 call 6c9c7de0 1343->1347 1348 6c85745a-6c857468 1343->1348 1345 6c857492-6c85749e 1344->1345 1346 6c8574be-6c8574d6 1344->1346 1351 6c8574b4-6c8574bb call 6c9c7de0 1345->1351 1352 6c8574a0-6c8574ae 1345->1352 1353 6c857500-6c857518 DeleteFileA 1346->1353 1354 6c8574d8-6c8574e4 1346->1354 1347->1344 1348->1347 1349 6c857554 call 6c9d2c7e 1348->1349 1363 6c857559-6c857593 call 6c9d2c7e 1349->1363 1351->1346 1352->1349 1352->1351 1353->1324 1355 6c85751a-6c857526 1353->1355 1359 6c8574f6-6c8574fd call 6c9c7de0 1354->1359 1360 6c8574e6-6c8574f4 1354->1360 1361 6c857538-6c85753f call 6c9c7de0 1355->1361 1362 6c857528-6c857536 1355->1362 1359->1353 1360->1349 1360->1359 1361->1324 1362->1361 1362->1363 1372 6c857594-6c8575ae 1363->1372 1373 6c8575b1-6c8575b6 1372->1373 1373->1373 1374 6c8575b8-6c8575e3 call 6c8458c0 CreateToolhelp32Snapshot 1373->1374 1377 6c85775f 1374->1377 1378 6c8575e9-6c857619 call 6c9cb340 Process32FirstW 1374->1378 1380 6c857763-6c857770 1377->1380 1386 6c857755-6c85775c CloseHandle 1378->1386 1387 6c85761f 1378->1387 1382 6c857772-6c85777d 1380->1382 1383 6c85779d-6c8577a1 1380->1383 1388 6c857793-6c85779a call 6c9c7de0 1382->1388 1389 6c85777f-6c85778d 1382->1389 1384 6c8577c3-6c8577dd 1383->1384 1385 6c8577a3-6c8577ae Sleep 1383->1385 1390 6c8577e0-6c8577e5 1384->1390 1385->1372 1386->1377 1391 6c857620-6c85765e WideCharToMultiByte 1387->1391 1388->1383 1389->1388 1392 6c857849-6c85784f call 6c9d2c7e 1389->1392 1390->1390 1394 6c8577e7-6c857808 call 6c8458c0 call 6c8572b0 1390->1394 1395 6c857661-6c857666 1391->1395 1408 6c857832-6c857846 1394->1408 1409 6c85780a-6c857816 1394->1409 1395->1395 1400 6c857668-6c857698 call 6c8458c0 1395->1400 1406 6c8576a0-6c8576a2 1400->1406 1407 6c85769a-6c85769e 1400->1407 1410 6c8576a4-6c8576a8 1406->1410 1411 6c8576aa-6c8576af 1406->1411 1412 6c857706-6c85770c 1407->1412 1415 6c857828-6c85782f call 6c9c7de0 1409->1415 1416 6c857818-6c857826 1409->1416 1410->1412 1417 6c8576b1-6c8576b5 1411->1417 1418 6c8576c2-6c8576c5 1411->1418 1413 6c85770e-6c857719 1412->1413 1414 6c857739-6c85773d 1412->1414 1421 6c85772f-6c857736 call 6c9c7de0 1413->1421 1422 6c85771b-6c857729 1413->1422 1423 6c8577b3-6c8577c1 CloseHandle 1414->1423 1424 6c85773f-6c85774f Process32NextW 1414->1424 1415->1408 1416->1392 1416->1415 1419 6c8576c7-6c8576cb 1417->1419 1426 6c8576b7-6c8576c0 1417->1426 1418->1419 1420 6c8576fb 1418->1420 1427 6c8576f4-6c8576f9 1419->1427 1428 6c8576cd-6c8576d0 1419->1428 1430 6c8576fd-6c857702 1420->1430 1421->1414 1422->1392 1422->1421 1423->1380 1423->1392 1424->1386 1424->1391 1426->1417 1426->1418 1427->1430 1428->1420 1432 6c8576d2-6c8576d8 1428->1432 1430->1412 1432->1427 1434 6c8576da-6c8576dd 1432->1434 1434->1420 1435 6c8576df-6c8576e5 1434->1435 1435->1427 1436 6c8576e7-6c8576ea 1435->1436 1436->1420 1437 6c8576ec-6c8576f2 1436->1437 1437->1420 1437->1427
                                  APIs
                                  • SHGetFolderPathA.SHELL32(00000000,00000010,00000000,00000000,?,?), ref: 6C8572F4
                                  • DeleteFileA.KERNEL32(?,00000004,00000000,.lnk,00000004,?), ref: 6C85750C
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?), ref: 6C8575CF
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 6C857611
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C85763D
                                  • Process32NextW.KERNEL32(?,0000022C), ref: 6C857747
                                  • CloseHandle.KERNELBASE(00000000,?,?), ref: 6C857756
                                  • Sleep.KERNELBASE(00000BB8,?,?,?,?,?), ref: 6C8577A8
                                  • CloseHandle.KERNEL32(?,00000000,?,?), ref: 6C8577B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess32$ByteCharCreateDeleteFileFirstFolderMultiNextPathSleepSnapshotToolhelp32Wide
                                  • String ID: .lnk
                                  • API String ID: 775680180-24824748
                                  • Opcode ID: a731997171a131f88a841b1971c1689b46732ea7e657da61379c9d9e5a7cbece
                                  • Instruction ID: 058d73d659c0948428adab8ab485342d0ff1fd2fd1689813ccec1878e7399664
                                  • Opcode Fuzzy Hash: a731997171a131f88a841b1971c1689b46732ea7e657da61379c9d9e5a7cbece
                                  • Instruction Fuzzy Hash: 00F17730D102488FDB15CF68CD94BEDBBB1AF05308F64C758E454AB6C1D7B0AA86CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1438 6c8562b0-6c856313 WSAStartup call 6c856130 1441 6c856315-6c85631e 1438->1441 1442 6c856391-6c856397 1438->1442 1443 6c856320-6c85632c 1441->1443 1444 6c85634e-6c85638e 1441->1444 1445 6c8563c5-6c8563da call 6c856130 1442->1445 1446 6c856399-6c8563a5 1442->1446 1450 6c856344-6c85634b call 6c9c7de0 1443->1450 1451 6c85632e-6c85633c 1443->1451 1444->1442 1458 6c8563dc-6c8563e5 1445->1458 1459 6c856458-6c85645e 1445->1459 1447 6c8563a7-6c8563b5 1446->1447 1448 6c8563bb-6c8563c2 call 6c9c7de0 1446->1448 1447->1448 1452 6c8565e3 call 6c9d2c7e 1447->1452 1448->1445 1450->1444 1451->1452 1455 6c856342 1451->1455 1466 6c8565e8 call 6c9d2c7e 1452->1466 1455->1450 1464 6c856415-6c856455 1458->1464 1465 6c8563e7-6c8563f3 1458->1465 1462 6c856460-6c85646c 1459->1462 1463 6c85648c-6c8564c4 getaddrinfo 1459->1463 1467 6c856482-6c856489 call 6c9c7de0 1462->1467 1468 6c85646e-6c85647c 1462->1468 1469 6c8565d6-6c8565de WSACleanup call 6c9d7ee9 1463->1469 1470 6c8564ca-6c8564d5 1463->1470 1464->1459 1471 6c8563f5-6c856403 1465->1471 1472 6c85640b-6c856412 call 6c9c7de0 1465->1472 1474 6c8565ed-6c856610 WSACleanup call 6c9d2d7f call 6c9d7ee9 1466->1474 1467->1463 1468->1466 1468->1467 1469->1452 1476 6c856527-6c856535 freeaddrinfo 1470->1476 1477 6c8564d7-6c8564dd 1470->1477 1471->1466 1478 6c856409 1471->1478 1472->1464 1476->1469 1483 6c85653b 1476->1483 1482 6c8564e0-6c8564f7 socket 1477->1482 1478->1472 1482->1469 1486 6c8564fd-6c856509 connect 1482->1486 1487 6c856541-6c85654c 1483->1487 1489 6c856524 1486->1489 1490 6c85650b-6c856522 closesocket 1486->1490 1491 6c856550-6c856567 recv 1487->1491 1489->1476 1490->1482 1490->1489 1492 6c85659d 1491->1492 1493 6c856569-6c85657e 1491->1493 1492->1474 1496 6c85659f-6c8565d5 VirtualAlloc call 6c9cadc0 1492->1496 1493->1491 1495 6c856580-6c85659b call 6c9d80ef 1493->1495 1495->1487
                                  APIs
                                  • WSAStartup.WS2_32(00000202,?), ref: 6C8562CF
                                  • getaddrinfo.WS2_32(6CA6CB64,6CA6CB4C,00000000,00000000), ref: 6C8564BC
                                  • socket.WS2_32(?,?,?), ref: 6C8564E9
                                  • connect.WS2_32(00000000,?,?), ref: 6C856504
                                  • closesocket.WS2_32 ref: 6C856511
                                  • freeaddrinfo.WS2_32(00000000), ref: 6C856528
                                  • recv.WS2_32(005EC0B0,00001000,00000000), ref: 6C856563
                                  • VirtualAlloc.KERNEL32(00000000,00003000,00000040), ref: 6C8565AE
                                  • WSACleanup.WS2_32 ref: 6C8565D6
                                  • WSACleanup.WS2_32 ref: 6C8565F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Cleanup$AllocStartupVirtualclosesocketconnectfreeaddrinfogetaddrinforecvsocket
                                  • String ID: IOVA
                                  • API String ID: 2484549806-1369737602
                                  • Opcode ID: c2d2d23889d5e7c29764e2ab2368dbec68aa362007a133673fcdfb827c052180
                                  • Instruction ID: 2f44907280dbd09573d038063360081ceb73708a41fd968ba84f67785983a759
                                  • Opcode Fuzzy Hash: c2d2d23889d5e7c29764e2ab2368dbec68aa362007a133673fcdfb827c052180
                                  • Instruction Fuzzy Hash: 43710171B017118FCF29EF39CA5476ABBB1BB06308F50C608E451D7B95D7B0A996CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1516 6c9f1693-6c9f16c3 call 6c9f13e1 1519 6c9f16de-6c9f16ea call 6c9def98 1516->1519 1520 6c9f16c5-6c9f16d0 call 6c9d2d59 1516->1520 1526 6c9f16ec-6c9f1701 call 6c9d2d59 call 6c9d2d6c 1519->1526 1527 6c9f1703-6c9f174c call 6c9f134c 1519->1527 1525 6c9f16d2-6c9f16d9 call 6c9d2d6c 1520->1525 1536 6c9f19b8-6c9f19bc 1525->1536 1526->1525 1534 6c9f174e-6c9f1757 1527->1534 1535 6c9f17b9-6c9f17c2 GetFileType 1527->1535 1538 6c9f178e-6c9f17b4 GetLastError call 6c9d2d12 1534->1538 1539 6c9f1759-6c9f175d 1534->1539 1540 6c9f180b-6c9f180e 1535->1540 1541 6c9f17c4-6c9f17f5 GetLastError call 6c9d2d12 CloseHandle 1535->1541 1538->1525 1539->1538 1545 6c9f175f-6c9f178c call 6c9f134c 1539->1545 1543 6c9f1817-6c9f181d 1540->1543 1544 6c9f1810-6c9f1815 1540->1544 1541->1525 1555 6c9f17fb-6c9f1806 call 6c9d2d6c 1541->1555 1548 6c9f1821-6c9f186f call 6c9deee3 1543->1548 1549 6c9f181f 1543->1549 1544->1548 1545->1535 1545->1538 1558 6c9f188e-6c9f18b6 call 6c9f10f6 1548->1558 1559 6c9f1871-6c9f187d call 6c9f155b 1548->1559 1549->1548 1555->1525 1565 6c9f18bb-6c9f18fc 1558->1565 1566 6c9f18b8-6c9f18b9 1558->1566 1559->1558 1567 6c9f187f 1559->1567 1569 6c9f18fe-6c9f1902 1565->1569 1570 6c9f191d-6c9f192b 1565->1570 1568 6c9f1881-6c9f1889 call 6c9e56a3 1566->1568 1567->1568 1568->1536 1569->1570 1571 6c9f1904-6c9f1918 1569->1571 1572 6c9f19b6 1570->1572 1573 6c9f1931-6c9f1935 1570->1573 1571->1570 1572->1536 1573->1572 1575 6c9f1937-6c9f196a CloseHandle call 6c9f134c 1573->1575 1579 6c9f199e-6c9f19b2 1575->1579 1580 6c9f196c-6c9f1998 GetLastError call 6c9d2d12 call 6c9df0ab 1575->1580 1579->1572 1580->1579
                                  APIs
                                    • Part of subcall function 6C9F134C: CreateFileW.KERNELBASE(?,00000000,?,6C9F173C,?,?,00000000,?,6C9F173C,?,0000000C), ref: 6C9F1369
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C9F17A7
                                  • __dosmaperr.LIBCMT ref: 6C9F17AE
                                  • GetFileType.KERNELBASE(00000000), ref: 6C9F17BA
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C9F17C4
                                  • __dosmaperr.LIBCMT ref: 6C9F17CD
                                  • CloseHandle.KERNEL32(00000000), ref: 6C9F17ED
                                  • CloseHandle.KERNEL32(6C9EB9DE), ref: 6C9F193A
                                  • GetLastError.KERNEL32 ref: 6C9F196C
                                  • __dosmaperr.LIBCMT ref: 6C9F1973
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID:
                                  • API String ID: 4237864984-0
                                  • Opcode ID: 59e1f5f077c35fe25e9497741bd94f9276f5e4c473a1d94c72653df72816fbc9
                                  • Instruction ID: f4abd1c73574e273f16673493336a361aa7db07625301abef3a8cdc70fd4ecf2
                                  • Opcode Fuzzy Hash: 59e1f5f077c35fe25e9497741bd94f9276f5e4c473a1d94c72653df72816fbc9
                                  • Instruction Fuzzy Hash: 0BA145B2A046198FCF09CF68C854BAD3BB5AB17328F18425DE821EB790C731D957CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1621 6c9c7f6b-6c9c7f7e call 6c9c8290 1624 6c9c7f84-6c9c7fa6 call 6c9c7b09 1621->1624 1625 6c9c7f80-6c9c7f82 1621->1625 1629 6c9c7fa8-6c9c7fe9 call 6c9c7bd4 call 6c9c8f4e call 6c9c8fa9 call 6c9c7ffe call 6c9c7d75 call 6c9c800b 1624->1629 1630 6c9c8011-6c9c802a call 6c9c8d8d call 6c9c8290 1624->1630 1626 6c9c7feb-6c9c7ffa 1625->1626 1629->1626 1642 6c9c802c-6c9c8032 1630->1642 1643 6c9c803b-6c9c8042 1630->1643 1642->1643 1645 6c9c8034-6c9c8036 1642->1645 1646 6c9c804e-6c9c8062 dllmain_raw 1643->1646 1647 6c9c8044-6c9c8047 1643->1647 1649 6c9c8114-6c9c8123 1645->1649 1651 6c9c8068-6c9c8079 dllmain_crt_dispatch 1646->1651 1652 6c9c810b-6c9c8112 1646->1652 1647->1646 1650 6c9c8049-6c9c804c 1647->1650 1654 6c9c807f-6c9c8091 call 6c8cbd86 1650->1654 1651->1652 1651->1654 1652->1649 1659 6c9c80ba-6c9c80bc 1654->1659 1660 6c9c8093-6c9c8095 1654->1660 1663 6c9c80be-6c9c80c1 1659->1663 1664 6c9c80c3-6c9c80d4 dllmain_crt_dispatch 1659->1664 1660->1659 1662 6c9c8097-6c9c80b5 call 6c8cbd86 call 6c9c7f6b dllmain_raw 1660->1662 1662->1659 1663->1652 1663->1664 1664->1652 1666 6c9c80d6-6c9c8108 dllmain_raw 1664->1666 1666->1652
                                  APIs
                                  • __RTC_Initialize.LIBCMT ref: 6C9C7FB2
                                  • ___scrt_uninitialize_crt.LIBCMT ref: 6C9C7FCC
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Initialize___scrt_uninitialize_crt
                                  • String ID:
                                  • API String ID: 2442719207-0
                                  • Opcode ID: a33ac27b2111afcf68c6e136c9fd5d56c22e62145f4e2db61d687b2cd6d0808b
                                  • Instruction ID: e8aa0ea8a9e438c8e5564a5d846a678196221159405269bf8ba6f5fa060c9445
                                  • Opcode Fuzzy Hash: a33ac27b2111afcf68c6e136c9fd5d56c22e62145f4e2db61d687b2cd6d0808b
                                  • Instruction Fuzzy Hash: BC41F472B05615EFDB19CF65CC40BEE7BB9EB657A8F10451AE80467A40C730CA058BA7

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C95BC81
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DA5
                                    • Part of subcall function 6C945D74: InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DBB
                                    • Part of subcall function 6C945D74: LeaveCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DC9
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(00000000,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945DD6
                                  • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C95BCD4
                                  • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C95BCEA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                  • String ID: DragDelay$DragMinDist$windows
                                  • API String ID: 3965097884-2101198082
                                  • Opcode ID: 1115a265582c649f78c1b8b1f4e5bcc1ee1dc3d8f1118287cedfb929ee8eb707
                                  • Instruction ID: c40ac5cf4c68fee43ba922016341e49504e5ee142b81d1f52e8f0dc44c44481b
                                  • Opcode Fuzzy Hash: 1115a265582c649f78c1b8b1f4e5bcc1ee1dc3d8f1118287cedfb929ee8eb707
                                  • Instruction Fuzzy Hash: F301BCB0A01751DFDBA1CF78890674A7AF4BF18704F44992EE049DBF40D774A0868B65
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f18d4d80ce40b5fd64e80b3f35957d7d56958943513319e1aca9a1ca4f0f9e7
                                  • Instruction ID: e44fe0597c7d3a9b204be116595cea76bfac1cf3778c741d6c1a5a307fb3917a
                                  • Opcode Fuzzy Hash: 6f18d4d80ce40b5fd64e80b3f35957d7d56958943513319e1aca9a1ca4f0f9e7
                                  • Instruction Fuzzy Hash: 3AB1F570A04609AFDB02CFA8C844BAD7BB5BF7E309F148658E510E7781C771E946CB61
                                  APIs
                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000001,6CA73990), ref: 6C86FB12
                                  • VerSetConditionMask.KERNEL32(00000000), ref: 6C86FB1A
                                  • VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C86FB2B
                                  • GetSystemMetrics.USER32(00001000), ref: 6C86FB3C
                                    • Part of subcall function 6C87056D: __EH_prolog3.LIBCMT ref: 6C870574
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000016), ref: 6C87057D
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000F), ref: 6C870590
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000015), ref: 6C8705A7
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000F), ref: 6C8705B3
                                    • Part of subcall function 6C87056D: GetDeviceCaps.GDI32(?,0000000C), ref: 6C8705DB
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000F), ref: 6C8705E9
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000010), ref: 6C8705F7
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000015), ref: 6C870605
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000016), ref: 6C870613
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000014), ref: 6C870621
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000012), ref: 6C87062F
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000011), ref: 6C87063D
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000006), ref: 6C870648
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000D), ref: 6C870653
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000E), ref: 6C87065E
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000005), ref: 6C870669
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000008), ref: 6C870677
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000009), ref: 6C870682
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000007), ref: 6C87068D
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000002), ref: 6C870698
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(00000003), ref: 6C8706A3
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000001B), ref: 6C8706B1
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000001C), ref: 6C8706BF
                                    • Part of subcall function 6C87056D: GetSysColor.USER32(0000000A), ref: 6C8706CD
                                    • Part of subcall function 6C87004E: __EH_prolog3_GS.LIBCMT ref: 6C870058
                                    • Part of subcall function 6C87004E: GetDeviceCaps.GDI32(?,00000058), ref: 6C870078
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C8700D4
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C8700F2
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C870110
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C87012E
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C87014C
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C87016A
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C870188
                                    • Part of subcall function 6C87004E: DeleteObject.GDI32(00000000), ref: 6C8701A6
                                    • Part of subcall function 6C86FC21: GetSystemMetrics.USER32(00000031), ref: 6C86FC2F
                                    • Part of subcall function 6C86FC21: GetSystemMetrics.USER32(00000032), ref: 6C86FC3D
                                    • Part of subcall function 6C86FC21: SetRectEmpty.USER32(6CA73AFC), ref: 6C86FC50
                                    • Part of subcall function 6C86FC21: EnumDisplayMonitors.USER32(00000000,00000000,6C86FA37,6CA73AFC), ref: 6C86FC60
                                    • Part of subcall function 6C86FC21: SystemParametersInfoW.USER32(00000030,00000000,6CA73AFC,00000000), ref: 6C86FC6F
                                    • Part of subcall function 6C86FC21: SystemParametersInfoW.USER32(00001002,00000000,6CA73B20,00000000), ref: 6C86FC9C
                                    • Part of subcall function 6C86FC21: SystemParametersInfoW.USER32(00001012,00000000,6CA73B24,00000000), ref: 6C86FCB0
                                    • Part of subcall function 6C86FC21: SystemParametersInfoW.USER32(0000100A,00000000,6CA73B34,00000000), ref: 6C86FCD6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$DeleteObject$System$Info$Parameters$Metrics$CapsConditionDeviceMask$DisplayEmptyEnumH_prolog3H_prolog3_MonitorsRectVerifyVersion
                                  • String ID: \sx
                                  • API String ID: 2442922003-995570312
                                  • Opcode ID: b37e2dafd915c59496be91e77da1446bc2d5aa523d6eea99354730bbb0572399
                                  • Instruction ID: 5e1dcaeae054b9f603f0f814e817b4dfc75fd6d66639f661cc9e2aa49281fa88
                                  • Opcode Fuzzy Hash: b37e2dafd915c59496be91e77da1446bc2d5aa523d6eea99354730bbb0572399
                                  • Instruction Fuzzy Hash: B711CAB0B00318ABDB249F758C59FEF77BCEB89708F00445DA146D6281CBB44A458FA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: dllmain_raw$dllmain_crt_dispatch
                                  • String ID:
                                  • API String ID: 3136044242-0
                                  • Opcode ID: 1044b108a1eb1b4acbf071d66075949e6beeb6a8a4f4fdfafdc31e11d25f8267
                                  • Instruction ID: 57584acb0e71d47b919d3f7348d1c707cd4ffcf8fe40cb12bbf5d62b293e5324
                                  • Opcode Fuzzy Hash: 1044b108a1eb1b4acbf071d66075949e6beeb6a8a4f4fdfafdc31e11d25f8267
                                  • Instruction Fuzzy Hash: DF21A172F05615FBDB268F15CC40AAF3ABDEB95B98F014526F81467A50C331CE418BA7
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Shell32,?,?,6C84113C,MFCApplication4.AppID.NoVersion,00000001,?,Function_001B32D0,000000FF), ref: 6C8F871C
                                  • GetProcAddress.KERNEL32(00000000,SetCurrentProcessExplicitAppUserModelID), ref: 6C8F872D
                                  Strings
                                  • SetCurrentProcessExplicitAppUserModelID, xrefs: 6C8F8727
                                  • Shell32, xrefs: 6C8F8715
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: SetCurrentProcessExplicitAppUserModelID$Shell32
                                  • API String ID: 1646373207-2658420654
                                  • Opcode ID: d50f9e489765b63aa73a8709ec25099fef56d7b8a0397aea68b0d1b59fab2698
                                  • Instruction ID: df5d1de9be3df554a0a92b84478e59763cdb097df41982041efbb9e970bab8ac
                                  • Opcode Fuzzy Hash: d50f9e489765b63aa73a8709ec25099fef56d7b8a0397aea68b0d1b59fab2698
                                  • Instruction Fuzzy Hash: 83E04F71705716AB87181BA69818D5E7F68EA826E5301842BF915D7A00DB35D913C6F0
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,00000000,?,6C9E54BE,00000000,?,00000000,?,00000000,00000000), ref: 6C9E4FB1
                                  • GetLastError.KERNEL32(?,6C9E54BE,00000000,?,00000000,?,00000000,00000000,0000000C,00000000,00000000,6CA66658,00000014,6C9D7014,00000000,00000000), ref: 6C9E4FD7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: \sx
                                  • API String ID: 442123175-995570312
                                  • Opcode ID: 4e634632b5bc193b701e622e871e57af7f59af53da1e2d592bc05beb252f107b
                                  • Instruction ID: e0e2be17e9474c9a9c63bb0a1b2b147c1f0091767cfebc0b2b0c8cac2a917e4e
                                  • Opcode Fuzzy Hash: 4e634632b5bc193b701e622e871e57af7f59af53da1e2d592bc05beb252f107b
                                  • Instruction Fuzzy Hash: C5219130A002199BCB1ACF59C880AE9B7B9EF5D709F1445A9E906D7200D730DE52CF61
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,CF830579,?,6C9E55BA,00000000,CF830579,6CA66678,0000000C,6C9E5676,6C9D6A25,?), ref: 6C9E5729
                                  • GetLastError.KERNEL32(?,6C9E55BA,00000000,CF830579,6CA66678,0000000C,6C9E5676,6C9D6A25,?), ref: 6C9E5733
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CloseErrorHandleLast
                                  • String ID: 0%^
                                  • API String ID: 918212764-3205140630
                                  • Opcode ID: 197722d67d77f0ccf26b9379be8b169703d23c690dcdcfcf90d2501c82dfbfdd
                                  • Instruction ID: e910c65448abf3d6bc2699d657b958155097408116e6e0dfd67c17af12eaa887
                                  • Opcode Fuzzy Hash: 197722d67d77f0ccf26b9379be8b169703d23c690dcdcfcf90d2501c82dfbfdd
                                  • Instruction Fuzzy Hash: 3A11593260562096C7064276C44579E77AD8FBBF3CF298609E818D6BC1DB72E9478150
                                  APIs
                                  • DeleteFileW.KERNELBASE(6C9D80D8,?,6C9D80D8,00000000), ref: 6C9E7428
                                  • GetLastError.KERNEL32(?,6C9D80D8,00000000), ref: 6C9E7432
                                  • __dosmaperr.LIBCMT ref: 6C9E7439
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: DeleteErrorFileLast__dosmaperr
                                  • String ID:
                                  • API String ID: 1545401867-0
                                  • Opcode ID: f045de0c52753f467bdcc134c3b094f936e081964c33383546a43cd77fd57f8f
                                  • Instruction ID: b44081df2a94d111f365fafc1384c8d2a48e33fdcda9534c462fa17b983641b0
                                  • Opcode Fuzzy Hash: f045de0c52753f467bdcc134c3b094f936e081964c33383546a43cd77fd57f8f
                                  • Instruction Fuzzy Hash: 66D0A731204609278B041AB69C0C4063B6DAB512783148618F42CC1580EB31D4425111
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000,?,6C9D7D9A,?,?,?,00000000,78E4735C,?,00000000), ref: 6C9D7DB1
                                  • TerminateProcess.KERNEL32(00000000,?,6C9D7D9A,?,?,?,00000000,78E4735C,?,00000000), ref: 6C9D7DB8
                                  • ExitProcess.KERNEL32 ref: 6C9D7DCA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 5e5f4ee2f49764fd208496804985c22cbac02ba593d0df3975d531ccc01b46a5
                                  • Instruction ID: 12332b02e7e559d0baf50af7529ace34427b625d6d24d611fdbc6d31690c4c0a
                                  • Opcode Fuzzy Hash: 5e5f4ee2f49764fd208496804985c22cbac02ba593d0df3975d531ccc01b46a5
                                  • Instruction Fuzzy Hash: 2BD01731200A0AABCF042F60CC088893F3AAB15288B11C018B814AA030CF31E893DAA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8AA026
                                    • Part of subcall function 6C8F666D: __EH_prolog3_GS.LIBCMT ref: 6C8F6677
                                    • Part of subcall function 6C8F666D: GetCurrentThread.KERNEL32 ref: 6C8F66D6
                                    • Part of subcall function 6C8F666D: GetCurrentThreadId.KERNEL32 ref: 6C8F66DF
                                    • Part of subcall function 6C8F666D: GetVersionExW.KERNEL32 ref: 6C8F677B
                                    • Part of subcall function 6C8AA549: __EH_prolog3.LIBCMT ref: 6C8AA550
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CurrentH_prolog3Thread$H_prolog3_Version
                                  • String ID: Workspace
                                  • API String ID: 3621167777-258310842
                                  • Opcode ID: 80843000fa9dd68371e3c91974346dd59341271a6e6c452a18bb82dc9c249ffb
                                  • Instruction ID: 0db508eb1c3bec3a40472bb0da6887ab7b01a224a2c85639acc8d75f25c47899
                                  • Opcode Fuzzy Hash: 80843000fa9dd68371e3c91974346dd59341271a6e6c452a18bb82dc9c249ffb
                                  • Instruction Fuzzy Hash: FF2104B0A00A16AFC758CF78C5407E9FAA4BF18704F508B2AD47DE7740D77066658BD1
                                  APIs
                                  • SHGetMalloc.SHELL32(00000004), ref: 6C96ECE0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Malloc
                                  • String ID: \sx
                                  • API String ID: 2696272793-995570312
                                  • Opcode ID: e79b763d1b92508f6306b64d339901068103cdeceed2a7b8196f55d3a6a3b054
                                  • Instruction ID: 89a485a5a66d21a8bc8c67b032dbcfc9088befa420faf5b3af22cdfdf67ab460
                                  • Opcode Fuzzy Hash: e79b763d1b92508f6306b64d339901068103cdeceed2a7b8196f55d3a6a3b054
                                  • Instruction Fuzzy Hash: 5B11A1727043259FEB18CF09D804B56B7F8FB09B29F10852EE415C3A80D738E841CB90
                                  APIs
                                    • Part of subcall function 6C9E4A69: GetConsoleOutputCP.KERNEL32(78E4735C,00000000,00000000,00000000), ref: 6C9E4ACC
                                  • WriteFile.KERNELBASE(?,00000000,?,00000000,00000000,00000000,00000000,0000000C,00000000,00000000,6CA66658,00000014,6C9D7014,00000000,00000000,00000000), ref: 6C9E54D8
                                  • GetLastError.KERNEL32 ref: 6C9E54E2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorFileLastOutputWrite
                                  • String ID:
                                  • API String ID: 2915228174-0
                                  • Opcode ID: e60db3a80de32912c535d1232b97cc58ba065235c1096f5ec9a947216513959f
                                  • Instruction ID: c8c3ebc01db733e58bc9951c953a52c529cbbf1e34150851f4140de24ccfebc6
                                  • Opcode Fuzzy Hash: e60db3a80de32912c535d1232b97cc58ba065235c1096f5ec9a947216513959f
                                  • Instruction Fuzzy Hash: 5661B771D04219AFDF02CFE8C844AEEBBBABF6D308F144549E814A7652D772D905CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: b7820042098da492085148a100d4a16174ee2d72cef90cd5d92ceb65b6c8a3ac
                                  • Instruction ID: a5cf845f853e1858cc65d65d157d439762227c48e5e4497167c0ce866615d63d
                                  • Opcode Fuzzy Hash: b7820042098da492085148a100d4a16174ee2d72cef90cd5d92ceb65b6c8a3ac
                                  • Instruction Fuzzy Hash: 5C619F326052099FCB14CF2DC98095AB7E1EF89324F15CAA9FC18CB754E731D909CB91
                                  APIs
                                  • __RTC_Initialize.LIBCMT ref: 6C9C7EB1
                                    • Part of subcall function 6C9C8F42: InitializeSListHead.KERNEL32(6CA75960,6C9C7EBB,6CA65F30,00000010,6C9C7E4C,?,?,?,6C9C8072,?,00000001,?,?,00000001,?,6CA65F78), ref: 6C9C8F47
                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C9C7F1B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                  • String ID:
                                  • API String ID: 3231365870-0
                                  • Opcode ID: 360281a7b3ee15f0e13a80641cd9915d801dc877348a6b7bd4758d31d1b7dcbc
                                  • Instruction ID: bcd62a7ec6be0723a7fb4a3475e012017139f2f12deb374a7f9cf90c4fbc0011
                                  • Opcode Fuzzy Hash: 360281a7b3ee15f0e13a80641cd9915d801dc877348a6b7bd4758d31d1b7dcbc
                                  • Instruction Fuzzy Hash: CB21013234A3029ADB09ABB094007DC37B5AF3636DF24444AC04497FC1CB31D599C6B7
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,?,6C9E72D3,00000000,00000000,00000000,00000002,00000000), ref: 6C9E71D5
                                  • GetLastError.KERNEL32(00000000,?,6C9E72D3,00000000,00000000,00000000,00000002,00000000,?,6C9E53F8,00000000,00000000,00000000,00000002,00000000,00000000), ref: 6C9E71E2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: 96708031251126b8b0fbcad8187d30b8460d8974b4eb537920f6b5a36c3acf68
                                  • Instruction ID: 833e62ed5d26200861398beff3cc7fc32f50de39710a7b74d4a7faf2979b5551
                                  • Opcode Fuzzy Hash: 96708031251126b8b0fbcad8187d30b8460d8974b4eb537920f6b5a36c3acf68
                                  • Instruction Fuzzy Hash: 74010832710615AFCB0A8F59CC45C8D3B69EF99324B244648F810DB291EB71EA428B90
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,6C9DFDF6), ref: 6C9E15AE
                                  • GetLastError.KERNEL32(?,?,6C9DFDF6), ref: 6C9E15B9
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: 277cc111f1b97744dda70b0a7562e745918ff2291df3c7efd2c7188a537f1628
                                  • Instruction ID: c53b40213ce002c9c2ba9a3495da5a006ab6254bc5e2f56f3e16056f6330a31e
                                  • Opcode Fuzzy Hash: 277cc111f1b97744dda70b0a7562e745918ff2291df3c7efd2c7188a537f1628
                                  • Instruction Fuzzy Hash: C2E04F312007146ACB121BA1990CB893A68AB56699F118465F509D6950DB30E952D794
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C85702F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID:
                                  • API String ID: 323602529-0
                                  • Opcode ID: b4190fb6cec371b4b23e29e00d682af346b083ad23795241f4566b4fc38f7056
                                  • Instruction ID: dca6901788a7223bea04c642753f583a40594ec66343b8a7f521b41ceb7919c0
                                  • Opcode Fuzzy Hash: b4190fb6cec371b4b23e29e00d682af346b083ad23795241f4566b4fc38f7056
                                  • Instruction Fuzzy Hash: F3912C71900298CBDB60CF68C944B9EBBF4BF14318F14C9A9D44EA7751DB75AA88CF90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df54314a5c26285104c7cfa84f2afe779e9003d31bb2eeb6b20019d207464f60
                                  • Instruction ID: 4be75969deb12bae20d1019e0003ff94ed7e9eaf9abe3a4d2d79696126ddee40
                                  • Opcode Fuzzy Hash: df54314a5c26285104c7cfa84f2afe779e9003d31bb2eeb6b20019d207464f60
                                  • Instruction Fuzzy Hash: 4A51C570A00A04AFCB05CF58C880A9DBBB5EF5A368F26C159F8486B751D371EE81CBD0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86ECD6
                                    • Part of subcall function 6C86FAB5: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000001,6CA73990), ref: 6C86FB12
                                    • Part of subcall function 6C86FAB5: VerSetConditionMask.KERNEL32(00000000), ref: 6C86FB1A
                                    • Part of subcall function 6C86FAB5: VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C86FB2B
                                    • Part of subcall function 6C86FAB5: GetSystemMetrics.USER32(00001000), ref: 6C86FB3C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ConditionMask$H_prolog3InfoMetricsSystemVerifyVersion
                                  • String ID:
                                  • API String ID: 2710481357-0
                                  • Opcode ID: bbe5fb487c6d4d9ce629daade1102018cb531d856f955264de5bf9adafd9d6e8
                                  • Instruction ID: 3c191b546f277bedcc915f6d1610befda680eb29976381ffd25ed7fc83cf4131
                                  • Opcode Fuzzy Hash: bbe5fb487c6d4d9ce629daade1102018cb531d856f955264de5bf9adafd9d6e8
                                  • Instruction Fuzzy Hash: C051DEB0905F458FD3A9CF3A85417C6FAE0BF89300F108A2E91AED6660EB716184CF55
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C84FF8A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID:
                                  • API String ID: 323602529-0
                                  • Opcode ID: 302f5c4788d6ef1c1b654547d340b4673163a46b988f14f69e9299f643723ab8
                                  • Instruction ID: 1c60c355d54857f526cb1b2fcf7f33807970e04cac774cfeb5d95006737d269d
                                  • Opcode Fuzzy Hash: 302f5c4788d6ef1c1b654547d340b4673163a46b988f14f69e9299f643723ab8
                                  • Instruction Fuzzy Hash: CA312971A01258DFDB20DF58DE95F99B7B8FB04308F1486A9E8099B791E735AD48CF40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: __wsopen_s
                                  • String ID:
                                  • API String ID: 3347428461-0
                                  • Opcode ID: 5f9ff44c075ffd694e43ed6839986c6d553e01da718ae4262b3c0dc1131da23b
                                  • Instruction ID: bde51af65e4578d7ac0329f7425787920a82935f26685a59d8cbc2e89ae7b5d5
                                  • Opcode Fuzzy Hash: 5f9ff44c075ffd694e43ed6839986c6d553e01da718ae4262b3c0dc1131da23b
                                  • Instruction Fuzzy Hash: C8114C71A0420AAFCF06DF58E9459DF7BF9EF49318F154069F818AB301D670E911CBA4
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9432A7
                                    • Part of subcall function 6C942F70: TlsAlloc.KERNEL32(?,6C9432D3,00000004,6C873120,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?,?,6C86E04D,6C842126,?,?), ref: 6C942F8F
                                    • Part of subcall function 6C942F70: InitializeCriticalSection.KERNEL32(6CA7515C), ref: 6C942FA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AllocCriticalH_prolog3InitializeSection
                                  • String ID:
                                  • API String ID: 2369468792-0
                                  • Opcode ID: eddd46f3c90b876d15188630d0c4bebb69147f16b54523a4a30dc02c5aa310ef
                                  • Instruction ID: 795c895b89661ac4e1785fa8375777b6da7b9deb3f8be109b16ad4e494950e83
                                  • Opcode Fuzzy Hash: eddd46f3c90b876d15188630d0c4bebb69147f16b54523a4a30dc02c5aa310ef
                                  • Instruction Fuzzy Hash: 89117C34B016128BEF199F79C85569D77BABF20689FA086289811CBF80DF30CA02CB50
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6C9E2B50,00000001,00000364,00000000,FFFFFFFF,000000FF,?,?,6C9DFDF6), ref: 6C9E47ED
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 753902100f8d78ef8e2939151e49ea08145251f681a45019055fe6f43c760b9e
                                  • Instruction ID: f8b585d15b31c43e3b25b3df356d98cc0d7138e8555541476003256d4787de7e
                                  • Opcode Fuzzy Hash: 753902100f8d78ef8e2939151e49ea08145251f681a45019055fe6f43c760b9e
                                  • Instruction Fuzzy Hash: C5F0593160162656EB030AA38C04B9B376CBF7BF78F108122AC14E6A80CF32D8018EF0
                                  APIs
                                  • CreateFileW.KERNELBASE(?,00000000,?,6C9F173C,?,?,00000000,?,6C9F173C,?,0000000C), ref: 6C9F1369
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 9d5d8ffed56cf7b70a199dd71324f307333fde7baf38fe1f4d2c6b598dfa5020
                                  • Instruction ID: 510e23a99c4ff8725022b6ac6564869506dffaed744d24759a64e2aeb5dc799e
                                  • Opcode Fuzzy Hash: 9d5d8ffed56cf7b70a199dd71324f307333fde7baf38fe1f4d2c6b598dfa5020
                                  • Instruction Fuzzy Hash: 15D06C3214024DBBDF029E84DD06EDA3FAAFB48754F018050BA1896020C732E822AB91
                                  APIs
                                  • DeleteObject.GDI32(00000000), ref: 6C86E04E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: DeleteObject
                                  • String ID:
                                  • API String ID: 1531683806-0
                                  • Opcode ID: c6e38fa65332817917c14c8697e85f8c400fb719a4f30a3b5a06ba78465fd85e
                                  • Instruction ID: 12982b7e35a13424458cab3bd00ad4c55c4fb52eaf6fda8cab73d925bbc67465
                                  • Opcode Fuzzy Hash: c6e38fa65332817917c14c8697e85f8c400fb719a4f30a3b5a06ba78465fd85e
                                  • Instruction Fuzzy Hash: ACB09260A02211EADF205A329F0831A29646B4530EF58DCA8F044C2D04DF39C44B86A1
                                  APIs
                                  • Sleep.KERNELBASE(00011D28), ref: 6C8572A5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: fa1cc754c6b5efb938fac0f1b2993fef920e2bdfde96f803b27e07e4b254e2d8
                                  • Instruction ID: a32586b38cb02191ef3c6d975ec2321e97a48d24e72c5115db8488da512afd30
                                  • Opcode Fuzzy Hash: fa1cc754c6b5efb938fac0f1b2993fef920e2bdfde96f803b27e07e4b254e2d8
                                  • Instruction Fuzzy Hash: C9A022303002000203088338080E88228E80FB8302300C0203300C8000CF3000028220
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181055019.000000000049F000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.3180911974.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180934718.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.000000000040C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.0000000000414000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.0000000000456000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eda3440530c695fabe89684c08ced21f14d361cbd0f309897fafc30276024117
                                  • Instruction ID: 43da5d217c0980cd259a2d2a29eecca7fa398e6e45ce52ccb5a58d6b0a96cd39
                                  • Opcode Fuzzy Hash: eda3440530c695fabe89684c08ced21f14d361cbd0f309897fafc30276024117
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C91BD1C
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91BDA1
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91BDDE
                                  • SelectObject.GDI32(?,00000000), ref: 6C91BE44
                                  • __floor_pentium4.LIBCMT ref: 6C91BF84
                                  • __floor_pentium4.LIBCMT ref: 6C91C045
                                  • __floor_pentium4.LIBCMT ref: 6C91C17D
                                  • __floor_pentium4.LIBCMT ref: 6C91C204
                                  • __floor_pentium4.LIBCMT ref: 6C91C5D8
                                  • __floor_pentium4.LIBCMT ref: 6C91C86F
                                  • DeleteObject.GDI32(?), ref: 6C91CA63
                                  • __EH_prolog3.LIBCMT ref: 6C91CAA1
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91CAF6
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91CB24
                                    • Part of subcall function 6C91BA66: CreateDIBSection.GDI32(00000000,00000028,00000000,?,00000000,00000000), ref: 6C91BADD
                                  • SelectObject.GDI32(?,00000000), ref: 6C91CB83
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,?,?,00CC0020), ref: 6C91CBA8
                                  • OffsetRect.USER32(?,?,?), ref: 6C91CBBE
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C91D1D0
                                    • Part of subcall function 6C86D46D: __EH_prolog3.LIBCMT ref: 6C86D474
                                    • Part of subcall function 6C86D46D: CreateSolidBrush.GDI32(?), ref: 6C86D48F
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E700
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E716
                                    • Part of subcall function 6C86E74D: GetStockObject.GDI32(?), ref: 6C86E757
                                    • Part of subcall function 6C86E74D: SelectObject.GDI32(?,00000000), ref: 6C86E76B
                                    • Part of subcall function 6C86E74D: SelectObject.GDI32(?,00000000), ref: 6C86E77B
                                  • Ellipse.GDI32(?,?,?,?,000000FF), ref: 6C91CD83
                                  • Ellipse.GDI32(?,?,?,?,000000FF), ref: 6C91CDA6
                                  • Ellipse.GDI32(?,?,?,?,000000FF), ref: 6C91CDC2
                                  • Ellipse.GDI32(?,?,?,?,?), ref: 6C91CDFF
                                  • Ellipse.GDI32(?,?,?,?,000000FF), ref: 6C91CE1B
                                  • Rectangle.GDI32(?,?,?,?,000000FF), ref: 6C91CE43
                                  • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C91D23B
                                    • Part of subcall function 6C86E681: SelectObject.GDI32(00000048,?), ref: 6C86E68A
                                  • DeleteObject.GDI32(?), ref: 6C91D258
                                    • Part of subcall function 6C86D662: DeleteDC.GDI32(00000000), ref: 6C86D696
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Select$Create__floor_pentium4$Ellipse$Compatible$Delete$BitmapH_prolog3Rect$BrushH_prolog3_InflateOffsetRectangleSectionSolidStock
                                  • String ID:
                                  • API String ID: 2862932853-0
                                  • Opcode ID: 819c5a1757538aa21c748793278092d86f61450808aa6a42c8530eeed4cb0a22
                                  • Instruction ID: 35b86ab46d0c52cdaf6606144e07a4a85547075cd42a845c8d6fe609523cd5c3
                                  • Opcode Fuzzy Hash: 819c5a1757538aa21c748793278092d86f61450808aa6a42c8530eeed4cb0a22
                                  • Instruction Fuzzy Hash: 6FD2B271D14A1C9ECB17CFB8C8516EDFBB9AF5A384F10835AE419B7651EB309982CB10
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 6C8EA19E
                                  • IsWindowVisible.USER32(?), ref: 6C8EA1B9
                                  • GetWindowRect.USER32(?,?), ref: 6C8EA21B
                                  • IsIconic.USER32(?), ref: 6C8EA22A
                                  • CopyRect.USER32(?,?), ref: 6C8EA258
                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 6C8EA28F
                                  • GetMonitorInfoW.USER32(00000000), ref: 6C8EA296
                                  • CopyRect.USER32(?,?), ref: 6C8EA2A8
                                  • CopyRect.USER32(?,?), ref: 6C8EA2B6
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C8EA2EC
                                  • OffsetRect.USER32(?,?,?), ref: 6C8EA31B
                                  • GetSystemMetrics.USER32(00000022), ref: 6C8EA3A2
                                  • GetSystemMetrics.USER32(00000023), ref: 6C8EA3AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$CopySystemWindow$InfoMetricsMonitorVisible$FromIconicOffsetParametersPoint
                                  • String ID: ($,$\sx
                                  • API String ID: 388708526-2141389120
                                  • Opcode ID: d1c536a0c2a19a388783f00b87639b8f6589d663a61ed912f446b83ba8b44f31
                                  • Instruction ID: 01f16d95a2cfd3659e5f69c494203039d040b8f22fd6f6e86fc79e4319b38522
                                  • Opcode Fuzzy Hash: d1c536a0c2a19a388783f00b87639b8f6589d663a61ed912f446b83ba8b44f31
                                  • Instruction Fuzzy Hash: D4816E71E0121A9BDB14CFB8CA88BEEBBB9FF09708F104569E415E7641DB30E945CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C91EBD8
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91EC5E
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91EC95
                                  • SelectObject.GDI32(?,00000000), ref: 6C91ECF4
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,?,?,00CC0020), ref: 6C91ED1C
                                  • MulDiv.KERNEL32(?,00000048,00000064), ref: 6C91EF0E
                                  • MulDiv.KERNEL32(?,00000048,00000064), ref: 6C91EF29
                                  • MulDiv.KERNEL32(6C85F46A,00000048,00000064), ref: 6C91EF45
                                  • MulDiv.KERNEL32(6C85F46A,00000048,00000064), ref: 6C91EF60
                                  • MulDiv.KERNEL32(?,00000048,00000064), ref: 6C91EF79
                                  • MulDiv.KERNEL32(?,00000048,00000064), ref: 6C91EF93
                                  • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C91EFF2
                                  • DeleteObject.GDI32(?), ref: 6C91F009
                                    • Part of subcall function 6C87F3FD: FillRect.USER32(?,?,-000000A8), ref: 6C87F419
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateObject$BitmapDeleteFillH_prolog3RectSelect
                                  • String ID:
                                  • API String ID: 3910664508-0
                                  • Opcode ID: 49747aa634412d00c7b4ab428a3474be234ed8624e0c767afce0efe021dc5312
                                  • Instruction ID: 8e5f23c5aeb0b6c907e808962d4f71a6165fca7151a50c383cbfa5864c741569
                                  • Opcode Fuzzy Hash: 49747aa634412d00c7b4ab428a3474be234ed8624e0c767afce0efe021dc5312
                                  • Instruction Fuzzy Hash: 7FF1BE31A0421E9FCF18CF69C956AAE7BB4EF49308F14861AF915B7E81D730D945CBA0
                                  APIs
                                    • Part of subcall function 6C915431: IsWindow.USER32(00000000), ref: 6C915450
                                  • IsIconic.USER32(?), ref: 6C8E9390
                                  • GetWindowRect.USER32(?,6C8EC845), ref: 6C8E93C9
                                  • IsIconic.USER32(?), ref: 6C8E93EA
                                  • GetSystemMetrics.USER32(00000004), ref: 6C8E93F6
                                  • OffsetRect.USER32(6C8EC845,00000000,00000000), ref: 6C8E9406
                                  • GetSystemMetrics.USER32(00000004), ref: 6C8E940E
                                  • IsIconic.USER32(?), ref: 6C8E9444
                                  • GetSystemMetrics.USER32(00000021), ref: 6C8E9451
                                  • GetSystemMetrics.USER32(00000020), ref: 6C8E945C
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$IconicWindow$Rect$LongOffset
                                  • String ID: \sx
                                  • API String ID: 812917121-995570312
                                  • Opcode ID: 396b27f5b06417b5aa5b9cc6a9c980c5d3f4f38c7849f63e11a62dfb4016e1de
                                  • Instruction ID: b7eb4dd8f8ae52089fef033d214510738e13ce3b89b0e888cbe11fb8df4ce4e2
                                  • Opcode Fuzzy Hash: 396b27f5b06417b5aa5b9cc6a9c980c5d3f4f38c7849f63e11a62dfb4016e1de
                                  • Instruction Fuzzy Hash: 9A311C71B0030A9FCB14DFA9C988BAAB7F5FF09308F148559E505E7251D770A986CB51
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9A1508
                                  • _memcpy_s.LIBCMT ref: 6C9A1699
                                  • _memcpy_s.LIBCMT ref: 6C9A1708
                                  • PathRemoveFileSpecW.SHLWAPI(?,?,00000000), ref: 6C9A183C
                                  • GetFocus.USER32 ref: 6C9A1B25
                                  • IsWindowEnabled.USER32(00000000), ref: 6C9A1B5B
                                  • EnableWindow.USER32(00000000,00000000), ref: 6C9A1B73
                                  • EnableWindow.USER32(00000000,00000001), ref: 6C9A1C14
                                  • IsWindow.USER32(00000000), ref: 6C9A1C1B
                                  • SetFocus.USER32(00000000), ref: 6C9A1C26
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$EnableFocus_memcpy_s$EnabledFileH_prolog3PathRemoveSpec
                                  • String ID:
                                  • API String ID: 2321674057-0
                                  • Opcode ID: 9e8c63deb7bbe95609cf4a79e8dc6d6cf0ac89837919dce9105d92f72ab22826
                                  • Instruction ID: 71793e19060dac134d07328dd876d3d08a10aac9e4812b72e0626ac87329e816
                                  • Opcode Fuzzy Hash: 9e8c63deb7bbe95609cf4a79e8dc6d6cf0ac89837919dce9105d92f72ab22826
                                  • Instruction Fuzzy Hash: A1329D31A0161ADFDB04CFA8C980AEEB7B5FF49314F154669E815EB691DB30ED06CB90
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C89E86A
                                  • SetRectEmpty.USER32(?), ref: 6C89E877
                                  • InflateRect.USER32(00000000,00000000,?), ref: 6C89E974
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$Inflate
                                  • String ID: \sx
                                  • API String ID: 3025764292-995570312
                                  • Opcode ID: 611527d75dd8426048adc533a26360393b40d624b47142616b7c4886e8ac7e05
                                  • Instruction ID: ccd95b582f8317af67e181b90de16b79bae7f143b6881f828b25b1c10c1ca1cc
                                  • Opcode Fuzzy Hash: 611527d75dd8426048adc533a26360393b40d624b47142616b7c4886e8ac7e05
                                  • Instruction Fuzzy Hash: 31F1A131A0060AEFDF19CF68C944BDEBBB1FF49318F144629E815A7690DB71A856CB90
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$\sx
                                  • API String ID: 4168288129-1106195145
                                  • Opcode ID: eb252b0823daa3f0a91ee90f224fe578d23fe35e170d6e78e5c2fd698eb6d1f5
                                  • Instruction ID: 7bcc4c523ec51b1496e4c76e7014026643818cebc7f575bc7d7235bb6fac8ca8
                                  • Opcode Fuzzy Hash: eb252b0823daa3f0a91ee90f224fe578d23fe35e170d6e78e5c2fd698eb6d1f5
                                  • Instruction Fuzzy Hash: EDD24A72E092298FDB65CE28CC407D9B7B9EF99308F1441EAD44DE7640E778EA858F41
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 6C9EF929
                                  • IsValidCodePage.KERNEL32(00000000), ref: 6C9EF967
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 6C9EF97A
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C9EF9C2
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C9EF9DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID: \sx
                                  • API String ID: 415426439-995570312
                                  • Opcode ID: ca7fae4d26cebddbdb04a52a1081c208b5a336285ceacd1f4a49d14e92802ebf
                                  • Instruction ID: 9287ab6697faf21a3d1fe931c3647b45fd6b6bf2d7b6c9d0a622c12a2a481b1c
                                  • Opcode Fuzzy Hash: ca7fae4d26cebddbdb04a52a1081c208b5a336285ceacd1f4a49d14e92802ebf
                                  • Instruction Fuzzy Hash: 17519372A0120AABEF02CFA5EC40AEA73BCEF7D70CF10446AE555E7540E770DA458761
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetACP.KERNEL32(?,?,?,?,?,?,6C9E33E2,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 6C9EEF6B
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,6C9E33E2,?,?,?,00000055,?,-00000050,?,?), ref: 6C9EEFA2
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6C9EF105
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: \sx$utf8
                                  • API String ID: 607553120-1747617328
                                  • Opcode ID: 539e7c597e6a1752bc59a308495a2d81f1fa0895137b38b8e75e3bbd015bf2aa
                                  • Instruction ID: 8e800401091a14034d5cd6e38c368d6a6d21520d0c9c9ec696605560f8fb840e
                                  • Opcode Fuzzy Hash: 539e7c597e6a1752bc59a308495a2d81f1fa0895137b38b8e75e3bbd015bf2aa
                                  • Instruction Fuzzy Hash: 39713231601606EAE716AF35DC41BEA73ACEF7D70CF10456AE915DBA80FB30E94587A0
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,6C9EF957,00000002,00000000,?,?,?,6C9EF957,?,00000000), ref: 6C9EF6DE
                                  • GetLocaleInfoW.KERNEL32(?,20001004,6C9EF957,00000002,00000000,?,?,?,6C9EF957,?,00000000), ref: 6C9EF707
                                  • GetACP.KERNEL32(?,?,6C9EF957,?,00000000), ref: 6C9EF71C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: acc1b08a1f0a5e7606fe02de73637cc1b8731bfc27f464fe2628e3df07265aa4
                                  • Instruction ID: 9706df126ab296c74a87a08ca3dbf087d4d38c5adf87fa86383cae2bc7922647
                                  • Opcode Fuzzy Hash: acc1b08a1f0a5e7606fe02de73637cc1b8731bfc27f464fe2628e3df07265aa4
                                  • Instruction Fuzzy Hash: B321F462705105A7EB168F6AE900A8773BEEF6CF5CB66816AE809C7920F733D941C350
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C9EF31D
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C9EF367
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C9EF42D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InfoLocale$ErrorLast
                                  • String ID: \sx
                                  • API String ID: 661929714-995570312
                                  • Opcode ID: cd8e1191deeeea0667ec1af999341e1433d3c036ccd0186cc61e3acf2b67f267
                                  • Instruction ID: 53d7189d127155a48c73effe8c6234003e446e9b693472aea0230e13abc57817
                                  • Opcode Fuzzy Hash: cd8e1191deeeea0667ec1af999341e1433d3c036ccd0186cc61e3acf2b67f267
                                  • Instruction Fuzzy Hash: 6F61D5725102079BEB1A8F28DC85BAA73B8FF2830CF2441ABDD05C6A84FB34D945CB54
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6C9D2B6A
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6C9D2B74
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6C9D2B81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID: \sx
                                  • API String ID: 3906539128-995570312
                                  • Opcode ID: 782acba21b92ad2d4171779b7d0460f220a60220a782ac5f5cd350cdb1ec9f4e
                                  • Instruction ID: 710efce9f51f3d4899d22a97a90070169d41a4edfd749d1f10987c97ae0ef563
                                  • Opcode Fuzzy Hash: 782acba21b92ad2d4171779b7d0460f220a60220a782ac5f5cd350cdb1ec9f4e
                                  • Instruction Fuzzy Hash: 9231D374A01319ABCB25DF25C8887DDBBB8BF18314F5081EAE41CA7250E7749B858F45
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31143bf70f31fe54bb0b7b911e31a5d3aba014327072bf311d4d32eaeb942acb
                                  • Instruction ID: 170b477125c5c8d80dfd9b85e2491c3093131edcbd315233700d041311ad8d8b
                                  • Opcode Fuzzy Hash: 31143bf70f31fe54bb0b7b911e31a5d3aba014327072bf311d4d32eaeb942acb
                                  • Instruction Fuzzy Hash: E0025B71E016199BDB14CFA9C8806AEFBF5FF48318F25866AD919F7740D731AA05CB80
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8F6677
                                    • Part of subcall function 6C895C4C: __EH_prolog3.LIBCMT ref: 6C895C53
                                  • GetCurrentThread.KERNEL32 ref: 6C8F66D6
                                  • GetCurrentThreadId.KERNEL32 ref: 6C8F66DF
                                  • GetVersionExW.KERNEL32 ref: 6C8F677B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CurrentThread$H_prolog3H_prolog3_Version
                                  • String ID:
                                  • API String ID: 786120064-0
                                  • Opcode ID: 683fdcf91af5266602a3f66769441289bcb598c1bc865602a93a16f0a6bcaf5c
                                  • Instruction ID: 825e1e4582064476b5eadaa5971646c4494577892dfecef2484c622071374e0b
                                  • Opcode Fuzzy Hash: 683fdcf91af5266602a3f66769441289bcb598c1bc865602a93a16f0a6bcaf5c
                                  • Instruction Fuzzy Hash: F0419EB0901B04CFD7218F2A8A8468AFAF4BB59744F908A6ED1AEC7B10DB30A545CF55
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C9C8D99
                                  • IsDebuggerPresent.KERNEL32 ref: 6C9C8E65
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C9C8E7E
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 6C9C8E88
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: b9cf2123b669975c021aabee2f220ed7f7e7e7db35cb5db2ee7601b668a49acf
                                  • Instruction ID: 19b3d357cda965449503649b7568761370581faf076e66c47bd94440dda1bb00
                                  • Opcode Fuzzy Hash: b9cf2123b669975c021aabee2f220ed7f7e7e7db35cb5db2ee7601b668a49acf
                                  • Instruction Fuzzy Hash: A8310875E013199BDF21EFA4C9497CDBBB8AF18304F1041EAE50DAB240EB709B858F46
                                  APIs
                                  • SetForegroundWindow.USER32(?), ref: 6C874042
                                  • IsIconic.USER32(?), ref: 6C87404B
                                    • Part of subcall function 6C86CC71: ShowWindow.USER32(?,6C9AEDF4,00000000,?,6C87A7D4,00000000,?,?,6C9AEDF4,?,00000000,?,?,6C87A374,00000000,000000FF), ref: 6C86CC82
                                  • PostMessageW.USER32(?,00000000,?,00000005), ref: 6C874073
                                  • IsIconic.USER32(?), ref: 6C87407C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: IconicWindow$ForegroundMessagePostShow
                                  • String ID:
                                  • API String ID: 675533722-0
                                  • Opcode ID: dc6dc4e8e59c3788992ff20ba4c5c1b24c7e284e7765f4a64cd704f19b359fee
                                  • Instruction ID: a13789f25920ce1730b61ca15fc91a6ab3c887092d3f9d065979e01f33e2fba9
                                  • Opcode Fuzzy Hash: dc6dc4e8e59c3788992ff20ba4c5c1b24c7e284e7765f4a64cd704f19b359fee
                                  • Instruction Fuzzy Hash: 4701F932300611BFDF291739CD5CE6A3B75FFCA369B11062DF509C6A90DB218802CAA0
                                  APIs
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • GetKeyState.USER32(00000010), ref: 6C86836C
                                  • GetKeyState.USER32(00000011), ref: 6C868379
                                  • GetKeyState.USER32(00000012), ref: 6C868386
                                  • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C8683A0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: State$LongMessageSendWindow
                                  • String ID:
                                  • API String ID: 1063413437-0
                                  • Opcode ID: 1754b221dbca50e4f8155432dc5ce5172bdc24839e3f973e3e0b58a7382a0111
                                  • Instruction ID: c12afc179027177155b3015ead02caf2c22e6eaf9cec17232c0e697200915b92
                                  • Opcode Fuzzy Hash: 1754b221dbca50e4f8155432dc5ce5172bdc24839e3f973e3e0b58a7382a0111
                                  • Instruction Fuzzy Hash: 8EF0B43139534B1BE9342636CF05BA925609F03BC9F451D2AA506EFDC0CBA08443A361
                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6C9C8EBC
                                  • GetCurrentThreadId.KERNEL32 ref: 6C9C8ECB
                                  • GetCurrentProcessId.KERNEL32 ref: 6C9C8ED4
                                  • QueryPerformanceCounter.KERNEL32(?), ref: 6C9C8EE1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: af324f737a8dda01a48f338230739fdb556d94999143db00647f7b9e941e47bc
                                  • Instruction ID: 77dd52ec3534236ed8e246bda3f4fd0a758294cbd0326dcb2cd38d57fcc0d85f
                                  • Opcode Fuzzy Hash: af324f737a8dda01a48f338230739fdb556d94999143db00647f7b9e941e47bc
                                  • Instruction Fuzzy Hash: 60F06774E1020DEBCF04DBB4C54999EBBF8FF1D244B918596A412E7100E730AB46DB50
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6C9C85CC,6CA39B40), ref: 6C9C84B1
                                  • UnhandledExceptionFilter.KERNEL32(6C9C85CC,?,6C9C85CC,6CA39B40), ref: 6C9C84BA
                                  • GetCurrentProcess.KERNEL32(C0000409,?,6C9C85CC,6CA39B40), ref: 6C9C84C5
                                  • TerminateProcess.KERNEL32(00000000,?,6C9C85CC,6CA39B40), ref: 6C9C84CC
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                  • String ID:
                                  • API String ID: 3231755760-0
                                  • Opcode ID: fae2067265b0b750433c924712ce27409701a6725b2695d84e85b7a2f67c085e
                                  • Instruction ID: dd3fe96d44c4f85f83f8c0d12f3dea184b3a9d7685a1d2fef50bd9dae4add98c
                                  • Opcode Fuzzy Hash: fae2067265b0b750433c924712ce27409701a6725b2695d84e85b7a2f67c085e
                                  • Instruction Fuzzy Hash: 12D0123130030AABEF092BE0CC0CA183F38EB0A28AF00C01CFB09C1042CF3144938BA2
                                  APIs
                                  • OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,?,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C8647AF
                                  • GetLastError.KERNEL32(?,?,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C8647E6
                                    • Part of subcall function 6C8648CE: GetModuleFileNameW.KERNEL32(?,?,00000105,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C86497E
                                    • Part of subcall function 6C8648CE: SetLastError.KERNEL32(0000006F,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C864992
                                  Strings
                                  • IsolationAware function called after IsolationAwareCleanup, xrefs: 6C8647AA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$DebugFileModuleNameOutputString
                                  • String ID: IsolationAware function called after IsolationAwareCleanup
                                  • API String ID: 3265401609-2690750368
                                  • Opcode ID: e59cf95677a87680d08b3ef9515be64c9467a6148f5515ef3bed74ef1a17b991
                                  • Instruction ID: c8d05080f9675510130877121ef825b8030914ae1808f1e246c16b13b8bc0133
                                  • Opcode Fuzzy Hash: e59cf95677a87680d08b3ef9515be64c9467a6148f5515ef3bed74ef1a17b991
                                  • Instruction Fuzzy Hash: 9AF0F435715276474B38EBABCB6066E76A8B7C3B8C7204D35EE16D1E00DB20C4428AA1
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C9EF570
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID: \sx
                                  • API String ID: 3736152602-995570312
                                  • Opcode ID: c219c8f968f424918df5243804f4b8619d401623035608ee57938919d9bc529e
                                  • Instruction ID: 4fb98f1990bf297a9af53df37557212746d0b0c6389e45382dca777df1a40c67
                                  • Opcode Fuzzy Hash: c219c8f968f424918df5243804f4b8619d401623035608ee57938919d9bc529e
                                  • Instruction Fuzzy Hash: A321B332625206ABDB19CE29D841ABB73ACEF7931CB10416BED01D6A40EF35E945C750
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6C9EF105
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID: \sx$utf8
                                  • API String ID: 3736152602-1747617328
                                  • Opcode ID: a4977d7263f608bbad8f1ad467c92c388a54509266505d8f9bb2ec5e6c5bca15
                                  • Instruction ID: 99b643cdfbe4b6d56eb5ae1805871922f61ca7af160a17a0bb2a79f1a72227f1
                                  • Opcode Fuzzy Hash: a4977d7263f608bbad8f1ad467c92c388a54509266505d8f9bb2ec5e6c5bca15
                                  • Instruction Fuzzy Hash: 52F0A432B01206ABDB199E28D849AFA73ACDF7931CF1141BEA502D7640DB74EE068754
                                  APIs
                                    • Part of subcall function 6C9E0A15: EnterCriticalSection.KERNEL32(-6CA75F28,?,6C9D7BCF,?,6CA663C8,00000008,6C9D7D7F,?,?,00000000,78E4735C,?,00000000), ref: 6C9E0A24
                                  • EnumSystemLocalesW.KERNEL32(6C9E5AB3,00000001,6CA666B8,0000000C,6C9E5F28,00000000), ref: 6C9E5AF8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID: \sx
                                  • API String ID: 1272433827-995570312
                                  • Opcode ID: 61004db08d1df58222d23d0289354a99b5284e95eccbcd3eec3e726326dc75b5
                                  • Instruction ID: 8d5515d4de3a1b51c46a39445f7417168b08e2b18b2420681142edd5a5115b3f
                                  • Opcode Fuzzy Hash: 61004db08d1df58222d23d0289354a99b5284e95eccbcd3eec3e726326dc75b5
                                  • Instruction Fuzzy Hash: DFF03C76B00216DFDB05DF58D541B9977B0FB69329F00811AE410DBB90CB759945CF50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID:
                                  • API String ID: 431132790-0
                                  • Opcode ID: 32ab6f4b200ab8bbd79e3ab9f3c45c81036daa508e632f880b3cee9d3bd2ed8f
                                  • Instruction ID: 5d27e3c118abc7bbf3f3138616970199f739d1a926e270c428487a5912e7b951
                                  • Opcode Fuzzy Hash: 32ab6f4b200ab8bbd79e3ab9f3c45c81036daa508e632f880b3cee9d3bd2ed8f
                                  • Instruction Fuzzy Hash: CDE1A170A00209DFDF25CF66CA54BAE77B5AF46318F14482AE819EBF90DB34D941CB91
                                  APIs
                                  • IsIconic.USER32(?), ref: 6C859E2F
                                  • GetClientRect.USER32(00000000,?), ref: 6C859E4D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClientIconicRect
                                  • String ID:
                                  • API String ID: 1086547473-0
                                  • Opcode ID: 77b12299f0bce5860e8c4cc4ec1f68b132cb160e855f760257b780ec12e1a91f
                                  • Instruction ID: 5a59f6df568b4abc25fa6b099f0e6bb9e9490e2016e8ac2b46bb4fa81e9e8216
                                  • Opcode Fuzzy Hash: 77b12299f0bce5860e8c4cc4ec1f68b132cb160e855f760257b780ec12e1a91f
                                  • Instruction Fuzzy Hash: AF314C71304305AFD714CF28C988BAAB7E9FF88348F004A2DF959D76A1DB70E955CA91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: IconicVisibleWindow
                                  • String ID:
                                  • API String ID: 1797901696-0
                                  • Opcode ID: 0e2ba16f6310b129d548663666a49d1a0a71a7e863e80fbd248767cc81ec38a9
                                  • Instruction ID: e31144ee481b6b189afc590f23b4d32d1504004f076243dab7f073888135f7b5
                                  • Opcode Fuzzy Hash: 0e2ba16f6310b129d548663666a49d1a0a71a7e863e80fbd248767cc81ec38a9
                                  • Instruction Fuzzy Hash: FEF0E93330492067D936163D9D44DAE76ADEB862787040336EA15D2AE0FBA08862D2E0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0$\sx
                                  • API String ID: 0-1367868080
                                  • Opcode ID: d0bff9b4e82e5d2ef01fb15534e83e38768ded5c21f52c9b63e1a6805efb3afa
                                  • Instruction ID: 93bc954f6ff8ad0c095fe5b160dda56d94d42813eb0e8a3ba4be687036f8f888
                                  • Opcode Fuzzy Hash: d0bff9b4e82e5d2ef01fb15534e83e38768ded5c21f52c9b63e1a6805efb3afa
                                  • Instruction Fuzzy Hash: E2D1D032A05E068FCB14CF68C5806AAB7B5FF47338B22C619D466BBA90D730F941CB50
                                  Strings
                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 6C84D701
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                  • API String ID: 593203224-2799312399
                                  • Opcode ID: f331ca7a41750e2659c09bdb13d996c053c5f06dd14eeb836f708beb9587cdef
                                  • Instruction ID: 8faaf651d349772c2f2fe13115aea4def81c82c719fb8f0b7baa81a9494b54ae
                                  • Opcode Fuzzy Hash: f331ca7a41750e2659c09bdb13d996c053c5f06dd14eeb836f708beb9587cdef
                                  • Instruction Fuzzy Hash: D982B430505249CFDB21CF28C650BAABBF1AF56308F24CD9ED4A49BB92D335E946CB51
                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6C9E0423,?,?,00000008,?,?,6C9F084D,00000000), ref: 6C9E0655
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: 65396a68110582ff3133dbdf86541b936c0009bac919d7ce0163cf45c909446a
                                  • Instruction ID: a333d922b4a6ffcf6b160d7f593ecfdf58757e011c4677c151b48e56e36c6bc3
                                  • Opcode Fuzzy Hash: 65396a68110582ff3133dbdf86541b936c0009bac919d7ce0163cf45c909446a
                                  • Instruction Fuzzy Hash: 21B18A32210648DFD706CF28C486B547BE0FF59368F259658E8E9CF6A1CB35E992DB40
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6C9C8A6A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 67f92ee076de8ebd646337517756def189e7d4fc4964581d533b18fb9344fa10
                                  • Instruction ID: 047156c63f67778fe1fb87397ca9d78eeddeec7971dc66b8c8d0357da43733fc
                                  • Opcode Fuzzy Hash: 67f92ee076de8ebd646337517756def189e7d4fc4964581d533b18fb9344fa10
                                  • Instruction Fuzzy Hash: 03A1ACB1B127428FDF0CCF55C6817ADBBB4FB49328F25822AD515EB680C3349845CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \sx
                                  • API String ID: 0-995570312
                                  • Opcode ID: bae7715eaeb42bbf7e64a335280fa2093b986532caf06dab5e95025153763c6a
                                  • Instruction ID: dd55adccf54f6a6c8a6b4b1ac6c8da2e5dc9e25b59db82a45265df8d653f1bd9
                                  • Opcode Fuzzy Hash: bae7715eaeb42bbf7e64a335280fa2093b986532caf06dab5e95025153763c6a
                                  • Instruction Fuzzy Hash: 1CC1E236905F468FC714CE69C5806AAB7BAAF07338F26C699C462B7E51D730F985CB10
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • EnumSystemLocalesW.KERNEL32(6C9EF2C9,00000001,00000000,?,-00000050,?,6C9EF8FD,00000000,?,?,?,00000055,?), ref: 6C9EF215
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: b9e0605bc52c7a7e7022b6301023d9ebb928cedcea34701c624fb1a403ff6900
                                  • Instruction ID: 516ada47c6d830b09c2f4bd69af6f19c6e65ffe8bb56f66fe89f80753114dc23
                                  • Opcode Fuzzy Hash: b9e0605bc52c7a7e7022b6301023d9ebb928cedcea34701c624fb1a403ff6900
                                  • Instruction Fuzzy Hash: E011293B2047059FDB199F79D8945AAB7A1FF9835CB18492ED98687F00D731A543C740
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6C9EF4E5,00000000,00000000,?), ref: 6C9EF777
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 45d99c3d560c8eb0b39159d14b06c038418a15eb5983ca92e2a59f8120b1c406
                                  • Instruction ID: 43f0916999e4cf4264228bd7fb5b805fe47eb16293f0f41c12eaebe706d8818c
                                  • Opcode Fuzzy Hash: 45d99c3d560c8eb0b39159d14b06c038418a15eb5983ca92e2a59f8120b1c406
                                  • Instruction Fuzzy Hash: 47019933700213ABDB1A4A629805BFA3769EF25B1CF10842EDC56E3680EB31FD41C6D0
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • EnumSystemLocalesW.KERNEL32(6C9EF51C,00000001,?,?,-00000050,?,6C9EF8C5,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 6C9EF288
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: cb19d0833b604fa23220c5197ea87752684a643393bfd32a5c405848f4b62308
                                  • Instruction ID: 561627f5b37a3603520ee8d4752ba9cd69bcebc8a68b7a10ea6a0efe70711d43
                                  • Opcode Fuzzy Hash: cb19d0833b604fa23220c5197ea87752684a643393bfd32a5c405848f4b62308
                                  • Instruction Fuzzy Hash: D0F0463A3003441FDB065F35E884AAA7BA5EF9836CB18452EF9418BB80C771E803CB50
                                  APIs
                                    • Part of subcall function 6C9E29B2: GetLastError.KERNEL32(00000000,?,6C9EB277), ref: 6C9E29B6
                                    • Part of subcall function 6C9E29B2: SetLastError.KERNEL32(00000000,?,?,00000028,6C9E130E), ref: 6C9E2A58
                                  • EnumSystemLocalesW.KERNEL32(6C9EF0B1,00000001,?,?,?,6C9EF91F,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 6C9EF18F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 0528df72f141c8382d0c366dcedb20092c37954f4afd694d913a036a0f0d8f73
                                  • Instruction ID: 5f2c2eefd8565c7932ca5f31dfbcf2d855f2196d88307350de118700488744d8
                                  • Opcode Fuzzy Hash: 0528df72f141c8382d0c366dcedb20092c37954f4afd694d913a036a0f0d8f73
                                  • Instruction Fuzzy Hash: 4EF0E53630024A67CB06AF36D94466A7FA4EFD5758B0A4099EA058BA41C631D983C790
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,6C9E3F58,?,20001004,00000000,00000002,?,?,6C9E354A), ref: 6C9E6060
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 89ea941eaff8bfecbd0d8d384498c1bfc1b740ce81470db3a0c54a701509da24
                                  • Instruction ID: d24f2c56711b78b966e8c3c4e6b6699af77912d7e54d3fcc0368568335489f3d
                                  • Opcode Fuzzy Hash: 89ea941eaff8bfecbd0d8d384498c1bfc1b740ce81470db3a0c54a701509da24
                                  • Instruction Fuzzy Hash: ADE01A7160062DBBCF272F61CC08BAE3E29AF69795F004014FE04A5A518B32CA22DA91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Iconic
                                  • String ID:
                                  • API String ID: 110040809-0
                                  • Opcode ID: ad0b8c0486c1dda8ce39966795d5f9ce798a4488d207a233aacafa3a097aae7d
                                  • Instruction ID: 2dd91373776d1822e1382019a35c2c765d5b5297689df9a39859592ba51256c7
                                  • Opcode Fuzzy Hash: ad0b8c0486c1dda8ce39966795d5f9ce798a4488d207a233aacafa3a097aae7d
                                  • Instruction Fuzzy Hash: 8AD0C9322547608BC7256E16A448BC673F8AB4571AF05492D904A81DA1E7B098C1CA40
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ef94c5ceef2588835928cee1bf75ae9265365b8a71d49d51b82c9171d563b4c
                                  • Instruction ID: c227640bb5b7d3457ab30e0702162f93852e7eea6196cc81a4a126f2bfa81693
                                  • Opcode Fuzzy Hash: 7ef94c5ceef2588835928cee1bf75ae9265365b8a71d49d51b82c9171d563b4c
                                  • Instruction Fuzzy Hash: 80515B72D00519EFDB04CF99C940AEEBBB6EF98304F1A8459E914AB201D734EA51DF90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: cd864999476ba43a6613facce47641066c205bde5ae47458f2989a5f9795449a
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: CC1108B734604243D700AF2DD4B06BABF9DEBC622CB79436AE1628BE54D123E1659603
                                  APIs
                                  • OpenThemeData.UXTHEME(?,WINDOW,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8641F5
                                  • OpenThemeData.UXTHEME(?,TOOLBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864214
                                  • OpenThemeData.UXTHEME(?,BUTTON,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864233
                                  • OpenThemeData.UXTHEME(?,STATUS,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864252
                                  • OpenThemeData.UXTHEME(?,REBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864271
                                  • OpenThemeData.UXTHEME(?,COMBOBOX,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864290
                                  • OpenThemeData.UXTHEME(?,PROGRESS,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8642AF
                                  • OpenThemeData.UXTHEME(?,HEADER,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8642CE
                                  • OpenThemeData.UXTHEME(?,SCROLLBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8642ED
                                  • OpenThemeData.UXTHEME(?,EXPLORERBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C86430C
                                  • OpenThemeData.UXTHEME(?,TREEVIEW,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C86432B
                                  • OpenThemeData.UXTHEME(?,STARTPANEL,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C86434A
                                  • OpenThemeData.UXTHEME(?,TASKBAND,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864369
                                  • OpenThemeData.UXTHEME(?,TASKBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864388
                                  • OpenThemeData.UXTHEME(?,SPIN,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8643A7
                                  • OpenThemeData.UXTHEME(?,TAB,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8643C6
                                  • OpenThemeData.UXTHEME(?,TOOLTIP,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C8643E5
                                  • OpenThemeData.UXTHEME(?,TRACKBAR,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C864404
                                  • OpenThemeData.UXTHEME(00000000,MENU,?,?,6C85BD10,?,6C85BD2A,00000004,6C842450,00000000), ref: 6C86441F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: DataOpenTheme
                                  • String ID: BUTTON$COMBOBOX$EXPLORERBAR$HEADER$MENU$PROGRESS$REBAR$SCROLLBAR$SPIN$STARTPANEL$STATUS$TAB$TASKBAND$TASKBAR$TOOLBAR$TOOLTIP$TRACKBAR$TREEVIEW$WINDOW
                                  • API String ID: 1744092376-1233129369
                                  • Opcode ID: f0ccff9e2383dcb3a1603e2f781d05065b839f9a007849ccb7c2cac5eba0fe62
                                  • Instruction ID: a7544d4c687474df0468b1cb188451df126b086f7ba01f8a80e897fa7f4a579a
                                  • Opcode Fuzzy Hash: f0ccff9e2383dcb3a1603e2f781d05065b839f9a007849ccb7c2cac5eba0fe62
                                  • Instruction Fuzzy Hash: 2C615D74744B569FC7649BBA9F18C1EBAA8BB8A38C7058D6AED01C7F00F734D4058B64
                                  APIs
                                    • Part of subcall function 6C87135E: SendMessageW.USER32(?,00001132,00000000,?), ref: 6C8713A8
                                    • Part of subcall function 6C871561: SendMessageW.USER32(?,0000113F,00000000,00000000), ref: 6C8715A5
                                  • SendMessageW.USER32(?,00001102,00000002,00000000), ref: 6C84447C
                                  • SendMessageW.USER32(75FF0000,00001102,00000002,00000000), ref: 6C844644
                                  • SendMessageW.USER32(75FF0000,00001102,00000002,00000000), ref: 6C844778
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: CFakeAboutDlg$CFakeAboutDlg()$CFakeApp$CFakeApp()$CFakeAppDoc$CFakeAppDoc()$CFakeAppFrame$CFakeAppFrame()$CFakeAppView$CFakeAppView()$FakeApp $GetDocument()$Globals$InitInstance()$OnAppAbout()$OnNewDocument()$m_wndMenuBar$m_wndStatusBar$m_wndToolBar$theFakeApp$~CFakeAppDoc()$~CFakeAppFrame()$~CFakeAppView()
                                  • API String ID: 3850602802-4118746453
                                  • Opcode ID: 120ae8d9d7cb434c0a3678c094729d4215ad8044ae5b7f22bcaebd90c5365a2b
                                  • Instruction ID: eaff6846988eb7f3c05f9cb2d51ab17001baf8c0121fa869fa3bcf6426859580
                                  • Opcode Fuzzy Hash: 120ae8d9d7cb434c0a3678c094729d4215ad8044ae5b7f22bcaebd90c5365a2b
                                  • Instruction Fuzzy Hash: FCA169307C03147AF634CA148D6BFDA6665AB00F14F748624B3493EBD5DAE63F898668
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C87FB4B
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,6CA0BE48,00000000,6CA0BE44,00000000,6CA088E0,00000000,?,?,00000A88,6C880E2B,?,00000000,00000038), ref: 6C87FBEA
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,6CA088E0,00000000,?,?,00000A88,6C880E2B,?,00000000,00000038), ref: 6C87FC9D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: File$CreateH_prolog3_ModuleName
                                  • String ID:
                                  • API String ID: 3408945735-3916222277
                                  • Opcode ID: 828b5070a9a2df61067021222537483e1cc46ed5b992adf36b6dd61839d1ba01
                                  • Instruction ID: a44dde08a033acedcacd3c6363d1bfbb37d47e3715673d531e8fa7c4f56346a1
                                  • Opcode Fuzzy Hash: 828b5070a9a2df61067021222537483e1cc46ed5b992adf36b6dd61839d1ba01
                                  • Instruction Fuzzy Hash: A2C19072A00218AFDB319F65CD44FEE7778AF5A354F1049A9F909E2940EB309E85CF61
                                  APIs
                                  • RegisterClipboardFormatW.USER32(Native), ref: 6C8FEBB0
                                  • RegisterClipboardFormatW.USER32(OwnerLink), ref: 6C8FEBBD
                                  • RegisterClipboardFormatW.USER32(ObjectLink), ref: 6C8FEBCB
                                  • RegisterClipboardFormatW.USER32(Embedded Object), ref: 6C8FEBD9
                                  • RegisterClipboardFormatW.USER32(Embed Source), ref: 6C8FEBE7
                                  • RegisterClipboardFormatW.USER32(Link Source), ref: 6C8FEBF5
                                  • RegisterClipboardFormatW.USER32(Object Descriptor), ref: 6C8FEC03
                                  • RegisterClipboardFormatW.USER32(Link Source Descriptor), ref: 6C8FEC11
                                  • RegisterClipboardFormatW.USER32(FileName), ref: 6C8FEC1F
                                  • RegisterClipboardFormatW.USER32(FileNameW), ref: 6C8FEC2D
                                  • RegisterClipboardFormatW.USER32(Rich Text Format), ref: 6C8FEC3B
                                  • RegisterClipboardFormatW.USER32(RichEdit Text and Objects), ref: 6C8FEC49
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClipboardFormatRegister
                                  • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
                                  • API String ID: 1228543026-2889995556
                                  • Opcode ID: 3e06c73b0e89ec598c8ed3a7d0a17cc6220f8c8dba3a50e8ea5193da64c126e7
                                  • Instruction ID: 7d6738ef24a0fcc51888985305abe1a18c4852e6827fb0ae7bf90f53b4d37ffb
                                  • Opcode Fuzzy Hash: 3e06c73b0e89ec598c8ed3a7d0a17cc6220f8c8dba3a50e8ea5193da64c126e7
                                  • Instruction Fuzzy Hash: B9111375A047119FCF659FB29A0C4967BF4BA0A796300CE1DA156D7E00D73491CBCFA4
                                  APIs
                                    • Part of subcall function 6C87135E: SendMessageW.USER32(?,00001132,00000000,?), ref: 6C8713A8
                                    • Part of subcall function 6C871561: SendMessageW.USER32(?,0000113F,00000000,00000000), ref: 6C8715A5
                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 6C853764
                                  • SendMessageW.USER32(?,00001102,00000002,00000000), ref: 6C853777
                                  • SendMessageW.USER32(?,00001102,00000002,00000000), ref: 6C853787
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: FakeApp $FakeApp $FakeApp $FakeApp $FakeApp.cpp$FakeApp.h$FakeApp.ico$FakeApp.rc$FakeApp.rc2$FakeAppDoc.cpp$FakeAppDoc.h$FakeAppDoc.ico$FakeAppView.cpp$FakeAppView.h$FakeToolbar.bmp$MainFrm.cpp$MainFrm.h$Resource.h$pch.cpp$pch.h
                                  • API String ID: 3850602802-2747208130
                                  • Opcode ID: 66d89a7514b8b520432300023ca853757723dc9b78cc5d400b639b5f00d56b0d
                                  • Instruction ID: ecdf5f4a657e0ba5dd06b263090f52c29de6da43d398d29dbbbaee9fab67b8bb
                                  • Opcode Fuzzy Hash: 66d89a7514b8b520432300023ca853757723dc9b78cc5d400b639b5f00d56b0d
                                  • Instruction Fuzzy Hash: 33814E307C03147AFA34D6148D6BFAD6A26AB44F04FB48564B3483FFD6DAD63E458268
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8F52BF
                                  • LoadRegTypeLib.OLEAUT32(?,?,?,000000FF,?), ref: 6C8F52EC
                                  • StringFromGUID2.OLE32(?,00000001,00000027,00000694,6C858763,6CA42F78,00000001,00000000,00000000,00000003,00000000,00000000,00000000,?,?,00000001), ref: 6C8F5303
                                  • swprintf.LIBCMT ref: 6C8F534C
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C8F5399
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00030019,?,?,?,?,00000001,?,00000001), ref: 6C8F53CD
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,HELPDIR,000000FF,?,?,?,00000001,?,00000001), ref: 6C8F5403
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,FLAGS,000000FF,?,?,?,00000001,?,00000001), ref: 6C8F5427
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00030019,?,?,?,?,00000001,?,00000001), ref: 6C8F5457
                                  • RegOpenKeyExW.ADVAPI32(?,win64,00000000,00020000,?,?,?,?,00000001,?,00000001), ref: 6C8F5479
                                  • RegCloseKey.ADVAPI32 ref: 6C8F54B9
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,?,00000001), ref: 6C8F548D
                                    • Part of subcall function 6C8F5B01: __EH_prolog3.LIBCMT ref: 6C8F5B08
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C8F54D3
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,?,00000001), ref: 6C8F54E7
                                  • RegEnumKeyW.ADVAPI32(?,00000001,?,00000104), ref: 6C8F5518
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,?,00000001), ref: 6C8F5532
                                  • LoadRegTypeLib.OLEAUT32(?,?,?,000000FF,?), ref: 6C8F558E
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,?,00000001), ref: 6C8F55AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Close$EnumOpenString$CompareLoadType$FromH_prolog3H_prolog3_swprintf
                                  • String ID: FLAGS$HELPDIR$TYPELIB\%Ts$win32$win64
                                  • API String ID: 3736468143-1045325687
                                  • Opcode ID: 29bf69b6e8cfbaebabb42d0e9cad92e26d2e6f79b4f14b9e04d6f0449897b59c
                                  • Instruction ID: fcba01c4aa996ea20e91757b7b89e6ce6d21fe6b4bd5dafd8c3cf9182101c365
                                  • Opcode Fuzzy Hash: 29bf69b6e8cfbaebabb42d0e9cad92e26d2e6f79b4f14b9e04d6f0449897b59c
                                  • Instruction Fuzzy Hash: 63919170A05229AFDF218F14CD44BDA7B7AEB45398F0086D5F529E2550DB328E96CF60
                                  APIs
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • GetParent.USER32(?), ref: 6C8667BF
                                  • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C8667E1
                                  • GetWindowRect.USER32(?,?), ref: 6C866805
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6C866825
                                  • MonitorFromWindow.USER32(00000000,00000001), ref: 6C86685E
                                  • GetMonitorInfoW.USER32(00000000), ref: 6C866865
                                  • CopyRect.USER32(?,?), ref: 6C866873
                                  • GetWindowRect.USER32(00000000,?), ref: 6C866880
                                  • MonitorFromWindow.USER32(00000000,00000002), ref: 6C86688D
                                  • GetMonitorInfoW.USER32(00000000), ref: 6C866894
                                  • CopyRect.USER32(?,?), ref: 6C8668A2
                                  • GetParent.USER32(?), ref: 6C8668AC
                                  • GetClientRect.USER32(00000000,?), ref: 6C8668B9
                                  • GetClientRect.USER32(00000000,?), ref: 6C8668C4
                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6C8668D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Rect$Monitor$ClientCopyFromInfoLongParent$MessagePointsSend
                                  • String ID: ($\sx
                                  • API String ID: 3610148278-4275447854
                                  • Opcode ID: c5f20629164b734175a28279b49610cbcc4b72801a51b84436ff9af0f698c9be
                                  • Instruction ID: a3c100d45ee1ae53de54316d47a7ad92e38203f5b503c4d3ef1606f2b9ca925d
                                  • Opcode Fuzzy Hash: c5f20629164b734175a28279b49610cbcc4b72801a51b84436ff9af0f698c9be
                                  • Instruction Fuzzy Hash: 93617571A0021AAFCF05CFA9CE88AEEB7B9FF45359F154618E511F7640DB30A946CB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C86D856
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C86D8AB
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C86D8C3
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C86D8DB
                                  • GetObjectW.GDI32(00000004,00000018,?), ref: 6C86D8FB
                                  • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6C86D921
                                  • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,6CA0971C), ref: 6C86D944
                                  • CreatePatternBrush.GDI32(?), ref: 6C86D956
                                  • DeleteObject.GDI32(?), ref: 6C86D985
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C86D996
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6C86D9DE
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C86DA04
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00EE0086), ref: 6C86DA2C
                                  • FillRect.USER32(?,?,?), ref: 6C86DA8E
                                    • Part of subcall function 6C86EB24: __EH_prolog3.LIBCMT ref: 6C86EB2B
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C86DABC
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 6C86DAD7
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C86DAEE
                                  • DeleteDC.GDI32(00000000), ref: 6C86DB5B
                                  • DeleteDC.GDI32(00000000), ref: 6C86DB77
                                  • DeleteDC.GDI32(00000000), ref: 6C86DB96
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Create$Delete$BitmapCompatible$Object$BrushFillH_prolog3H_prolog3_PatternPixelRect
                                  • String ID:
                                  • API String ID: 308707564-0
                                  • Opcode ID: c7a49ac39cffd2c0f3f1552d2fdb406720fed29e1ad5160485babc33381a3081
                                  • Instruction ID: 34882a1e5e8734575c24fde053ad8b36cd1c97f51a3023eac3ae39a55dbe6246
                                  • Opcode Fuzzy Hash: c7a49ac39cffd2c0f3f1552d2fdb406720fed29e1ad5160485babc33381a3081
                                  • Instruction Fuzzy Hash: 00B10471D01208AFDF218FA5CE84AEEBB79FF08348F608429F515A6A61DB314D46DF60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C87F52F
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C87F577
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6C87F598
                                  • SelectObject.GDI32(?,?), ref: 6C87F5D3
                                  • CreateCompatibleDC.GDI32(?), ref: 6C87F600
                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 6C87F668
                                  • SelectObject.GDI32(?,00000000), ref: 6C87F67F
                                  • SelectObject.GDI32(?,00000000), ref: 6C87F691
                                  • SelectObject.GDI32(?,00000000), ref: 6C87F6A8
                                  • DeleteObject.GDI32(?), ref: 6C87F6B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Select$Create$Compatible$DeleteH_prolog3_Section
                                  • String ID: $(
                                  • API String ID: 1429849173-55695022
                                  • Opcode ID: a2192ac4d2a23a9ad8ebfc057519cfa8aa34bb3e702332a5f9107f1ea50aab1c
                                  • Instruction ID: dd038055d4cdc9eb8edd95a5210f03ad290be73435dfc902b55106c14154bf52
                                  • Opcode Fuzzy Hash: a2192ac4d2a23a9ad8ebfc057519cfa8aa34bb3e702332a5f9107f1ea50aab1c
                                  • Instruction Fuzzy Hash: 80B15C30E00269DFDB25CF25CD44BDEBBB5BF59304F0082EAE549A6651EB309A85CF60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8724A5
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6C8724DD
                                  • CopyRect.USER32(?,?), ref: 6C8724F1
                                  • InflateRect.USER32(?,?,?), ref: 6C872507
                                  • IntersectRect.USER32(?,?,?), ref: 6C872513
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6C87251D
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C872532
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6C87254C
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C872593
                                  • SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6C8725B0
                                  • CopyRect.USER32(?,?), ref: 6C8725BB
                                  • InflateRect.USER32(?,?,?), ref: 6C8725D1
                                  • IntersectRect.USER32(?,?,?), ref: 6C8725DD
                                  • SetRectRgn.GDI32(?,?,?,?,?), ref: 6C8725F2
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6C872603
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C872617
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6C872631
                                    • Part of subcall function 6C8727FA: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C872841
                                    • Part of subcall function 6C8727FA: CreatePatternBrush.GDI32(00000000), ref: 6C87284E
                                    • Part of subcall function 6C8727FA: DeleteObject.GDI32(00000000), ref: 6C87285A
                                  • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C87268F
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E700
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E716
                                    • Part of subcall function 6C86E5F5: SelectClipRgn.GDI32(?,00000000), ref: 6C86E615
                                    • Part of subcall function 6C86E5F5: SelectClipRgn.GDI32(?,00000000), ref: 6C86E62B
                                  • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C8726F2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Create$Select$CombineObject$ClipCopyIndirectInflateIntersect$BitmapBrushDeleteH_prolog3_Pattern
                                  • String ID:
                                  • API String ID: 770706554-0
                                  • Opcode ID: 86708c1fe2df6aa81c5ed3555e6b16e634be278e2d8d2e3bd8e4d55cbd5c2a13
                                  • Instruction ID: 612d18a7ee6431b4e67edb328002702996dbc7ebc987267c45f3d53b4b0a9280
                                  • Opcode Fuzzy Hash: 86708c1fe2df6aa81c5ed3555e6b16e634be278e2d8d2e3bd8e4d55cbd5c2a13
                                  • Instruction Fuzzy Hash: 7E91F471A00219AFCF19DFA8D998DEEBBB9FF48304B144529F506E3650DB34A906DB60
                                  APIs
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C123
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C132
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C141
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C150
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C15F
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C16E
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C17D
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C18C
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C19B
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1AA
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1B9
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1C8
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1D7
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1E6
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C1F5
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C204
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C213
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C222
                                  • CloseThemeData.UXTHEME(00000000), ref: 6C85C231
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CloseDataTheme
                                  • String ID:
                                  • API String ID: 2797872399-0
                                  • Opcode ID: b23303946f6faa62f88af64ad8ffcdc782357f6b8419b4485875bafebdb7ae24
                                  • Instruction ID: 77b8d72320da421b6e22ad64bd3e24bd5d346c777acd0d29178bf77596a6550a
                                  • Opcode Fuzzy Hash: b23303946f6faa62f88af64ad8ffcdc782357f6b8419b4485875bafebdb7ae24
                                  • Instruction Fuzzy Hash: E1316030142B02DFDBB66F59C9087567AB2BF0578EF90591CE0A790CB1C7B5A896DF40
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C86A4F5
                                    • Part of subcall function 6C9432A0: __EH_prolog3.LIBCMT ref: 6C9432A7
                                  • CallNextHookEx.USER32(?,?,?,?), ref: 6C86A52D
                                  • SetWindowLongW.USER32(?,000000FC,6C865D08), ref: 6C86A5D1
                                  • CallNextHookEx.USER32(?,00000003,?,?), ref: 6C86A6E1
                                  • UnhookWindowsHookEx.USER32(?), ref: 6C86A6F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Hook$CallNext$H_prolog3H_prolog3_LongUnhookWindowWindows
                                  • String ID: #32768$AfxOldWndProc423
                                  • API String ID: 1591070667-2141921550
                                  • Opcode ID: 93885008c27b8463edda10ca690b48c352a2a181d653fb3847bb9f3e3e5df6b6
                                  • Instruction ID: 8e7ae902ece32898bffbe1dd49c45d4e41c23fac4158677ec95ea56199e5fae8
                                  • Opcode Fuzzy Hash: 93885008c27b8463edda10ca690b48c352a2a181d653fb3847bb9f3e3e5df6b6
                                  • Instruction Fuzzy Hash: E451E5306002399BCB259F55CD88BEA3B74EF15399F104999F805E7E80DB34DE82DBA5
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C87D7EE
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6C87D82C
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C87D86B
                                  • SelectObject.GDI32(?,00000000), ref: 6C87D88E
                                  • GetObjectW.GDI32(?,00000054,?), ref: 6C87D8DB
                                  • CreateDIBSection.GDI32(?,?), ref: 6C87D93D
                                  • CreateCompatibleDC.GDI32(?), ref: 6C87D977
                                  • SelectObject.GDI32(?,00000000), ref: 6C87D990
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Create$CompatibleSelect$H_prolog3_Section
                                  • String ID: (
                                  • API String ID: 1338481308-3887548279
                                  • Opcode ID: 48b03344b3e3928bc3a5212ce43fae9a4222410b5dd94759062f60e0d305353c
                                  • Instruction ID: 5391eb724803e85c5020741ddf99a7c0eb3cea979c18d34e0fc930f1da4455fe
                                  • Opcode Fuzzy Hash: 48b03344b3e3928bc3a5212ce43fae9a4222410b5dd94759062f60e0d305353c
                                  • Instruction Fuzzy Hash: C7A12A70A00719DFDB65CF24CD84B9AB7B5BF09304F1085AAE85DE7651EB30AA85CF20
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da00c3fd9ce266efc286f3efcb13a08381cd648bb02fb262048e749ab61c0a90
                                  • Instruction ID: 126ac0db38f3d107d29b44f45800b3d47b05719b02c0764462a1a073839fb413
                                  • Opcode Fuzzy Hash: da00c3fd9ce266efc286f3efcb13a08381cd648bb02fb262048e749ab61c0a90
                                  • Instruction Fuzzy Hash: D0B18230B40305AFEB109BA8CD49FAE77B8FF05719F148568BA05EB6D1DBB09945CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86DBAB
                                  • GetSysColor.USER32(00000014), ref: 6C86DBE2
                                    • Part of subcall function 6C86D46D: __EH_prolog3.LIBCMT ref: 6C86D474
                                    • Part of subcall function 6C86D46D: CreateSolidBrush.GDI32(?), ref: 6C86D48F
                                  • GetSysColor.USER32(00000010), ref: 6C86DBF7
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C86DC0B
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C86DC23
                                  • GetObjectW.GDI32(00000004,00000018,?), ref: 6C86DC46
                                  • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6C86DC67
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C86DC88
                                    • Part of subcall function 6C86E681: SelectObject.GDI32(00000048,?), ref: 6C86E68A
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6C86DCD0
                                    • Part of subcall function 6C86E79A: SetBkColor.GDI32(?,?), ref: 6C86E7AF
                                    • Part of subcall function 6C86E79A: SetBkColor.GDI32(?,?), ref: 6C86E7C1
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C86DCF9
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,001100A6), ref: 6C86DD23
                                  • BitBlt.GDI32(?,00000001,00000001,?,?,?,00000000,00000000,00E20746), ref: 6C86DD8E
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00E20746), ref: 6C86DDB7
                                  • DeleteDC.GDI32(00000000), ref: 6C86DE2C
                                  • DeleteDC.GDI32(00000000), ref: 6C86DE4B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Create$Color$BitmapCompatibleDeleteH_prolog3Object$BrushPixelSelectSolid
                                  • String ID:
                                  • API String ID: 2254850417-0
                                  • Opcode ID: dff1c081572b693a67d27fad1c61d7b4ba4f001bd3fc1fe2d6477a9a8dafd82a
                                  • Instruction ID: 3da40c1571ca9dd588c67521a34ab2fbab049613475efff8d787364aec168993
                                  • Opcode Fuzzy Hash: dff1c081572b693a67d27fad1c61d7b4ba4f001bd3fc1fe2d6477a9a8dafd82a
                                  • Instruction Fuzzy Hash: 0D813971E00209BFDF119FE5DE45AEEBB79BF08348F204429F501A69A0DB315A46DB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9AE5B6
                                    • Part of subcall function 6C97D5EB: __EH_prolog3.LIBCMT ref: 6C97D5F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                  • API String ID: 431132790-2110171958
                                  • Opcode ID: 604270da646f23fb405718d37710413467806a0c9d62c8c5f79316a1188f23da
                                  • Instruction ID: 321ec97a7c04c028bf30a6415be1ce7d26b8149f2c45ce5ad6a6dbc329dd8082
                                  • Opcode Fuzzy Hash: 604270da646f23fb405718d37710413467806a0c9d62c8c5f79316a1188f23da
                                  • Instruction Fuzzy Hash: 9661C52194930699EF19D6FC9614BEE37E89F5121CF74086AD810EBEC0EF35C689C2A1
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C8597AB
                                    • Part of subcall function 6C906E53: __EH_prolog3.LIBCMT ref: 6C906E5A
                                  • SendMessageW.USER32(?,00000030,00000001), ref: 6C85985C
                                  • SendMessageW.USER32(?,00000030,00000001), ref: 6C85986E
                                  • SendMessageW.USER32(?,00000030,00000001), ref: 6C859880
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45020), ref: 6C85992B
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45038), ref: 6C85993F
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45054), ref: 6C859953
                                  • SendMessageW.USER32(?,00000180,00000000,6CA4507C), ref: 6C859967
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45038), ref: 6C85997B
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45054), ref: 6C85998F
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45094), ref: 6C8599A3
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45038), ref: 6C8599B7
                                  • SendMessageW.USER32(?,00000180,00000000,6CA45054), ref: 6C8599CB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$EmptyH_prolog3Rect
                                  • String ID:
                                  • API String ID: 3306255916-0
                                  • Opcode ID: 501332e71a98436242e0ae6cfa0dae2ef838f73a5209c8c67b49fd8cf05c90fd
                                  • Instruction ID: 5dd7ab5067a63febe1bde6804f58283920cde78bcb3e2d1d250a18c01c23a873
                                  • Opcode Fuzzy Hash: 501332e71a98436242e0ae6cfa0dae2ef838f73a5209c8c67b49fd8cf05c90fd
                                  • Instruction Fuzzy Hash: 95712831380209BFEB259F64CC45FE9B765FF04754F008624F625AA5D0DBB2B965CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \sx
                                  • API String ID: 0-995570312
                                  • Opcode ID: 9c5166480f8618209a914c7bbe1905be9a2f72197093e62ec5146e4b0fd1f20f
                                  • Instruction ID: a6c6ef724c86bc481c49f9739eddfe5155a4394242728bd6535dcb53012a215e
                                  • Opcode Fuzzy Hash: 9c5166480f8618209a914c7bbe1905be9a2f72197093e62ec5146e4b0fd1f20f
                                  • Instruction Fuzzy Hash: 0202E235A00619DFCB15CF5ACA90D9EB7B6FF4A318B148958E901EBB11D731AD42CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C91D89E
                                  • IsRectEmpty.USER32(?), ref: 6C91D8C4
                                  • CreateCompatibleDC.GDI32(?), ref: 6C91D99D
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91D9E5
                                  • SelectObject.GDI32(?,00000000), ref: 6C91DA44
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6C91DA7E
                                  • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C91DC56
                                  • CreateCompatibleBitmap.GDI32(?,00000075,?), ref: 6C91DC75
                                    • Part of subcall function 6C91DD88: DrawStateW.USER32(00000001,?,00000000,00000001,00000000,?,?,?,?,?), ref: 6C91DDC6
                                  • BitBlt.GDI32(?,00000000,00000000,00000074,?,?,?,?,00CC0020), ref: 6C91DCC4
                                  • CreateCompatibleBitmap.GDI32(?,?,00000075), ref: 6C91DCE3
                                  • BitBlt.GDI32(?,00000000,00000000,?,00000074,?,?,?,00CC0020), ref: 6C91DD35
                                  • DeleteObject.GDI32(?), ref: 6C91DD4C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreate$Bitmap$Object$DeleteDrawEmptyH_prolog3RectSelectState
                                  • String ID:
                                  • API String ID: 1489821248-0
                                  • Opcode ID: 37c58a3e80bf52add6fb5e67893a5a5498e7aa7273a6f389d572e8d71099ca76
                                  • Instruction ID: 20a353974cc2bc15a722af8a6efefbec4165a6f8ef16105df7a6632819f74762
                                  • Opcode Fuzzy Hash: 37c58a3e80bf52add6fb5e67893a5a5498e7aa7273a6f389d572e8d71099ca76
                                  • Instruction Fuzzy Hash: 8F02E375A04219AFCF05CFA9C985AEEBBB6FF48304F148519F819A7B50D731E941CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C863CF5
                                  • IsWindowVisible.USER32(?), ref: 6C863D4E
                                  • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 6C863D80
                                  • CreateRectRgn.GDI32(00000000,00000000,00000005,00000005), ref: 6C863D9F
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6C863DB9
                                  • CreateEllipticRgn.GDI32(00000000,00000000,0000000B,0000000B), ref: 6C863DCD
                                  • CombineRgn.GDI32(?,?,?,00000002), ref: 6C863DE7
                                  • CreateRectRgn.GDI32(?,00000000,?,00000005), ref: 6C863E00
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6C863E1A
                                  • CreateEllipticRgn.GDI32(?,00000000,?,0000000B), ref: 6C863E36
                                  • CombineRgn.GDI32(?,?,?,00000002), ref: 6C863E50
                                  • SetWindowRgn.USER32(?,00000000,00000001), ref: 6C863E64
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Create$Combine$Rect$EllipticWindow$H_prolog3Visible
                                  • String ID:
                                  • API String ID: 1706452674-0
                                  • Opcode ID: e6da08b273c09b104277ea0402d77cf8f6f23bc804b98a5126d832e849044eb9
                                  • Instruction ID: 26c0dd58a0d1cd286907fc5819a0e0b131b5ef12b46ee519d1b46afd0a608a3b
                                  • Opcode Fuzzy Hash: e6da08b273c09b104277ea0402d77cf8f6f23bc804b98a5126d832e849044eb9
                                  • Instruction Fuzzy Hash: 5E416471A0020AABDF259FA5CD45AFF7B79BF04349F104829B212A6990DF358E47CB61
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C913484
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6C9134DD
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6C9134EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Invalidate$Empty
                                  • String ID: \sx
                                  • API String ID: 1126320529-995570312
                                  • Opcode ID: cc437e9712c62571898c1e508845c8189928833f14138d4c94e36d799c71a0dc
                                  • Instruction ID: dd845e6cb066fa7b83988a6d7720f1ddf5bd4ef55158e933cf19093a18afecf2
                                  • Opcode Fuzzy Hash: cc437e9712c62571898c1e508845c8189928833f14138d4c94e36d799c71a0dc
                                  • Instruction Fuzzy Hash: A2714831B00619DFDF05CF64C885AAE7BB9FF49314F154069E815AB690CB74AA42CFA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C91BB10
                                  • GetObjectW.GDI32(00000008,00000018,00000000), ref: 6C91BB27
                                    • Part of subcall function 6C91BA66: CreateDIBSection.GDI32(00000000,00000028,00000000,?,00000000,00000000), ref: 6C91BADD
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91BBA7
                                  • SelectObject.GDI32(?,00000008), ref: 6C91BBBA
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91BBD8
                                  • SelectObject.GDI32(00000000,?), ref: 6C91BBED
                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00CC0020), ref: 6C91BC0C
                                  • SelectObject.GDI32(00000000,00000000), ref: 6C91BC1A
                                  • SelectObject.GDI32(?,00000000), ref: 6C91BC24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Select$Create$Compatible$H_prolog3Section
                                  • String ID:
                                  • API String ID: 2431383920-3916222277
                                  • Opcode ID: 18a75bdea6843399169fc965ce80171d1c939442168ca07975e1b0c810e92635
                                  • Instruction ID: 6987af731a61886b9bb791866d5d72e996374a58798adadd9bf9c9428ed5a555
                                  • Opcode Fuzzy Hash: 18a75bdea6843399169fc965ce80171d1c939442168ca07975e1b0c810e92635
                                  • Instruction Fuzzy Hash: 3941A5B2E002199FDB11CFE9CC45AEE7B7AEF55308F108529F511A6B50DF318A06CBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C866E5A
                                  • SendMessageW.USER32(?,00000000,00000000,00000080), ref: 6C866EA1
                                  • SendMessageW.USER32(?,00000000,00000000,?), ref: 6C866ECD
                                  • ValidateRect.USER32(?,00000000), ref: 6C866EE0
                                    • Part of subcall function 6C943A48: GetClientRect.USER32(?,?), ref: 6C943AAC
                                  • GetClientRect.USER32(?,?), ref: 6C866F51
                                  • BeginPaint.USER32(?,?), ref: 6C866F5E
                                  • SendMessageW.USER32(?,00000000,00000000,?), ref: 6C866F94
                                  • SendMessageW.USER32(?,00000000,00000000), ref: 6C866FB6
                                  • EndPaint.USER32(?,?), ref: 6C866FCE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$Rect$ClientPaint$BeginH_prolog3_Validate
                                  • String ID: W
                                  • API String ID: 3883544035-655174618
                                  • Opcode ID: 3192660cd01a0f4ce1a776594a5d70143a68a393f7dca7947bdc84c397e9ca45
                                  • Instruction ID: 0df37d56c2d171fd2036b224d91664d59e6b65745cec46b56b21cf2e30b4adab
                                  • Opcode Fuzzy Hash: 3192660cd01a0f4ce1a776594a5d70143a68a393f7dca7947bdc84c397e9ca45
                                  • Instruction Fuzzy Hash: 1E419F71A00746ABCF259F72C944EAEBAB6FB98308F10892EE055D2E60DB31D945CB50
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 6C943BB7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Initialize
                                  • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                  • API String ID: 2538663250-1403614551
                                  • Opcode ID: d512416a57fd8b50861e27f140873a135882355db45e13fd08ebd5f8438818eb
                                  • Instruction ID: 350cd12ebd28e6707787f172685aa0a46830cd34c958d1c174c2d4eec5dd118b
                                  • Opcode Fuzzy Hash: d512416a57fd8b50861e27f140873a135882355db45e13fd08ebd5f8438818eb
                                  • Instruction Fuzzy Hash: F421B27135470AAFE7249F75CC88B1776B9FB4125AF14CA2DE852C2D40EB34D4468B30
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84CC37
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C84CD76
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84CE0B
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84CE25
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84CE2A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84CE2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_taskstd::_$Lockit$Locinfo::_Locinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name$false$true
                                  • API String ID: 2199893758-1062449267
                                  • Opcode ID: 4c6992e001ca187adf0ab7db7efaf5d97c5099014e8c32e28f42064f67c38811
                                  • Instruction ID: 4b6f6fc9768221a47b82df1a2c8a243861200fa054f01103f499e8a2c385e62e
                                  • Opcode Fuzzy Hash: 4c6992e001ca187adf0ab7db7efaf5d97c5099014e8c32e28f42064f67c38811
                                  • Instruction Fuzzy Hash: 317173B0D017589EEB20DFA5C54478EBBF8AF25308F208919D815EBB81E775D509CB92
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85CD98
                                  • GetCurrentThemeName.UXTHEME(?,000000FF,?,000000FF,00000000,00000000), ref: 6C85CDEE
                                  • GetThemeColor.UXTHEME(00000000,00000001,00000000,00000EEF,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 6C85CEB8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Theme$ColorCurrentH_prolog3_Name
                                  • String ID: Aero$Luna$homestead$metallic$normalcolor$royale
                                  • API String ID: 2781885202-2881773410
                                  • Opcode ID: d947c360cc76944a05396cfe71313263f251fe704d2a2932fb19d5f30bd3e186
                                  • Instruction ID: 604a40fbca6a271726875bef725c19be4f30a15637d3d0041f2d172d1612c336
                                  • Opcode Fuzzy Hash: d947c360cc76944a05396cfe71313263f251fe704d2a2932fb19d5f30bd3e186
                                  • Instruction Fuzzy Hash: 5D51F97150112C5ADB34DB25CD04FDB7779AF14358F4409EAA408A3981EFB19BE4CEA8
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6C869913
                                  • BeginDeferWindowPos.USER32(00000008), ref: 6C869929
                                  • GetTopWindow.USER32(?), ref: 6C86993A
                                  • GetDlgCtrlID.USER32(00000000), ref: 6C869943
                                  • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 6C86997B
                                  • GetWindow.USER32(00000000,00000002), ref: 6C869984
                                  • CopyRect.USER32(?,?), ref: 6C86999F
                                  • EndDeferWindowPos.USER32(00000000), ref: 6C869A2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                  • String ID: \sx
                                  • API String ID: 1228040700-995570312
                                  • Opcode ID: 1a2780e0b6ebc7fd3bcabe76bbd71228ff0465f82f97b344dda028e01d1e7aac
                                  • Instruction ID: 580212abcb9af0a515b5d28f0a2075a7a45d7758442b2334a73ae368a23fa025
                                  • Opcode Fuzzy Hash: 1a2780e0b6ebc7fd3bcabe76bbd71228ff0465f82f97b344dda028e01d1e7aac
                                  • Instruction Fuzzy Hash: 19512B31A01209DFCF24DFA9C984BDEB7B5FF49359F148859E816EB680C734A941CB60
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C86A393
                                  • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C86A3AA
                                  • CallWindowProcW.USER32(?,?,00000110,?,?), ref: 6C86A40A
                                    • Part of subcall function 6C86A8C0: GetWindowRect.USER32(?,00000000), ref: 6C86A8F9
                                    • Part of subcall function 6C86A8C0: GetWindow.USER32(?,00000004), ref: 6C86A916
                                  • SetWindowLongW.USER32(?,000000FC,?), ref: 6C86A42D
                                  • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6C86A439
                                  • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6C86A444
                                  • GlobalDeleteAtom.KERNEL32(?), ref: 6C86A44E
                                    • Part of subcall function 6C86A963: GetWindowRect.USER32(?,?), ref: 6C86A970
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 6C86A496
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prolog3_catch_LongRemove
                                  • String ID: AfxOldWndProc423
                                  • API String ID: 3351853316-1060338832
                                  • Opcode ID: edc734f137f34c5f0a80fad5ebadd790484e972e27c9b9dd673ade582fb78134
                                  • Instruction ID: 873c28ad97162009de8be1cafdd790891b9d5523adb37f24211c8a4116c0bc65
                                  • Opcode Fuzzy Hash: edc734f137f34c5f0a80fad5ebadd790484e972e27c9b9dd673ade582fb78134
                                  • Instruction Fuzzy Hash: 6E31C471A00218BBCB159FBACE4CDEF7B79EF4A354F104919F502A6E40DB3099428B74
                                  APIs
                                  • GetStockObject.GDI32(00000011), ref: 6C996348
                                  • GetStockObject.GDI32(0000000D), ref: 6C996354
                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C996365
                                  • GetDC.USER32(00000000), ref: 6C996374
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C99638B
                                  • MulDiv.KERNEL32(?,00000048,00000000), ref: 6C996397
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6C9963A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Stock$CapsDeviceRelease
                                  • String ID: System$\sx
                                  • API String ID: 46613423-1992837229
                                  • Opcode ID: 29bee4f756d3bcc5d9bb400caab5f01d2e61e134c35304046a263d1e18a3adff
                                  • Instruction ID: 5ff88b3f10ae4cafbe42443c525758bb4b6d4d4281534af18ff6e3424cd8296b
                                  • Opcode Fuzzy Hash: 29bee4f756d3bcc5d9bb400caab5f01d2e61e134c35304046a263d1e18a3adff
                                  • Instruction Fuzzy Hash: F6118E71700319ABEF089F65CC4AFAE7BB9EB45749F08411DF606DB680DB70D906D6A0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8807B6
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6C8807DB
                                  • GetObjectW.GDI32(?,00000054,?), ref: 6C880820
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C88090C
                                  • SelectObject.GDI32(?,?), ref: 6C88092E
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6C88098D
                                  • GetPixel.GDI32(?,?,00000000), ref: 6C88099F
                                  • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 6C8809AE
                                  • SetPixel.GDI32(?,?,00000000,00000000), ref: 6C8809C0
                                  • SelectObject.GDI32(?,00000000), ref: 6C880A0E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                                  • String ID:
                                  • API String ID: 1266819874-0
                                  • Opcode ID: b9871c87e95372897d1cb591afebe8e470ef57a003627043866fe7efca3b01ca
                                  • Instruction ID: 0f57422862d0937bb0d9a423b80748c305ba7d8a1189689d13985d8a3ac5748e
                                  • Opcode Fuzzy Hash: b9871c87e95372897d1cb591afebe8e470ef57a003627043866fe7efca3b01ca
                                  • Instruction Fuzzy Hash: AB812B71E012298FDB24CFA9CD84A9DBBB5BF49344F14856AE848E7B41DB309D86CF50
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C871B15
                                  • GetMenuItemCount.USER32(?), ref: 6C871B41
                                  • GetSubMenu.USER32(?,00000000), ref: 6C871B77
                                  • GetMenuState.USER32(?,?,00000400), ref: 6C871B94
                                  • GetSubMenu.USER32(?,00000000), ref: 6C871BF1
                                  • GetMenuStringW.USER32(?,?,?,00000100,00000400), ref: 6C871C1A
                                  • AppendMenuW.USER32(00000000,00000010,00000000,?), ref: 6C871CA2
                                  • GetMenuItemCount.USER32(00000000), ref: 6C871D12
                                  • InsertMenuW.USER32(?,00000000,?,00000000), ref: 6C871D3F
                                  • GetMenuItemID.USER32(?,?), ref: 6C871D70
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$Item$Count$AppendH_prolog3_InsertStateString
                                  • String ID:
                                  • API String ID: 2171526683-0
                                  • Opcode ID: d4630fce19b5ca1c8fa7522e3bba716df003b9ff79af3edb249f88deb50a3bf7
                                  • Instruction ID: 2eed30c6f139f222b1cfc16c04e84f6fb9ae6c97d6dadf200d634295ec18af27
                                  • Opcode Fuzzy Hash: d4630fce19b5ca1c8fa7522e3bba716df003b9ff79af3edb249f88deb50a3bf7
                                  • Instruction Fuzzy Hash: 4B612871A4122DABDF34DF55CE98BDDB7B4BB18305F1044E9E409A6650EB309E82CF60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8DF70E
                                  • SetRectEmpty.USER32(00000001), ref: 6C8DF74E
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8DF8EE
                                  • GetClientRect.USER32(?,0000E801), ref: 6C8DF926
                                  • SelectObject.GDI32(00000001,00000000), ref: 6C8DF962
                                  • SelectObject.GDI32(00000001,?), ref: 6C8DFA10
                                  • IsRectEmpty.USER32(?), ref: 6C8DFA1D
                                    • Part of subcall function 6C8673EC: GetParent.USER32(8D6CA331), ref: 6C867418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$EmptyH_prolog3_ObjectSelect$ClientLongParentWindow
                                  • String ID: Afx:StatusBar
                                  • API String ID: 2548710182-3033333705
                                  • Opcode ID: f35ef4d30443853b76e4f3c38a75ae4cde9e6bce1b691efe2373996e0f2f6b53
                                  • Instruction ID: 9969f1ab18f3eb7ae9d67067103f81cccaa4584df8b8531a2112168fbde6ef65
                                  • Opcode Fuzzy Hash: f35ef4d30443853b76e4f3c38a75ae4cde9e6bce1b691efe2373996e0f2f6b53
                                  • Instruction Fuzzy Hash: 75A10731B002299FCF249B78CE14AEE77B9BF59358B114929E805E7B40DF34A941DBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C85EEE1
                                  • GetParent.USER32(?), ref: 6C85EEF5
                                    • Part of subcall function 6C86C235: GetWindowLongW.USER32(00076850,000000EC), ref: 6C86C242
                                    • Part of subcall function 6C915480: __EH_prolog3.LIBCMT ref: 6C915487
                                    • Part of subcall function 6C915480: SendMessageW.USER32(00000000,0000007F,00000000,00000000), ref: 6C9154AA
                                    • Part of subcall function 6C915480: SendMessageW.USER32(00000000,0000007F,00000001,00000000), ref: 6C9154BE
                                    • Part of subcall function 6C915480: GetClassLongW.USER32(00000000,000000DE), ref: 6C91551B
                                    • Part of subcall function 6C915480: GetClassLongW.USER32(00000000,000000F2), ref: 6C91552C
                                  • GetSystemMetrics.USER32(00000032), ref: 6C85EF3E
                                  • GetSystemMetrics.USER32(00000031), ref: 6C85EF49
                                  • GetSystemMetrics.USER32(00000004), ref: 6C85EF5A
                                  • GetSystemMetrics.USER32(00000004), ref: 6C85EF66
                                  • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 6C85EFC3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$Long$ClassH_prolog3MessageSend$DrawIconParentWindow
                                  • String ID: \sx
                                  • API String ID: 1977492230-995570312
                                  • Opcode ID: 82984403ec9df882fdef6bb972aae89fd716c72f7dfe5c714fc51846f039e3e8
                                  • Instruction ID: b95ccaba9d482a405304b7ecadb983239195bd0a17e95f29efaab61d212e3c38
                                  • Opcode Fuzzy Hash: 82984403ec9df882fdef6bb972aae89fd716c72f7dfe5c714fc51846f039e3e8
                                  • Instruction Fuzzy Hash: 70B19F71B0021A9FCF15CFA8C944AEEBBB6BF48314F54452AE805F7780DB74A946CB90
                                  APIs
                                    • Part of subcall function 6C87F4E1: GdipGetImagePixelFormat.GDIPLUS(?,6CA73BD8,00000000,00000000,?,6C87DE79,78E4735C,?,00000000,6CA73BD8), ref: 6C87F4EF
                                    • Part of subcall function 6C87F499: GdipGetImagePalette.GDIPLUS(?,00000000,?,?,?,6C87DF98,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,78E4735C), ref: 6C87F4A8
                                  • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,78E4735C,?,00000000,6CA73BD8), ref: 6C87E08D
                                  • GdipBitmapUnlockBits.GDIPLUS(?,?,?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,78E4735C,?,00000000), ref: 6C87E13D
                                  • GdipDrawImageI.GDIPLUS(?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6C87E18F
                                  • GdipDeleteGraphics.GDIPLUS(?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000), ref: 6C87E19A
                                  • GdipDisposeImage.GDIPLUS(?,?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000), ref: 6C87E1A5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Gdip$Image$BitmapBits$DeleteDisposeDrawFormatGraphicsLockPalettePixelUnlock
                                  • String ID: &$ &$\sx
                                  • API String ID: 1665940520-1779867131
                                  • Opcode ID: d3a09ee9073008bc8cafdcd49d83990dfdc15e784afdb087ff4dfd6ced477f4f
                                  • Instruction ID: e0a92f4a35422e3d9bb70c2ef24874711770ffad8382148e5fa7f07955c95298
                                  • Opcode Fuzzy Hash: d3a09ee9073008bc8cafdcd49d83990dfdc15e784afdb087ff4dfd6ced477f4f
                                  • Instruction Fuzzy Hash: 2DA17DB1A005299FCB34CF14CD80AEDB7B9EF84318F1545A9EA09A7701D7309E85CFA9
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8F5119
                                  • GetModuleFileNameW.KERNEL32(?,00000000,00000104,00000104,0000002C,6C858790,?,6CA42F78,00000000,00000000,00000001,00000003,00000000,00000000,00000001,?), ref: 6C8F5151
                                  • LoadTypeLib.OLEAUT32(?,?), ref: 6C8F51C3
                                  • GetModuleHandleW.KERNEL32(OLEAUT32.DLL,00000000,?,?,?,?,00000001), ref: 6C8F524B
                                  • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 6C8F525B
                                  • RegisterTypeLib.OLEAUT32 ref: 6C8F527E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ModuleType$AddressFileH_prolog3_HandleLoadNameProcRegister
                                  • String ID: OLEAUT32.DLL$RegisterTypeLibForUser
                                  • API String ID: 866051225-2666564778
                                  • Opcode ID: 131164aa8a9cade682a9d5acd8a401f050b58941e0798100a5c8b723394df30a
                                  • Instruction ID: 3974a2635cc9f336c2b37f363a1dc4b52791f16bc06fa63e640d0375fff37c2b
                                  • Opcode Fuzzy Hash: 131164aa8a9cade682a9d5acd8a401f050b58941e0798100a5c8b723394df30a
                                  • Instruction Fuzzy Hash: 08519231A002099FDF15DFA8CD549DE7BB5BF09358F148559E811B7790DB31AE0ACB60
                                  APIs
                                  • GetModuleHandleW.KERNEL32(comctl32.dll,6C9AECF3,00000000,00000000,00000000,?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000), ref: 6C9AEBE1
                                  • GetUserDefaultUILanguage.KERNEL32(?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000,00000000,00000000,?,6C9466FC,00000000), ref: 6C9AEBF1
                                  • FindResourceExW.KERNEL32(00000000,00000005,000003EE,0000FC11,?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000,00000000), ref: 6C9AEC2F
                                  • FindResourceW.KERNEL32(00000000,000003EE,00000005,?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000,00000000,00000000), ref: 6C9AEC4E
                                  • LoadResource.KERNEL32(00000000,00000000,?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000,00000000,00000000), ref: 6C9AEC5A
                                    • Part of subcall function 6C9AED31: GetDC.USER32(00000000), ref: 6C9AED84
                                    • Part of subcall function 6C9AED31: EnumFontFamiliesExW.GDI32(00000000,?,6C9AED1B,?,00000000,?,?,?,?,?,00000000,00000000), ref: 6C9AED9F
                                    • Part of subcall function 6C9AED31: ReleaseDC.USER32(00000000,00000000), ref: 6C9AEDA7
                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,6C947A34,00000000,00000000,6C9466FC,0000001C,6C94782A,?,6C9466FC,?,00000000,00000000,00000000), ref: 6C9AEC8A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$Find$AllocDefaultEnumFamiliesFontGlobalHandleLanguageLoadModuleReleaseUser
                                  • String ID: MS UI Gothic$comctl32.dll
                                  • API String ID: 1606157363-3248924666
                                  • Opcode ID: b80986332352ec4578a07ab796e6910f34655f2b470e6e22ea8d8dc53197586f
                                  • Instruction ID: 35394b8e4a9b9712b7357b598f951914bf08c6e2cf43c1bdc822feba1ae55230
                                  • Opcode Fuzzy Hash: b80986332352ec4578a07ab796e6910f34655f2b470e6e22ea8d8dc53197586f
                                  • Instruction Fuzzy Hash: 2241D471300606ABEB155BA9CD49B7B73BCEF45758F10843DF929CBA80EB70D85287A1
                                  APIs
                                  • MonitorFromPoint.USER32(80004005,80004005,00000002), ref: 6C8EBD75
                                  • GetMonitorInfoW.USER32(00000000), ref: 6C8EBD7C
                                  • CopyRect.USER32(6C854E9D,?), ref: 6C8EBD8E
                                  • SystemParametersInfoW.USER32(00000030,00000000,6C854E9D,00000000), ref: 6C8EBDA0
                                  • IntersectRect.USER32(6C8A9624,6C854E9D,80004005), ref: 6C8EBDD3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InfoMonitorRect$CopyFromIntersectParametersPointSystem
                                  • String ID: ($4(@P$\sx
                                  • API String ID: 2931574886-64240450
                                  • Opcode ID: ab5e388d842f0ea3242d2c688314f6ab26fa770d99f456b87f53ae80978610bb
                                  • Instruction ID: 58267dc453c96091fe0c60e5f4489ae1bc1d47f63f70f333f5d0298ad58a8e6c
                                  • Opcode Fuzzy Hash: ab5e388d842f0ea3242d2c688314f6ab26fa770d99f456b87f53ae80978610bb
                                  • Instruction Fuzzy Hash: F9510771A0160ADFCB14CFA9CA48AEEBBF4FF09309F10456AE515E7650D730EA45CBA4
                                  APIs
                                    • Part of subcall function 6C872A4A: GetParent.USER32(?), ref: 6C872AA7
                                    • Part of subcall function 6C872A4A: GetLastActivePopup.USER32(?), ref: 6C872ABA
                                    • Part of subcall function 6C872A4A: IsWindowEnabled.USER32(?), ref: 6C872ACE
                                    • Part of subcall function 6C872A4A: EnableWindow.USER32(?,00000000), ref: 6C872AE1
                                  • EnableWindow.USER32(?,00000001), ref: 6C872B40
                                  • GetWindowThreadProcessId.USER32(?,?), ref: 6C872B56
                                  • GetCurrentProcessId.KERNEL32 ref: 6C872B60
                                  • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6C872B76
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 6C872C01
                                  • MessageBoxW.USER32(?,?,?,6C8421AE), ref: 6C872C23
                                  • EnableWindow.USER32(00000000,00000001), ref: 6C872C48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Enable$MessageProcess$ActiveCurrentEnabledFileLastModuleNameParentPopupSendThread
                                  • String ID: \sx
                                  • API String ID: 1924968399-995570312
                                  • Opcode ID: cf81ceace5d1d9603eb9a18d589874270c59f1e197a0d66852bc4ee43eb91860
                                  • Instruction ID: 642d48de989da0f6ee086a76c4af34a0ae114f0dad48a0cccc6137c5170d9e12
                                  • Opcode Fuzzy Hash: cf81ceace5d1d9603eb9a18d589874270c59f1e197a0d66852bc4ee43eb91860
                                  • Instruction Fuzzy Hash: C341A371A4121EEBDB309F28CD8CBED77B4EB54348F1049A9E519E7640E7748E818BA0
                                  APIs
                                  • RealChildWindowFromPoint.USER32(?,?,?), ref: 6C945CC6
                                  • ClientToScreen.USER32(?,?), ref: 6C945CE0
                                  • GetWindow.USER32(?,00000005), ref: 6C945D32
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$ChildClientFromPointRealScreen
                                  • String ID: \sx
                                  • API String ID: 2518355518-995570312
                                  • Opcode ID: 92f0bf2af0684122c18d12163af738377b9931f28e7ca4c7fe6776e2cf6054a5
                                  • Instruction ID: e9c8d457f36d4a8fdd1e558b365fd0f32a3c33f7a0cb7a17a136ec68dff65256
                                  • Opcode Fuzzy Hash: 92f0bf2af0684122c18d12163af738377b9931f28e7ca4c7fe6776e2cf6054a5
                                  • Instruction Fuzzy Hash: 4B115E31B0161AABCB059FA88848AEF77B9EF4A245F118519F412E3140DB30DA46CBA4
                                  APIs
                                  • GetParent.USER32(?), ref: 6C865C30
                                  • GetWindowRect.USER32(?,?), ref: 6C865C4E
                                  • ScreenToClient.USER32(?,?), ref: 6C865C5B
                                  • ScreenToClient.USER32(?,?), ref: 6C865C68
                                  • EqualRect.USER32(?,?), ref: 6C865C73
                                  • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 6C865C9A
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 6C865CA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$ClientRectScreen$DeferEqualParent
                                  • String ID: \sx
                                  • API String ID: 443303494-995570312
                                  • Opcode ID: c2aa81a6324a6578902ed1c53a27b9025eef1f5fc16c2eafa1fe6768d84cae5a
                                  • Instruction ID: 2b976e9e87317ad2e8fc3e899c58ff298c7f9d7ea317c99c7b6ba65b7f58a90d
                                  • Opcode Fuzzy Hash: c2aa81a6324a6578902ed1c53a27b9025eef1f5fc16c2eafa1fe6768d84cae5a
                                  • Instruction Fuzzy Hash: 7C218131A0020AEFCF04DFA5CD88EAEBBB8FF09349F11855AE901EA105D7309942CB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$ActiveFocus$MessageSend
                                  • String ID: u
                                  • API String ID: 1556911595-4067256894
                                  • Opcode ID: 448d575fccd0d5f03f2df93ef30a0c906f8b4aebb43a3de04d8432a5cf8afba0
                                  • Instruction ID: 002a27cfa583310fb1c093f366e7c04cbd54679e328b02ed245d0c2f8bfef30d
                                  • Opcode Fuzzy Hash: 448d575fccd0d5f03f2df93ef30a0c906f8b4aebb43a3de04d8432a5cf8afba0
                                  • Instruction Fuzzy Hash: 6311B632701315ABDB221A7ACE08A6D3664EB45389B10CE24F616C5F59C778C846C7E4
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9AD5CA
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DA5
                                    • Part of subcall function 6C945D74: InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DBB
                                    • Part of subcall function 6C945D74: LeaveCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DC9
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(00000000,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945DD6
                                  • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 6C9AD615
                                  • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 6C9AD628
                                  • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 6C9AD63B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                                  • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$windows
                                  • API String ID: 4229786687-1024936294
                                  • Opcode ID: 4935c2917f01ccc6c6f1b2cb92acf0c7602b1df877b8343fb8ec3176dc9ed633
                                  • Instruction ID: 6f42b65c3cd35c4478d3ce8336898186a8657238633198f3fa3b17a22f9408fb
                                  • Opcode Fuzzy Hash: 4935c2917f01ccc6c6f1b2cb92acf0c7602b1df877b8343fb8ec3176dc9ed633
                                  • Instruction Fuzzy Hash: 260175B0B40311AFDB15CFA48D0970976F0BF15B04F409A2DF108E6B80D7708087CB65
                                  APIs
                                  • GdipDrawImageRectI.GDIPLUS(?,00000000,?,?,?,?,00000000,?,6C8747B2,?,?,?,?,?,?,?), ref: 6C8747F2
                                  • GetWindowRect.USER32(?,?), ref: 6C874866
                                  • OffsetRect.USER32(?,?,?), ref: 6C87487C
                                    • Part of subcall function 6C86D4B1: __EH_prolog3.LIBCMT ref: 6C86D4B8
                                    • Part of subcall function 6C86D4B1: GetDC.USER32(00000000), ref: 6C86D4E4
                                  • CreateCompatibleDC.GDI32(?), ref: 6C8748EF
                                  • SelectObject.GDI32(?,?), ref: 6C87490F
                                  • SelectObject.GDI32(?,?), ref: 6C874961
                                  • CreateCompatibleDC.GDI32(?), ref: 6C874AA5
                                  • SelectObject.GDI32(?,00000000), ref: 6C874AC6
                                  • SelectObject.GDI32(?,00000000), ref: 6C874AF7
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$Rect$CompatibleCreate$DrawGdipH_prolog3ImageOffsetWindow
                                  • String ID:
                                  • API String ID: 4105739581-0
                                  • Opcode ID: cc03ed595162965a5b9fdf29b7cbbca8e1fe1c91d1f79c5b01940030f10b61f8
                                  • Instruction ID: 12de50fc1fc6e2e9f757a8f5d169cbbd7da3b85c6a3a65fd0c8a0f08c9e0c8ef
                                  • Opcode Fuzzy Hash: cc03ed595162965a5b9fdf29b7cbbca8e1fe1c91d1f79c5b01940030f10b61f8
                                  • Instruction Fuzzy Hash: F2B15D31A00219DFCF25CFA8CA44BEDBBB5BF85344F108659E906B7651EB306A56CF60
                                  APIs
                                  • FindResourceW.KERNEL32(?,00000000,00000005,00000024,6C8A9EB0,?,?,00000170,80004005,80004005,54000000,?,000000DD,000000FF,00000001), ref: 6C8FA078
                                  • LoadResource.KERNEL32(?,00000000,?,?,00000170,80004005,80004005,54000000,?,000000DD,000000FF,00000001,?,?), ref: 6C8FA084
                                  • LockResource.KERNEL32(0000007E,00000024,6C8A9EB0,?,?,00000170,80004005,80004005,54000000,?,000000DD,000000FF,00000001,?,?), ref: 6C8FA094
                                  • GetDesktopWindow.USER32 ref: 6C8FA0CB
                                  • IsWindowEnabled.USER32(00000000), ref: 6C8FA0D6
                                  • EnableWindow.USER32(00000000,00000000), ref: 6C8FA0E2
                                  • EnableWindow.USER32(00000000,00000001), ref: 6C8FA1C6
                                  • GetActiveWindow.USER32 ref: 6C8FA1D0
                                  • SetActiveWindow.USER32(00000000,?,00000024,6C8A9EB0,?,?,00000170), ref: 6C8FA1DC
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindLoadLock
                                  • String ID:
                                  • API String ID: 2497874451-0
                                  • Opcode ID: f776dccefec41423ed08f4c6940b157a4afa65700085bbd6133f68d15a52b076
                                  • Instruction ID: 68a318447df7c2493f552b4380ee2ba6f9de8f36e4a3b81dd7bc0ed584feb600
                                  • Opcode Fuzzy Hash: f776dccefec41423ed08f4c6940b157a4afa65700085bbd6133f68d15a52b076
                                  • Instruction Fuzzy Hash: 6C519230B013169BDF259F65CA847EEB774BF083A9F114429D922A7781DB349843CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C871D8B
                                  • GetMenuItemCount.USER32(?), ref: 6C871DD1
                                  • GetMenuItemCount.USER32(6C9AE061), ref: 6C871DDD
                                  • GetSubMenu.USER32(6C9AE061,-00000001), ref: 6C871DF4
                                  • GetMenuItemCount.USER32(00000000), ref: 6C871E07
                                  • GetSubMenu.USER32(00000000,00000000), ref: 6C871E18
                                  • RemoveMenu.USER32(00000000,00000000,00000400,?,?,?,?,?,6CA567DC,0000000C,00000004,6C841EF8,6C9AE061,?,6C842BB6,80004005), ref: 6C871E32
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$CountItem$H_prolog3Remove
                                  • String ID:
                                  • API String ID: 3061525546-0
                                  • Opcode ID: cc3356f6f3a0e73aaf983aa4dd643af16524a648332db0ff76cb07aeb5b5f294
                                  • Instruction ID: b39002899205acc1e00e93ab6cd6bcf298b4471611712fc5d78db91b7884e5fe
                                  • Opcode Fuzzy Hash: cc3356f6f3a0e73aaf983aa4dd643af16524a648332db0ff76cb07aeb5b5f294
                                  • Instruction Fuzzy Hash: 1121A272A01249EBDF308F68CE58A9F7FB9FF41349F104969F419D6940EB30D646CA60
                                  APIs
                                  • FillRect.USER32(56010845,?,?), ref: 6C91FDD3
                                  • FillRect.USER32(?,?,?), ref: 6C91FE3A
                                  • FillRect.USER32(?,?,?), ref: 6C91FEDD
                                    • Part of subcall function 6C86D46D: __EH_prolog3.LIBCMT ref: 6C86D474
                                    • Part of subcall function 6C86D46D: CreateSolidBrush.GDI32(?), ref: 6C86D48F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FillRect$BrushCreateH_prolog3Solid
                                  • String ID: \sx
                                  • API String ID: 1242064992-995570312
                                  • Opcode ID: 7b1cf1eeb735dddb9da5cf66f004eae4a09aa8d600ab9def9c34697a1364f2b2
                                  • Instruction ID: b302d70b8a81450cce55d988b5bb95dac1fed4fea86f8bdc55b3c87deca7c48f
                                  • Opcode Fuzzy Hash: 7b1cf1eeb735dddb9da5cf66f004eae4a09aa8d600ab9def9c34697a1364f2b2
                                  • Instruction Fuzzy Hash: E9A15171A0011ADFCF08CF98C9959EEBBB6FF44304F14812EE906AB694D775E949CB90
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 6C8E9DC4
                                  • IsWindowVisible.USER32(?), ref: 6C8E9DD7
                                  • GetWindowRect.USER32(?,?), ref: 6C8E9E38
                                  • IsZoomed.USER32(?), ref: 6C8E9E47
                                  • SetWindowRgn.USER32(?,00000000,00000001), ref: 6C8E9EB9
                                  • GetSystemMetrics.USER32(00000004), ref: 6C8E9F3B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Visible$MetricsRectSystemZoomed
                                  • String ID: \sx
                                  • API String ID: 3738653960-995570312
                                  • Opcode ID: 346d70c982727c1155c13cd7f0da97c33eabcd5cc4546b7b934a85fbab2b0b06
                                  • Instruction ID: ce8649d76da366589a6427c866c81d1320eadfbd5f06d1d238318ef93bafc575
                                  • Opcode Fuzzy Hash: 346d70c982727c1155c13cd7f0da97c33eabcd5cc4546b7b934a85fbab2b0b06
                                  • Instruction Fuzzy Hash: A0A15A70F0061AEFDB18CFA9CA44BEEBBB5FF49308F144529E415A7A50DB70A941CB91
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C868068
                                  • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 6C86809D
                                  • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 6C8680C5
                                  • ScreenToClient.USER32(?,?), ref: 6C868151
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressProc$ClientHandleModuleScreen
                                  • String ID: CloseGestureInfoHandle$GetGestureInfo$user32.dll
                                  • API String ID: 471820996-2905070798
                                  • Opcode ID: 96b642abcc82231892b3c1f6f9aeca0c861672d24749b372ab22cfddb9dc4f9e
                                  • Instruction ID: e4fff642bfdeb51122b90b4151d01b41d32901cf68a38d718f3f631657360656
                                  • Opcode Fuzzy Hash: 96b642abcc82231892b3c1f6f9aeca0c861672d24749b372ab22cfddb9dc4f9e
                                  • Instruction Fuzzy Hash: BB81BFB4701616EFCB19CF69C690969BBB5FF0A348B10856AE809D3F10D735E952CF90
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6C9CA5B2
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6C9CA61D
                                  • LCMapStringEx.KERNEL32(00000000,6CA42FD1,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C9CA63A
                                  • LCMapStringEx.KERNEL32(00000000,6CA42FD1,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6C9CA679
                                  • LCMapStringEx.KERNEL32(00000000,6CA42FD1,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6C9CA6D8
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C9CA6FB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide
                                  • String ID: \sx
                                  • API String ID: 2829165498-995570312
                                  • Opcode ID: 2b621a4b8c848e31d3d656d1309e63479010c5a2a495af1bd3e1ad75b164aeaf
                                  • Instruction ID: 163605cbae1e5ae2f4e0a187ccddcd0a60996854366d1444da7a43ea5cc8cdcc
                                  • Opcode Fuzzy Hash: 2b621a4b8c848e31d3d656d1309e63479010c5a2a495af1bd3e1ad75b164aeaf
                                  • Instruction Fuzzy Hash: 6351A172B01206AFEF104FA4CC44FAA3BBDFF55B58F218029F914D6590EB34D9118BA6
                                  APIs
                                  • FillRect.USER32(?,?,00000000), ref: 6C85C957
                                  • GetParent.USER32(?), ref: 6C85C978
                                  • GetWindowRect.USER32(?,?), ref: 6C85C995
                                  • GetClientRect.USER32(?,?), ref: 6C85CA38
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C85CA4A
                                  • DrawThemeBackground.UXTHEME(?,?,00000000,00000000,?,00000000), ref: 6C85CA72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Window$BackgroundClientDrawFillParentPointsTheme
                                  • String ID: \sx
                                  • API String ID: 2136005349-995570312
                                  • Opcode ID: 9cea27d30d6f29d61d5e3d0c26de91c3be4bacc434ae98b17205456e3f1fe96c
                                  • Instruction ID: de4856311be2ae179cfb0756106d1ce020df9df7fc511c5d6c8a449081370167
                                  • Opcode Fuzzy Hash: 9cea27d30d6f29d61d5e3d0c26de91c3be4bacc434ae98b17205456e3f1fe96c
                                  • Instruction Fuzzy Hash: 1F4187B5A0020A9FCF11DF69CA449AEBBF8FF4D344B448669E805E7611E730E951CFA0
                                  APIs
                                  • CheckMenuItem.USER32(?,?,00000400), ref: 6C873791
                                    • Part of subcall function 6C945A11: GetWindowTextW.USER32(?,?,00000100), ref: 6C945A6F
                                    • Part of subcall function 6C945A11: lstrcmpW.KERNEL32(?,?,?,00000000), ref: 6C945A81
                                    • Part of subcall function 6C945A11: SetWindowTextW.USER32(?,?), ref: 6C945A8D
                                  • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C8737AC
                                  • SendMessageW.USER32(?,000000F1,?,00000000), ref: 6C8737C9
                                  • SetMenuItemBitmaps.USER32(?,?,00000400,00000000,00000000), ref: 6C873836
                                  • SetMenuItemInfoW.USER32(?,?,00000001,?), ref: 6C873886
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ItemMenu$MessageSendTextWindow$BitmapsCheckInfolstrcmp
                                  • String ID: 0$@
                                  • API String ID: 72408025-1545510068
                                  • Opcode ID: e83f95696ac8c3e358fb3f7a6977e2bc6a19f3dd95cf966743f909c2e94d2015
                                  • Instruction ID: c6c66e93fa87e8f85b7953f7054bd31fafda87ad1ec23e702004c25654b28ef6
                                  • Opcode Fuzzy Hash: e83f95696ac8c3e358fb3f7a6977e2bc6a19f3dd95cf966743f909c2e94d2015
                                  • Instruction Fuzzy Hash: 4441D271701225EFDB349F55C944B9EBBB9FF04744F108A29E90997940EB70EC42CBA1
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 6C9CB787
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 6C9CB78F
                                  • _ValidateLocalCookies.LIBCMT ref: 6C9CB818
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 6C9CB843
                                  • _ValidateLocalCookies.LIBCMT ref: 6C9CB898
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: \sx$csm
                                  • API String ID: 1170836740-1956744791
                                  • Opcode ID: 112c8ec01652e5d9d1d8a8b4b94419fdc24232bbc6c65329077119c1b0b13998
                                  • Instruction ID: f920e290b213777d6bd92c29c4913d450cd80ce135623b6f889afd0327236920
                                  • Opcode Fuzzy Hash: 112c8ec01652e5d9d1d8a8b4b94419fdc24232bbc6c65329077119c1b0b13998
                                  • Instruction Fuzzy Hash: 3B41B034B00209ABCF00CF69C880A9EBBB9FF15318F148195E8289BB51D735DA15CB93
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 6C869BF9
                                  • GetWindow.USER32(?,00000005), ref: 6C869C10
                                  • GetWindowRect.USER32(00000000,?), ref: 6C869C2B
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5C5
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5D2
                                  • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 6C869C51
                                  • GetWindow.USER32(00000000,00000002), ref: 6C869C5A
                                  • ScrollWindow.USER32(?,?,?,?,?), ref: 6C869C76
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$ClientScreen$RectScrollVisible
                                  • String ID: \sx
                                  • API String ID: 1714389229-995570312
                                  • Opcode ID: eac4efcc40b152d06bfb6e8ccf97272e5b86bbabc98195341f5de92ee427240f
                                  • Instruction ID: 7f60380a3bfe39431d2457c08e5ff9cb600ca52681177b926329f3d18a6428a2
                                  • Opcode Fuzzy Hash: eac4efcc40b152d06bfb6e8ccf97272e5b86bbabc98195341f5de92ee427240f
                                  • Instruction Fuzzy Hash: FE219C3170060AAFCB119F65CD88AAE77B9FF89748B118519F90297A50EB30DD428B60
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6C86F85D,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6C944F4F
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeTextEx), ref: 6C944F5F
                                  • EncodePointer.KERNEL32(00000000,?,6C86F85D,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6C944F68
                                  • DecodePointer.KERNEL32(00000000,?,?,6C86F85D,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6C944F76
                                  • DrawThemeText.UXTHEME(?,?,?,?,?,?,?,00000000,?,?,6C86F85D,?,00000000,?,?,?), ref: 6C944FC3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeDrawEncodeHandleModuleProcTextTheme
                                  • String ID: DrawThemeTextEx$uxtheme.dll
                                  • API String ID: 1727381832-3035683158
                                  • Opcode ID: 43dac8fa56d624dc42987c49a1031b7e4f7919d6db5af6bde45871843f54eede
                                  • Instruction ID: 70f2946edd054d4c627a0d518ff4a06247513a5661b060dd0eba7443bd28163b
                                  • Opcode Fuzzy Hash: 43dac8fa56d624dc42987c49a1031b7e4f7919d6db5af6bde45871843f54eede
                                  • Instruction Fuzzy Hash: AD11E53660061AAFDF021FA0CC08D9A3F7ABF09399B058554FE14A5520C736D872AFA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C91D556
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91D5BA
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91D5F0
                                  • SelectObject.GDI32(?,00000000), ref: 6C91D644
                                  • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C91D7AE
                                  • DeleteObject.GDI32(?), ref: 6C91D7E7
                                  • GetPixel.GDI32(00000000,?,00000000), ref: 6C91D859
                                  • SetPixel.GDI32(?,00000000,000000FF,00000000), ref: 6C91D870
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateObjectPixel$BitmapDeleteH_prolog3_Select
                                  • String ID:
                                  • API String ID: 1635930241-0
                                  • Opcode ID: c7119a75a77d36493ecf319388ecc501fac00a01b53adfc9d290406698663c5b
                                  • Instruction ID: 70e774153e2a5af3c7d1b26ab844af581e76de0f668de1e09a5507fe40de9c38
                                  • Opcode Fuzzy Hash: c7119a75a77d36493ecf319388ecc501fac00a01b53adfc9d290406698663c5b
                                  • Instruction Fuzzy Hash: BFB12E72E002189FDF05CFA9C945ADEBBB6EF98314F258169E415EBB90D730D905CB90
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C871FE3
                                  • OleDuplicateData.OLE32(?,00000000,00000000), ref: 6C872074
                                  • GlobalLock.KERNEL32(00000000), ref: 6C872096
                                  • CopyMetaFileW.GDI32(?,00000000), ref: 6C8720A4
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C8720B2
                                  • GlobalFree.KERNEL32(00000000), ref: 6C8720B9
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C8720C6
                                  • CopyFileW.KERNEL32(?,?,00000000,016087C7,?,00000054,6C95B78D,-00000014,?,-00000014,6C8FEC90,00000000), ref: 6C872272
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3_LockMeta
                                  • String ID:
                                  • API String ID: 985170318-0
                                  • Opcode ID: f7810ad21e2d471457ee94145634fb54a4a5f5678169fcb3e3aa71d46b6d1928
                                  • Instruction ID: 933d4db3b8cab6b25a9ba55093c2ef867565f019c93433a09cf54fb51de57dbf
                                  • Opcode Fuzzy Hash: f7810ad21e2d471457ee94145634fb54a4a5f5678169fcb3e3aa71d46b6d1928
                                  • Instruction Fuzzy Hash: 1EA17F70610606EFDB349F64CA4CA2ABBB5FF49718704C65DE819CBA54E735E811CBB0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C85D977
                                  • InflateRect.USER32(?), ref: 6C85D99F
                                  • DrawFocusRect.USER32(?,?), ref: 6C85DA09
                                  • InflateRect.USER32(?), ref: 6C85DA1D
                                  • InflateRect.USER32(?), ref: 6C85DA65
                                  • InflateRect.USER32(?), ref: 6C85DAB5
                                  • CreateHatchBrush.GDI32(00000005,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C85DAD9
                                  • FillRect.USER32(?,?,00000000), ref: 6C85DAF4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Inflate$BrushCreateDrawFillFocusH_prolog3Hatch
                                  • String ID:
                                  • API String ID: 4128771895-0
                                  • Opcode ID: 447ef269c311e613fe70abc426a5ace6e5a6a7789446c049f6d64180c3ee6416
                                  • Instruction ID: 39dff9745d5c63dbf009ae53fbcb61dfd614feaf6fa7e1f54fdb7e74ff52eac3
                                  • Opcode Fuzzy Hash: 447ef269c311e613fe70abc426a5ace6e5a6a7789446c049f6d64180c3ee6416
                                  • Instruction Fuzzy Hash: F6516AB2900109EFCB24DF94CA49DDF77BCEB49318F81852AF810A7650DB74DA59CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C881099
                                  • EnterCriticalSection.KERNEL32(6CA73BD8,00000018,6C843E9D,?,00000000,00000000,00000000), ref: 6C8810B7
                                  • SelectObject.GDI32(?,00000018), ref: 6C881104
                                  • LeaveCriticalSection.KERNEL32(6CA73BD8,?), ref: 6C881121
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C881149
                                  • SelectObject.GDI32(00000000), ref: 6C881158
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C8811E0
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C881200
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Create$BitmapCompatibleCriticalObjectSectionSelect$EnterH_prolog3Leave
                                  • String ID:
                                  • API String ID: 4255533662-0
                                  • Opcode ID: 0a2a6adff64eb83d06b37dd691ef3f86b90cfad696dd4926087ec4e52867a9b9
                                  • Instruction ID: 01c3674f9c517a862eaf9788494654f6daef528bdcef72e03bdc036ab0f0f4ec
                                  • Opcode Fuzzy Hash: 0a2a6adff64eb83d06b37dd691ef3f86b90cfad696dd4926087ec4e52867a9b9
                                  • Instruction Fuzzy Hash: 95514978602706DFDB35CF25CA40A9AB7F4BF45709B108D2DE4A6C6E50EB30E946CB21
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85FCD0
                                  • GetSysColor.USER32(00000017), ref: 6C85FCED
                                  • InflateRect.USER32(?,00000002,00000002), ref: 6C85FD10
                                  • DrawThemeBackground.UXTHEME(?,?,00000001,00000000,?,00000000), ref: 6C85FD33
                                  • GetThemeColor.UXTHEME(?,00000001,00000000,00000EDB,?), ref: 6C85FD48
                                  • GetThemeColor.UXTHEME(?,00000001,00000000,00000EDC,?), ref: 6C85FD5D
                                  • GetSysColorBrush.USER32(00000018), ref: 6C85FD67
                                  • FillRect.USER32(00000000,?,00000000), ref: 6C85FD7A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$Theme$Rect$BackgroundBrushDrawFillH_prolog3_Inflate
                                  • String ID:
                                  • API String ID: 229325109-0
                                  • Opcode ID: ce0934959f01d3d911a71d5f042ddb721caecb7f05be5e26e749ccc4f8f24d8e
                                  • Instruction ID: d7361d68ab731ea27a9c0dd9a083a7f8219a4170fdee08b6f8b475ce6ff8945b
                                  • Opcode Fuzzy Hash: ce0934959f01d3d911a71d5f042ddb721caecb7f05be5e26e749ccc4f8f24d8e
                                  • Instruction Fuzzy Hash: 41412771B0021AAFDF14CFA4C988EEE77B9FF09348B005469F901AB650CB71AD06CB60
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000002,00000000,00000000,00000000,?,?,6C880039,00000000,00000000,?,6CA0BE30,?,6C880E95,?,?,?), ref: 6C880055
                                  • GlobalLock.KERNEL32(00000000), ref: 6C880062
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C88006D
                                  • GlobalFree.KERNEL32(00000000), ref: 6C880074
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C880092
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 6C88009F
                                  • EnterCriticalSection.KERNEL32(6CA73BD8,00000000), ref: 6C8800B8
                                  • LeaveCriticalSection.KERNEL32(6CA73BD8,00000000), ref: 6C88011F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$CriticalSectionUnlock$AllocCreateEnterFreeLeaveLockStream
                                  • String ID:
                                  • API String ID: 295443201-0
                                  • Opcode ID: 9405bb6991ca73449b34c7e74cb95730472801cd3ba35c1dd7cf277edec76792
                                  • Instruction ID: 3883871809602e52ca93ea5afb7b78226c21e46f0aaba4cb5267bb8ead3e1c03
                                  • Opcode Fuzzy Hash: 9405bb6991ca73449b34c7e74cb95730472801cd3ba35c1dd7cf277edec76792
                                  • Instruction Fuzzy Hash: 3B21A235703716ABDF355B65CD18A5E37B8BB4635DB008429E401D3A40EB35DA038B71
                                  APIs
                                  • GetSystemMetrics.USER32(00000031), ref: 6C86FC2F
                                  • GetSystemMetrics.USER32(00000032), ref: 6C86FC3D
                                  • SetRectEmpty.USER32(6CA73AFC), ref: 6C86FC50
                                  • EnumDisplayMonitors.USER32(00000000,00000000,6C86FA37,6CA73AFC), ref: 6C86FC60
                                  • SystemParametersInfoW.USER32(00000030,00000000,6CA73AFC,00000000), ref: 6C86FC6F
                                  • SystemParametersInfoW.USER32(00001002,00000000,6CA73B20,00000000), ref: 6C86FC9C
                                  • SystemParametersInfoW.USER32(00001012,00000000,6CA73B24,00000000), ref: 6C86FCB0
                                  • SystemParametersInfoW.USER32(0000100A,00000000,6CA73B34,00000000), ref: 6C86FCD6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                  • String ID:
                                  • API String ID: 2614369430-0
                                  • Opcode ID: e7949f9d808ca9d3f3acc63104a2f8af062394b52b2496528edb764036e8dbc6
                                  • Instruction ID: 5ef37ae836dc0f7c077f38a4b9ca7c801ad6fbc7ed398ff8a98e422aa5964e4a
                                  • Opcode Fuzzy Hash: e7949f9d808ca9d3f3acc63104a2f8af062394b52b2496528edb764036e8dbc6
                                  • Instruction Fuzzy Hash: 87215CB1301216BFE7084F75898CBE3BBBCFF1A389F004629E949C6140D7B05846CBA0
                                  APIs
                                  • GlobalLock.KERNEL32(00000000), ref: 6C8F6CEA
                                  • lstrcmpW.KERNEL32(00000000,?), ref: 6C8F6D03
                                  • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6C8F6D18
                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C8F6D38
                                  • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C8F6D40
                                  • GlobalLock.KERNEL32(00000000), ref: 6C8F6D4E
                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6C8F6D5F
                                  • ClosePrinter.WINSPOOL.DRV(?), ref: 6C8F6D77
                                    • Part of subcall function 6C9459DE: GlobalFlags.KERNEL32(6C87096D), ref: 6C9459EB
                                    • Part of subcall function 6C9459DE: GlobalUnlock.KERNEL32(6C87096D), ref: 6C9459F9
                                    • Part of subcall function 6C9459DE: GlobalFree.KERNEL32(6C87096D), ref: 6C945A05
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                  • String ID:
                                  • API String ID: 168474834-0
                                  • Opcode ID: b4f3d4eee89658f276fd892b8f85bab3550fcba675aadba405016cbc6978bd1d
                                  • Instruction ID: 5f8e6a010027af97bc6ac8ca02ddb44d0e8d896ca66d584fff93ad385a68bc4d
                                  • Opcode Fuzzy Hash: b4f3d4eee89658f276fd892b8f85bab3550fcba675aadba405016cbc6978bd1d
                                  • Instruction Fuzzy Hash: 3911BE71200A09BEEB222FB0CD45DAA7ABDEB147CDB10462AB621C0920C732C955DB72
                                  APIs
                                  • GetSystemMetrics.USER32(00000020), ref: 6C9153BA
                                  • GetSystemMetrics.USER32(00000021), ref: 6C9153C4
                                  • GetSystemMetrics.USER32(00000005), ref: 6C9153D3
                                  • GetSystemMetrics.USER32(00000006), ref: 6C9153DD
                                  • GetSystemMetrics.USER32(0000005C), ref: 6C9153F4
                                  • GetSystemMetrics.USER32(0000005C), ref: 6C9153FE
                                  • GetSystemMetrics.USER32(00000007), ref: 6C915416
                                  • GetSystemMetrics.USER32(00000008), ref: 6C915420
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MetricsSystem
                                  • String ID:
                                  • API String ID: 4116985748-0
                                  • Opcode ID: 55bb6abc2392b267b5ae496b120cb78a835c775d7dd7b397ec52d99801c7edef
                                  • Instruction ID: 3e4b5e3f4d08521fe1e5b2cd6798b419056c07fb7bd7f73d95671e838dfeeb4e
                                  • Opcode Fuzzy Hash: 55bb6abc2392b267b5ae496b120cb78a835c775d7dd7b397ec52d99801c7edef
                                  • Instruction Fuzzy Hash: DB115B36B45B069FE7004FA5880A755B7F8FF11B9AF11842EE695C69C0E770D4C6CB10
                                  APIs
                                  • GlobalSize.KERNEL32(-00000014), ref: 6C871F66
                                  • GlobalAlloc.KERNEL32(00002002,00000000,?,?,6C87229F,016087C7,?,00000054,6C95B78D,-00000014,?,-00000014,6C8FEC90,00000000), ref: 6C871F7E
                                  • GlobalLock.KERNEL32(-00000014), ref: 6C871F8E
                                  • GlobalLock.KERNEL32(?), ref: 6C871F97
                                  • GlobalSize.KERNEL32(?), ref: 6C871FA4
                                    • Part of subcall function 6C86EC8A: _memcpy_s.LIBCMT ref: 6C86EC99
                                  • GlobalUnlock.KERNEL32(?), ref: 6C871FB5
                                  • GlobalUnlock.KERNEL32(?), ref: 6C871FBE
                                  • GlobalSize.KERNEL32(?), ref: 6C871FCE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$Size$LockUnlock$Alloc_memcpy_s
                                  • String ID:
                                  • API String ID: 3833998449-0
                                  • Opcode ID: 8b33e1e8528251c87dbeadbddf3b1b46657a96378b28b6f2a3cb32159bf19782
                                  • Instruction ID: 9596512e8d9cbfabaef3a8900990acc2233b6be0d80b994ce650023a4021b855
                                  • Opcode Fuzzy Hash: 8b33e1e8528251c87dbeadbddf3b1b46657a96378b28b6f2a3cb32159bf19782
                                  • Instruction Fuzzy Hash: EE012575701715BBDB241F65CD8CC9E7F7CEB062997008528F909D1511DB31990697B0
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 6C932046
                                  • GetSystemMetrics.USER32(0000000C), ref: 6C932051
                                  • GetSystemMetrics.USER32(00000002), ref: 6C93205C
                                  • GetSystemMetrics.USER32(00000003), ref: 6C93206A
                                  • GetDC.USER32(00000000), ref: 6C932078
                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 6C932083
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C93208F
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6C93209B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$CapsDevice$Release
                                  • String ID:
                                  • API String ID: 1151147025-0
                                  • Opcode ID: 5962921e1eeb9dbe13901bbb5d5610be2f4df429c6b5768165e63682f5575fe4
                                  • Instruction ID: a10b6a13da2d4a51636fcc0ace2635cebddcaf9381f1ebfa6c150a2d21cd1a9e
                                  • Opcode Fuzzy Hash: 5962921e1eeb9dbe13901bbb5d5610be2f4df429c6b5768165e63682f5575fe4
                                  • Instruction Fuzzy Hash: 2FF0E771B40712ABEB195FB1980DB563BB4FB46756F00861EF202CA180DBB58487CF90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8D9393
                                  • GetWindow.USER32(?,00000005), ref: 6C8D9402
                                    • Part of subcall function 6C8D938C: __EH_prolog3.LIBCMT ref: 6C8D8E38
                                    • Part of subcall function 6C8D938C: GetWindow.USER32(?,00000005), ref: 6C8D8E56
                                    • Part of subcall function 6C8D938C: GetWindow.USER32(?,00000002), ref: 6C8D8E8F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$H_prolog3
                                  • String ID:
                                  • API String ID: 1351209170-0
                                  • Opcode ID: 4bad5370a7ace386b087a2096413cb864fdbd0c2fcdbccb2c5bb3b6d16692c09
                                  • Instruction ID: 71b8694caebb19210e30c464abf21bff77d8dbbd6f2226befbe0938ee8fed67a
                                  • Opcode Fuzzy Hash: 4bad5370a7ace386b087a2096413cb864fdbd0c2fcdbccb2c5bb3b6d16692c09
                                  • Instruction Fuzzy Hash: 9EF17C34B0122A9FCF14DF64C968AEDB7B1BF49314F014969E812A7B90DF34AD46CB91
                                  APIs
                                  • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 6C97F68A
                                  • __EH_prolog3_GS.LIBCMT ref: 6C97F6ED
                                  • GetClientRect.USER32(00000000,?), ref: 6C97F788
                                  • GetParent.USER32(?), ref: 6C97F930
                                  • GetNextDlgGroupItem.USER32(?,?,00000000), ref: 6C97F964
                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 6C97F9D8
                                  • GetNextDlgGroupItem.USER32(?,?,00000000), ref: 6C97F9E9
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: GroupItemNext$ClientH_prolog3_MessageParentRectRedrawSendWindow
                                  • String ID:
                                  • API String ID: 2296408814-0
                                  • Opcode ID: 083a7def7f9c544e9ae5d0bda15e0d22429d134be471ddf0caeee4084f1beb6d
                                  • Instruction ID: c0247eebcbb5ddfe75fefbacc0f3e68d3e1a2970bed6158c4ba651fef96a93ac
                                  • Opcode Fuzzy Hash: 083a7def7f9c544e9ae5d0bda15e0d22429d134be471ddf0caeee4084f1beb6d
                                  • Instruction Fuzzy Hash: 2FC19F31A01219ABDF14DF68C994BEE7BB9BF49358F140069E905B7B50DB30E946CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 15e1bcecc5968a93ea416e1938c36c66204e08d29b2f9682e5d25721f3eb5c4f
                                  • Instruction ID: b71f0761995dea950c27b62e9893a8d7045e0d50358f8440eb16b55410398382
                                  • Opcode Fuzzy Hash: 15e1bcecc5968a93ea416e1938c36c66204e08d29b2f9682e5d25721f3eb5c4f
                                  • Instruction Fuzzy Hash: 8CB14672A05365AFDB028F68CC81BEA7BA9EF3F314F144195E904AB782D374D901C7A1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85F4E7
                                  • CreatePolygonRgn.GDI32(?,00000008,00000002), ref: 6C85F73E
                                  • FillRect.USER32(00000002,?,?), ref: 6C85F7C2
                                  • FillRect.USER32(00000002,?,-000000D0), ref: 6C85F805
                                  • Polyline.GDI32(00000002,?,00000008), ref: 6C85F81D
                                  • OffsetRect.USER32(00000000,00000001,00000001), ref: 6C85F87B
                                  • OffsetRect.USER32(00000000,000000FF,000000FF), ref: 6C85F8A3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$FillOffset$CreateH_prolog3_PolygonPolyline
                                  • String ID:
                                  • API String ID: 2710902255-0
                                  • Opcode ID: ba403e5f2a26b5edbe296bafb1482620ae7c593ae8f92c6107774c7167b35dae
                                  • Instruction ID: 81ae3495ce7fa2a7b45025011eee0bdcc329726bb4de6c5094e8b2f110bb3556
                                  • Opcode Fuzzy Hash: ba403e5f2a26b5edbe296bafb1482620ae7c593ae8f92c6107774c7167b35dae
                                  • Instruction Fuzzy Hash: FCD15C71E002199FDF24CFA4C984BEDBBB5BF08304F50456AE909AB791DB749A49CF50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C91E4A8
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91E514
                                  • CreateCompatibleBitmap.GDI32(?,00000020,?), ref: 6C91E54A
                                  • SelectObject.GDI32(?,00000000), ref: 6C91E5A4
                                  • BitBlt.GDI32(?,00000000,00000000,00000020,?,03E8FFFF,00000020,?,00CC0020), ref: 6C91E5CC
                                  • BitBlt.GDI32(?,00000020,?,00000020,00000048,?,00000000,00000000,00CC0020), ref: 6C91E7A5
                                  • DeleteObject.GDI32(?), ref: 6C91E7BC
                                    • Part of subcall function 6C87F3FD: FillRect.USER32(?,?,-000000A8), ref: 6C87F419
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateObject$BitmapDeleteFillH_prolog3RectSelect
                                  • String ID:
                                  • API String ID: 3910664508-0
                                  • Opcode ID: 45b8cb44a3b22e3fed54681fae0e375b046492e60fbe1821e3980eed3fbed44a
                                  • Instruction ID: 2453a0796763e3547c85e651be19b4b00edb15df971a758ce1278c60b454e098
                                  • Opcode Fuzzy Hash: 45b8cb44a3b22e3fed54681fae0e375b046492e60fbe1821e3980eed3fbed44a
                                  • Instruction Fuzzy Hash: 3AA1AE31A0420E9BDF10CFA8C985AEEBBF9FF58344F104629F551E6A90EB34D945CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C90716D
                                  • IsRectEmpty.USER32(?), ref: 6C9072BD
                                  • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 6C907340
                                  • PtInRect.USER32(?,?,?), ref: 6C90748D
                                  • GetParent.USER32(?), ref: 6C9074A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$EmptyH_prolog3ParentRedrawWindow
                                  • String ID: \sx
                                  • API String ID: 3997883630-995570312
                                  • Opcode ID: 8442bc53e1edb73747ffd88fedfd628e2d3b1f9aab0d9975b479df23c3af900b
                                  • Instruction ID: db4354c9c56eca32bd01922765fbd85268122ab1c0c6347a43e70adaa09a8a2e
                                  • Opcode Fuzzy Hash: 8442bc53e1edb73747ffd88fedfd628e2d3b1f9aab0d9975b479df23c3af900b
                                  • Instruction Fuzzy Hash: DCA14A31B006068FDF08DF68C988AAE77B6BF95314F1845BDD809DBA45DB30E945CB60
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C8440BD
                                  • LoadBitmapW.USER32(?,-000000B1), ref: 6C844161
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6C844188
                                  • ImageList_AddMasked.COMCTL32(?,00000000,000000FF,00000010,?,00000005,00000000,00000000,?,50402808,000000AB,?,?,56000007,?), ref: 6C8441C1
                                  • SendMessageW.USER32(?,00001109,00000000,?), ref: 6C8441E0
                                  • LoadMenuW.USER32(?,000000AD), ref: 6C84429C
                                  • GetSubMenu.USER32(00000000,00000000), ref: 6C8442B0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: LoadMenu$BitmapEmptyImageList_MaskedMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 4268898049-0
                                  • Opcode ID: dddf2a8332259376adae78e4388548d047090141e5ac94d802c5810fceadcef7
                                  • Instruction ID: 1bfa79897cce8d6edfda6f9091192e7bbb7e222493588906868ec51009cd8259
                                  • Opcode Fuzzy Hash: dddf2a8332259376adae78e4388548d047090141e5ac94d802c5810fceadcef7
                                  • Instruction Fuzzy Hash: CA81AE71740209AFEB24DF68CD55BEEB7B8BF48704F108628F515A76C0CB746949CBA0
                                  APIs
                                    • Part of subcall function 6C9432A0: __EH_prolog3.LIBCMT ref: 6C9432A7
                                  • SendMessageW.USER32(?,00000433,00000000,?), ref: 6C868595
                                  • GetWindowLongW.USER32(?,000000FC), ref: 6C8685A0
                                  • GetWindowLongW.USER32(?,000000FC), ref: 6C8685B4
                                  • SetWindowLongW.USER32(?,000000FC,00000000), ref: 6C8685DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: LongWindow$H_prolog3MessageSend
                                  • String ID: ,$\sx
                                  • API String ID: 4140968126-2057053908
                                  • Opcode ID: ea7cdb9b364f98bd5b75fc8a8bbf6df5d078b0b07aa0132513b5031088be0420
                                  • Instruction ID: 6db58667078ef74694e06c23cb86796808c39e3fd49d55596c89054490a241ac
                                  • Opcode Fuzzy Hash: ea7cdb9b364f98bd5b75fc8a8bbf6df5d078b0b07aa0132513b5031088be0420
                                  • Instruction Fuzzy Hash: 69710331700215AFCF25AF7AC994A9EBBB5BF49318B00492AE905D7F50DB30E901CB91
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9A1CB8
                                  • _memcpy_s.LIBCMT ref: 6C9A1DC9
                                  • CoTaskMemFree.OLE32(?,000000FF), ref: 6C9A1DF1
                                  • GetParent.USER32(?), ref: 6C9A1E57
                                  • SendMessageW.USER32(?,00000464,00000104,00000000), ref: 6C9A1E80
                                  • GetParent.USER32(?), ref: 6C9A1EA6
                                  • SendMessageW.USER32(?,00000465,00000104,00000000), ref: 6C9A1ECC
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageParentSend$FreeH_prolog3Task_memcpy_s
                                  • String ID:
                                  • API String ID: 3096905456-0
                                  • Opcode ID: 65dff92a6b1b701de78d58bd53ae137b5f9c5899f039da2c2debf68319657719
                                  • Instruction ID: 30f77f54dcf4b46af586966981f7ffff6c279d00c75fdb8acbb4a0b1dcc6da08
                                  • Opcode Fuzzy Hash: 65dff92a6b1b701de78d58bd53ae137b5f9c5899f039da2c2debf68319657719
                                  • Instruction Fuzzy Hash: C0616371A0051ADFCF04DFA8CD94EAEB7B4BF05718B104929E515E7AA0DB30ED46CB54
                                  APIs
                                  • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002000), ref: 6C88021D
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6C88023A
                                  • DeleteObject.GDI32(00000000), ref: 6C880245
                                  • DeleteObject.GDI32(00000000), ref: 6C8802EA
                                    • Part of subcall function 6C880FCC: GetObjectW.GDI32(?,00000054,?), ref: 6C880FE6
                                  • __EH_prolog3.LIBCMT ref: 6C880141
                                    • Part of subcall function 6C9459B8: DeleteObject.GDI32(6C87096D), ref: 6C9459CA
                                    • Part of subcall function 6C87FFE0: FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880002
                                    • Part of subcall function 6C87FFE0: LoadResource.KERNEL32(00000000,00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880010
                                    • Part of subcall function 6C87FFE0: LockResource.KERNEL32(00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C88001B
                                    • Part of subcall function 6C87FFE0: SizeofResource.KERNEL32(00000000,00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880029
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Resource$Delete$Load$FindH_prolog3ImageLockSizeof
                                  • String ID:
                                  • API String ID: 1337615151-3916222277
                                  • Opcode ID: b1e491d990d5d7d6961a45a5760380b3d4634436de38319b0a45886e57c75151
                                  • Instruction ID: d0992716164faa11ee90bfd354d6995a0154539596187827fea1eeb9f2e9c784
                                  • Opcode Fuzzy Hash: b1e491d990d5d7d6961a45a5760380b3d4634436de38319b0a45886e57c75151
                                  • Instruction Fuzzy Hash: 0D51C671A0365AEFDF259FA4CA80BEDB378BF05308F40492DE521A3E40DB709955CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C905DD4
                                    • Part of subcall function 6C93447F: __EH_prolog3.LIBCMT ref: 6C934486
                                    • Part of subcall function 6C93447F: SetRectEmpty.USER32(?), ref: 6C93467C
                                    • Part of subcall function 6C97D5EB: __EH_prolog3.LIBCMT ref: 6C97D5F2
                                  • SetRectEmpty.USER32(?), ref: 6C905F5D
                                  • SetRectEmpty.USER32(?), ref: 6C905F64
                                  • SetRectEmpty.USER32(?), ref: 6C905F97
                                  • SetRectEmpty.USER32(?), ref: 6C906001
                                  • SetRectEmpty.USER32(?), ref: 6C90600E
                                  • SetRectEmpty.USER32(?), ref: 6C90601B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect$H_prolog3
                                  • String ID:
                                  • API String ID: 3752103406-0
                                  • Opcode ID: fd554dde6d1210a042f734479156acf61afc8ef8f9ce8a97d05017d2707f19e2
                                  • Instruction ID: 15fe2cbcb7d59544f3c3885a4000e662345db949177a5e957b99b824266f1e00
                                  • Opcode Fuzzy Hash: fd554dde6d1210a042f734479156acf61afc8ef8f9ce8a97d05017d2707f19e2
                                  • Instruction Fuzzy Hash: 2D71EEB1906B158FCB65CF28C58868ABBF4BF08304F15896ED4AE9B311C734AA45CF85
                                  APIs
                                  • GetParent.USER32(?), ref: 6C869A94
                                  • PeekMessageW.USER32(000000FF,00000000,00000000,00000000,00000000), ref: 6C869AB6
                                  • UpdateWindow.USER32(?), ref: 6C869AD0
                                  • SendMessageW.USER32(000000DD,00000121,00000001,?), ref: 6C869AF6
                                  • SendMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C869B0E
                                  • UpdateWindow.USER32(?), ref: 6C869B5B
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • PeekMessageW.USER32(000000FF,00000000,00000000,00000000,00000000), ref: 6C869BA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Message$Window$PeekSendUpdate$LongParent
                                  • String ID:
                                  • API String ID: 2853195852-0
                                  • Opcode ID: 1392c0b0d5c4ef574eef6f6f4fafc587baa516d09d7ff15648f87d4e58325ebb
                                  • Instruction ID: 54d9b67b4782782de74591563dc4d179bb04852a7ba5db76f752662087003c47
                                  • Opcode Fuzzy Hash: 1392c0b0d5c4ef574eef6f6f4fafc587baa516d09d7ff15648f87d4e58325ebb
                                  • Instruction Fuzzy Hash: D541A170B00215BBEF189B7ACA88B6E7BB8FF04759F104968E815D7D80D770D941C790
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C898BA5
                                  • CopyRect.USER32(?,?), ref: 6C898C53
                                  • IsRectEmpty.USER32(?), ref: 6C898C6B
                                  • IsRectEmpty.USER32(?), ref: 6C898C83
                                  • IsRectEmpty.USER32(?), ref: 6C898C98
                                    • Part of subcall function 6C86FCED: __EH_prolog3.LIBCMT ref: 6C86FCF4
                                    • Part of subcall function 6C86FCED: LoadCursorW.USER32(00000000,00007F00), ref: 6C86FD18
                                    • Part of subcall function 6C86FCED: GetClassInfoW.USER32(?,?,?), ref: 6C86FD53
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
                                  • String ID: Afx:ControlBar
                                  • API String ID: 685170547-4244778371
                                  • Opcode ID: a7c567f616ad943e54dadee24a7464cc6f0284e0b812491f15120772a3295916
                                  • Instruction ID: 1741855ce1c1b4123916939e1704072c4ac34c482b07d022844151f5f1f57528
                                  • Opcode Fuzzy Hash: a7c567f616ad943e54dadee24a7464cc6f0284e0b812491f15120772a3295916
                                  • Instruction Fuzzy Hash: 6C415B31A002099FDF55CFA8CA84AEE77F5BF49348F154469EC05BB640DB75AA0ACB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C90BD43
                                    • Part of subcall function 6C9508BB: __EH_prolog3.LIBCMT ref: 6C9508C2
                                    • Part of subcall function 6C9592DA: SetRectEmpty.USER32(?), ref: 6C95930F
                                  • SetRectEmpty.USER32(?), ref: 6C90BE73
                                  • SetRectEmpty.USER32 ref: 6C90BE84
                                  • SetRectEmpty.USER32(?), ref: 6C90BE8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect$H_prolog3
                                  • String ID: False$True
                                  • API String ID: 3752103406-1895882422
                                  • Opcode ID: 1cd39e9c1682685acead261992824933f745bf6f9f0efe1eb22516e4ba4646f9
                                  • Instruction ID: 14dce242fcb70f4b0c39661a2c69953f104855ed7236454b7981fcfb46b06923
                                  • Opcode Fuzzy Hash: 1cd39e9c1682685acead261992824933f745bf6f9f0efe1eb22516e4ba4646f9
                                  • Instruction Fuzzy Hash: AB51F1B09043019FCB0ACF29D485BE8BBE8BF18314F1981BEE81D9B796CB705645CB65
                                  APIs
                                  • LoadLibraryW.KERNEL32(Comctl32.dll,00000000,00000000,00000002,Comctl32.dll,00000040), ref: 6C864A64
                                    • Part of subcall function 6C864816: GetProcAddress.KERNEL32(00000000,6CA07F64), ref: 6C864844
                                  • GetModuleFileNameW.KERNEL32(?,?,00000105,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C86497E
                                  • SetLastError.KERNEL32(0000006F,?,6C86BE5C,00000010,6CA55C00,00000010,6C865A99,00000000,?,6C8D9E87,?), ref: 6C864992
                                  • GetLastError.KERNEL32(00000020), ref: 6C8649E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
                                  • String ID: Comctl32.dll$GetModuleHandleExW
                                  • API String ID: 3640817601-1171143627
                                  • Opcode ID: 6066c3c0f82b90ddd158ed0cea74801eff6818bfa376839ac150dec79078158b
                                  • Instruction ID: c042e1bff6649a0199c253e56de338840e949719b126fd035bd8e6dff4ac0856
                                  • Opcode Fuzzy Hash: 6066c3c0f82b90ddd158ed0cea74801eff6818bfa376839ac150dec79078158b
                                  • Instruction Fuzzy Hash: 0541FD70A01315AAEB30CB5ACE58BDD7778ABC4359F204A76E515F2E90DB3489C1CF24
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84A983
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84A9A6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84A9C6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84AA53
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84AA6B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                  • String ID: F^
                                  • API String ID: 3053331623-3468755180
                                  • Opcode ID: 61878ce14bb12210dd9990d316d2a5fee283e7d57305b3746ecc879c15117bbf
                                  • Instruction ID: d01e84942dbcddaf4ad837594c1661ba7651b2a76c438a2b4230e297e20fff23
                                  • Opcode Fuzzy Hash: 61878ce14bb12210dd9990d316d2a5fee283e7d57305b3746ecc879c15117bbf
                                  • Instruction Fuzzy Hash: 0731E275A0022A9FCF25CF54C980BDEBB74FB01728F158A39D8156BB40D730A945CBE2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84B113
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84B136
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B156
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B1E3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84B1FB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                  • String ID: 8W^
                                  • API String ID: 3053331623-2886785626
                                  • Opcode ID: c1a74bb27d419c9f1e57c4f562f49b5d6aeb2d34b8a2132f3b4580a55cf45a6b
                                  • Instruction ID: 2d45f7415f7aee3f2538a6962f529209999c9fa6795a4de0d179def992a501f4
                                  • Opcode Fuzzy Hash: c1a74bb27d419c9f1e57c4f562f49b5d6aeb2d34b8a2132f3b4580a55cf45a6b
                                  • Instruction Fuzzy Hash: B3310475A0062ADFCF25CF54C980BAEBB74FB45728F158A29D805A7B40D730A945CBE2
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C8F927E
                                  • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000228,6C8F5B2A,?,?,00000000,?,00000004,6C8F5552,80000000,?,80000000), ref: 6C8F9324
                                    • Part of subcall function 6C8B3367: __EH_prolog3.LIBCMT ref: 6C8B336E
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C8F9348
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,?,00000001), ref: 6C8F93FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                                  • String ID: Software\Classes\
                                  • API String ID: 854624316-1121929649
                                  • Opcode ID: fe21044c8cd60ed6edd9d8e9ce55d2c6589b2ccc9c266f5ca9503b763af38998
                                  • Instruction ID: b4924bb61aa94cf767906f7ac6abb768602ba895cda51c94b75df27c35ec751a
                                  • Opcode Fuzzy Hash: fe21044c8cd60ed6edd9d8e9ce55d2c6589b2ccc9c266f5ca9503b763af38998
                                  • Instruction Fuzzy Hash: E641E331901218EBDB31DFA8DE88BDD77B4AF44358F1449E9E415A3780DB70DB8ACA21
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C868932
                                  • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 6C868967
                                  • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 6C86898F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: CloseTouchInputHandle$GetTouchInputInfo$user32.dll
                                  • API String ID: 667068680-1853737257
                                  • Opcode ID: c58638540552b5de21fd1c2beddbf5922bf367e8ecba186c0cc1616fa7815914
                                  • Instruction ID: 9e587fa98dc5cf092fb9cd846c46acddeb3e81d4980ff33b12881aa9fe8eee2d
                                  • Opcode Fuzzy Hash: c58638540552b5de21fd1c2beddbf5922bf367e8ecba186c0cc1616fa7815914
                                  • Instruction Fuzzy Hash: DC310C78702326BBCF29CF16C9159597B74FB47B59711882AE849D3B40D735F802CB21
                                  APIs
                                  • IsWindow.USER32(?), ref: 6C951347
                                  • SendMessageW.USER32(?,00000439,00000000,?), ref: 6C95138C
                                  • SendMessageW.USER32(?,00000410,00000000,?), ref: 6C9513D0
                                  • ScreenToClient.USER32(00000000,?), ref: 6C9513F8
                                  • SendMessageW.USER32(?,00000407,00000000,?), ref: 6C951420
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$ClientScreenWindow
                                  • String ID: \sx
                                  • API String ID: 4074774880-995570312
                                  • Opcode ID: 277b525685f658d439dd80eae4fb17638f2a01282e63f40df8e05a77351faaf4
                                  • Instruction ID: a8a2d0e823ebd5d42e202cee09f487aad639cb83376699190f1d576f0d80f1fa
                                  • Opcode Fuzzy Hash: 277b525685f658d439dd80eae4fb17638f2a01282e63f40df8e05a77351faaf4
                                  • Instruction Fuzzy Hash: E931A971A01218ABDF04DF55C844ADEB7B8FF49714F104119FA15A7A90D770E955C7A0
                                  APIs
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C853F70
                                    • Part of subcall function 6C90C413: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C90C4AD
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C853FBE
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C853FF3
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C854004
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C854015
                                    • Part of subcall function 6C906035: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C9060B2
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C85404D
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C854094
                                    • Part of subcall function 6C8DA822: DestroyMenu.USER32(?), ref: 6C8DA86B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::$DestroyMenu
                                  • String ID:
                                  • API String ID: 1488951477-0
                                  • Opcode ID: 2ed30c9fb89dc0179f28cd788591cfdda86fe8710586c2f785ee2bc0007bb08a
                                  • Instruction ID: f7ad9e73cc448375984cca6fde3174ac8eec690865b77670187b34cf6f8b65df
                                  • Opcode Fuzzy Hash: 2ed30c9fb89dc0179f28cd788591cfdda86fe8710586c2f785ee2bc0007bb08a
                                  • Instruction Fuzzy Hash: D1411D71241A029BC22DEF78C5619E9F760BF65308B80093DC46A03F60EF71769DCB91
                                  APIs
                                  • FillRect.USER32(?,?,-000000A0), ref: 6C8634C6
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C8634D4
                                  • PatBlt.GDI32(?,?,?,00000001,?,005A0049), ref: 6C8634FA
                                  • PatBlt.GDI32(?,?,?,?,00000001,005A0049), ref: 6C863513
                                  • PatBlt.GDI32(?,00000000,?,00000001,?,005A0049), ref: 6C86352C
                                  • PatBlt.GDI32(?,?,?,00000000,00000001,005A0049), ref: 6C863548
                                  • FillRect.USER32(?,?,-000000D0), ref: 6C86356B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Fill$Inflate
                                  • String ID:
                                  • API String ID: 2224923502-0
                                  • Opcode ID: 45ab9651786ef5b515b2a3baecf9bcf12959a1b908dd950dbce44541d04716d4
                                  • Instruction ID: 496ca6708c3751d2b95b8252b8cdfdc3e815f4d39317e0dd5f8e6f7d4fc5430d
                                  • Opcode Fuzzy Hash: 45ab9651786ef5b515b2a3baecf9bcf12959a1b908dd950dbce44541d04716d4
                                  • Instruction Fuzzy Hash: 1631FB72200209BFDF159F58CD49EAA3BBDFB09354F008524F925C66A1D771ED61CBA0
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,6C9E5D9C,?,6C9DFDF6,00000000,00000000,00000008,?,6C9E6006,00000022,FlsSetValue,6CA3E480,6CA3E488,00000000), ref: 6C9E5D4E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: 6eb6ae7aad500ea85a9cb9d86f1cb7b005745df1b59b16c33e6207cd7952d360
                                  • Instruction ID: 5fb70c0746e8dcdc1b15924fc0edbcde648f99d702c99d0b8801a727e88383fb
                                  • Opcode Fuzzy Hash: 6eb6ae7aad500ea85a9cb9d86f1cb7b005745df1b59b16c33e6207cd7952d360
                                  • Instruction Fuzzy Hash: E7213D35B01712ABDB139B25CC48A4A377CAF273ACF254614ED15E7780D730E942C6E0
                                  APIs
                                  • DeleteObject.GDI32(00000000), ref: 6C85B9AF
                                  • GetObjectW.GDI32(0000005C,?), ref: 6C85B9C2
                                    • Part of subcall function 6C86FA11: SystemParametersInfoW.USER32(00000029,?,?,00000000), ref: 6C86FA2D
                                  • CreateFontIndirectW.GDI32(?), ref: 6C85BA05
                                  • SendMessageW.USER32(?,00000030,?,00000001), ref: 6C85BA28
                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 6C85BA37
                                  • SendMessageW.USER32(?,00000030,?,00000001), ref: 6C85BA4B
                                  • SendMessageW.USER32(?,00000030,?,00000001), ref: 6C85BA5B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$Object$CreateDeleteFontIndirectInfoParametersSystem
                                  • String ID:
                                  • API String ID: 2281635968-0
                                  • Opcode ID: 2d474c79235e14286477f6de81dd4b0758244cf5d386dbba0a9278b413b941a0
                                  • Instruction ID: b29114a6a8149bdc0b1cb180b0b83d16aa8f70564cf31a01c7ade74792c0edbd
                                  • Opcode Fuzzy Hash: 2d474c79235e14286477f6de81dd4b0758244cf5d386dbba0a9278b413b941a0
                                  • Instruction Fuzzy Hash: 6021C631314305AFDB259FA8CC44FEABBADFB89355F000639F658C6290DB7199198BA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(?,?,?,?,user32.dll,?,?,00000000,?,6C867E77,00000000,00000000), ref: 6C86977A
                                  • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 6C86978C
                                  • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 6C86979A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                  • API String ID: 667068680-2470269259
                                  • Opcode ID: dd76f887516c6bf0eed996f7f937d96af0477b92792ea39d044f58eed7f02a7c
                                  • Instruction ID: 8edfea2d16aea95aef77d94d81e6655b95aa2891f8f59b0abad29998c5e50aad
                                  • Opcode Fuzzy Hash: dd76f887516c6bf0eed996f7f937d96af0477b92792ea39d044f58eed7f02a7c
                                  • Instruction Fuzzy Hash: AA1103327016196BCB151F66E888A5AFB78FF463ACB00452AE904C3E40DF71EC568BE0
                                  APIs
                                  • FillRect.USER32(?,?,00000000), ref: 6C8630B5
                                  • GetParent.USER32(?), ref: 6C8630C7
                                  • GetClientRect.USER32(?,?), ref: 6C8630DA
                                  • GetParent.USER32(?), ref: 6C8630E3
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C8630FB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ParentRect$ClientFillPointsWindow
                                  • String ID: \sx
                                  • API String ID: 3058756167-995570312
                                  • Opcode ID: 3c6b55c6071811719b042d6d5187b958c62ce4a138bda8955cfde9084be3f7dc
                                  • Instruction ID: ef01ceaa3d49efbe32f2897203866fdccb1820e1bcde902543979ce5da49ad30
                                  • Opcode Fuzzy Hash: 3c6b55c6071811719b042d6d5187b958c62ce4a138bda8955cfde9084be3f7dc
                                  • Instruction Fuzzy Hash: 6721A432B00119AFCF04DFA4C949CAEBBB9FF0A304B114159F505A7611DB31AE5ACBD1
                                  APIs
                                  • IsWindow.USER32(00000000), ref: 6C867B60
                                  • FindResourceW.KERNEL32(?,00000000,AFX_DIALOG_LAYOUT), ref: 6C867B88
                                  • SizeofResource.KERNEL32(?,00000000), ref: 6C867B9A
                                  • LoadResource.KERNEL32(?,00000000), ref: 6C867BA6
                                  • LockResource.KERNEL32(00000000), ref: 6C867BB1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeofWindow
                                  • String ID: AFX_DIALOG_LAYOUT
                                  • API String ID: 2582447065-2436846380
                                  • Opcode ID: 24bd68c865d00987f552452a87bce12e9dc91eab33ce701412a15955f322deb4
                                  • Instruction ID: 2c3635d951dab94736a8b4866f2baad19563aa99bfbae79028040f7a8f1f057f
                                  • Opcode Fuzzy Hash: 24bd68c865d00987f552452a87bce12e9dc91eab33ce701412a15955f322deb4
                                  • Instruction Fuzzy Hash: 45118271701305BBEB224B768D48EAE7ABCEF45799B104839B905D2A00EF74D842C6B4
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: AQUA_$BLACK_$BLUE_$IDX_OFFICE2007_STYLE$SILVER_
                                  • API String ID: 431132790-2717817858
                                  • Opcode ID: 0aa6863f62ea559504f6d4c4a7be43abdc653006825505952d13ef75b5b3d701
                                  • Instruction ID: 4c18b0a202a215b28c73a897fe016a71fdcb435b5244ce51018b3de5fb470dd7
                                  • Opcode Fuzzy Hash: 0aa6863f62ea559504f6d4c4a7be43abdc653006825505952d13ef75b5b3d701
                                  • Instruction Fuzzy Hash: 7A11277240020D9BCB24DBACCB50AFF77B5AFA1318F154D19E411ABF80CB319A5AC762
                                  APIs
                                  • CopyRect.USER32(00000001,00000000), ref: 6C8DFC75
                                  • InflateRect.USER32(00000001,000000FF,000000FF), ref: 6C8DFC8C
                                  • InvalidateRect.USER32(00000000,00000001,00000000,?,00000001), ref: 6C8DFCA0
                                  • UpdateWindow.USER32(00000000), ref: 6C8DFCA9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$CopyInflateInvalidateUpdateWindow
                                  • String ID: 4(@P$\sx
                                  • API String ID: 1253262389-2506994739
                                  • Opcode ID: 03cf1f527e9da75a3856d72da7e2335ff8489857bc457bfb4c2a50ab9653b8e7
                                  • Instruction ID: 85bae31487311bc9d3395d0a1cbc36cff8ba8ac45ffc6c10edb48d57ba836144
                                  • Opcode Fuzzy Hash: 03cf1f527e9da75a3856d72da7e2335ff8489857bc457bfb4c2a50ab9653b8e7
                                  • Instruction Fuzzy Hash: E501B932701615EBCB10DF68D908A9F77F8FF19359F124A29E411D2580DB30EA16D791
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8F70C4
                                    • Part of subcall function 6C9902D7: __EH_prolog3.LIBCMT ref: 6C9902DE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: $File%d$PreviewPages$Recent File List$Settings
                                  • API String ID: 431132790-2750173842
                                  • Opcode ID: d3b58e45f3441751d1ac251f05aaa0127bc9b6c31ce1a0301cd0439767334fa5
                                  • Instruction ID: d515efa09beb3ee9ba71064289acba3b867c8a5f048d215bcdda0bc6a3413fb6
                                  • Opcode Fuzzy Hash: d3b58e45f3441751d1ac251f05aaa0127bc9b6c31ce1a0301cd0439767334fa5
                                  • Instruction Fuzzy Hash: CD01F5307003189FEB149F60C845B9C3AA17F58364F11456AED20DFFC2DB748986CB61
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,78E4735C,?,?,00000000,6C9F5700,000000FF,?,6C9D7DC6,00000000,?,6C9D7D9A,?), ref: 6C9D7E61
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C9D7E73
                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,6C9F5700,000000FF,?,6C9D7DC6,00000000,?,6C9D7D9A,?), ref: 6C9D7E95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$\sx$mscoree.dll
                                  • API String ID: 4061214504-3671566553
                                  • Opcode ID: ba367937d7838cc97fde5d69dca16c4ff270b7c4b0eb0a2bdf0c19e04b593c85
                                  • Instruction ID: 383a9840e6a610edfcb5e7d670873990d285a79617750b058a8aa739a6ec06fb
                                  • Opcode Fuzzy Hash: ba367937d7838cc97fde5d69dca16c4ff270b7c4b0eb0a2bdf0c19e04b593c85
                                  • Instruction Fuzzy Hash: 2801AC31A0062AAFDF059F50CC04FAF7BB8FB45758F01861AF821E2690D735D901CB60
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6C86EFB2,?,?,00000002,00000000,0000007D,00000001,00000000,?,6C8542BA,?,50008200,0000E801), ref: 6C944DE4
                                  • GetProcAddress.KERNEL32(00000000,BeginBufferedPaint), ref: 6C944DF4
                                  • EncodePointer.KERNEL32(00000000,?,6C86EFB2,?,?,00000002,00000000,0000007D,00000001,00000000,?,6C8542BA,?,50008200,0000E801,00000000), ref: 6C944DFD
                                  • DecodePointer.KERNEL32(00000000,?,?,6C86EFB2,?,?,00000002,00000000,0000007D,00000001,00000000,?,6C8542BA,?,50008200,0000E801), ref: 6C944E0B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BeginBufferedPaint$uxtheme.dll
                                  • API String ID: 2061474489-1632326970
                                  • Opcode ID: 22aea6692019fb93b31434f98676e55f611c03efc18f770e19065fb94ddb0d13
                                  • Instruction ID: 04612d656e6a0f6ad60fbdc09afc7dc7790b1b35fba88eb080b290fbdef92641
                                  • Opcode Fuzzy Hash: 22aea6692019fb93b31434f98676e55f611c03efc18f770e19065fb94ddb0d13
                                  • Instruction Fuzzy Hash: 37F0F935B4172AAB9F065EA48C08D5B3F78BB05799744C514F915D2510D731C8628FA0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(shell32.dll,?,?,6C9A18E4,?,00000000,6CA30AA0,6C9A1BB2), ref: 6C945634
                                  • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 6C945644
                                  • EncodePointer.KERNEL32(00000000,?,6C9A18E4,?,00000000,6CA30AA0,6C9A1BB2), ref: 6C94564D
                                  • DecodePointer.KERNEL32(00000000,?,?,6C9A18E4,?,00000000,6CA30AA0,6C9A1BB2), ref: 6C94565B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: SHCreateItemFromParsingName$shell32.dll
                                  • API String ID: 2061474489-2320870614
                                  • Opcode ID: c5418845b8fbe7b58bdfef3b975d3de4998925ab780895589e2b7a4bc88c6f05
                                  • Instruction ID: cbf56af40780850220cef961b0e85ac61ecbae7b16558a45d83396c358434264
                                  • Opcode Fuzzy Hash: c5418845b8fbe7b58bdfef3b975d3de4998925ab780895589e2b7a4bc88c6f05
                                  • Instruction Fuzzy Hash: 22F03A7570172BAB9F066FA48C0C95A3F78BB067AA704C118FD09E7A10D735C8538BB4
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll,?,?,6C8A7DEF,00000323,00000001,?,00000004,6C853C52,?,?,?,?,6C9F3DA0,000000FF), ref: 6C944EF3
                                  • GetProcAddress.KERNEL32(00000000,ChangeWindowMessageFilter), ref: 6C944F03
                                  • EncodePointer.KERNEL32(00000000,?,?,6C8A7DEF,00000323,00000001,?,00000004,6C853C52,?,?,?,?,6C9F3DA0,000000FF), ref: 6C944F0C
                                  • DecodePointer.KERNEL32(00000000,?,?,6C8A7DEF,00000323,00000001,?,00000004,6C853C52,?,?,?,?,6C9F3DA0,000000FF), ref: 6C944F1A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                  • API String ID: 2061474489-2498399450
                                  • Opcode ID: ec08b492f85465332bba77d63184a6a15f21fe3c01eee36a6b7a70389feb24b0
                                  • Instruction ID: 86a41caf5a6bcb7282139acc322d41dc696ccfe8a1fce2b107daceffd6625ca6
                                  • Opcode Fuzzy Hash: ec08b492f85465332bba77d63184a6a15f21fe3c01eee36a6b7a70389feb24b0
                                  • Instruction Fuzzy Hash: F7F05834B06B26AB9F062F65880880A3EBCBB0669A301C565FC05D6A00DB35C8638FB0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6C86F20D,?,00000001), ref: 6C94522C
                                  • GetProcAddress.KERNEL32(00000000,EndBufferedPaint), ref: 6C94523C
                                  • EncodePointer.KERNEL32(00000000,?,?,6C86F20D,?,00000001), ref: 6C945245
                                  • DecodePointer.KERNEL32(00000000,?,?,6C86F20D,?,00000001), ref: 6C945253
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: EndBufferedPaint$uxtheme.dll
                                  • API String ID: 2061474489-2993015961
                                  • Opcode ID: d10f06bb731a4c2a8509f0760d22855b1f239d9af57db2b72bc986e8b3034561
                                  • Instruction ID: be1614a2a208d2ef3b69e8f2118bfa1a81a5a78e2e9e45cfa4562ce215ca0955
                                  • Opcode Fuzzy Hash: d10f06bb731a4c2a8509f0760d22855b1f239d9af57db2b72bc986e8b3034561
                                  • Instruction Fuzzy Hash: 95F05E75B01726AB8F096BA4880C80A3F7CAE06799300C526FC09E7610D735C8438AB0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,6C86F467,00000800,00000800,?,?,6C8DF71E,00000800,00000018,6C8DF703,00000800,00000000,?,0000007D), ref: 6C944E9B
                                  • GetProcAddress.KERNEL32(00000000,BufferedPaintUnInit), ref: 6C944EAB
                                  • EncodePointer.KERNEL32(00000000,?,6C86F467,00000800,00000800,?,?,6C8DF71E,00000800,00000018,6C8DF703,00000800,00000000,?,0000007D), ref: 6C944EB4
                                  • DecodePointer.KERNEL32(00000000,?,6C86F467,00000800,00000800,?,?,6C8DF71E,00000800,00000018,6C8DF703,00000800,00000000,?,0000007D), ref: 6C944EC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BufferedPaintUnInit$uxtheme.dll
                                  • API String ID: 2061474489-1501038116
                                  • Opcode ID: 667d373ab30ccafdfb4ccb635649f2bac13a85c2043a08a76969403ffb983187
                                  • Instruction ID: 9f984f1c94d4056eda24ccab22ac65614b47b4358c3ac7a4552504792bf07d49
                                  • Opcode Fuzzy Hash: 667d373ab30ccafdfb4ccb635649f2bac13a85c2043a08a76969403ffb983187
                                  • Instruction Fuzzy Hash: 0DE03971B01B23AB9F152F34A81C95F3A78AA4229A306C618F802D3A00DB35C8438EB0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,6C86EF84,00000001,00000000,?,6C8542BA,?,50008200,0000E801,00000000,0000E828,0000E831,00000001,0000007E,?), ref: 6C944E46
                                  • GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6C944E56
                                  • EncodePointer.KERNEL32(00000000,?,6C8542BA,?,50008200,0000E801,00000000,0000E828,0000E831,00000001,0000007E,?,00000001,0000007D,?,00000800), ref: 6C944E5F
                                  • DecodePointer.KERNEL32(00000000,?,6C86EF84,00000001,00000000,?,6C8542BA,?,50008200,0000E801,00000000,0000E828,0000E831,00000001,0000007E,?), ref: 6C944E6D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BufferedPaintInit$uxtheme.dll
                                  • API String ID: 2061474489-1331937065
                                  • Opcode ID: 25a560bc045f7223e267266e7fd67719941756b45d25131ede9a92d8ecd10f85
                                  • Instruction ID: e93813062152a39ea8c052796cab8d3ea274ec40fdc93eadd865217ea548852d
                                  • Opcode Fuzzy Hash: 25a560bc045f7223e267266e7fd67719941756b45d25131ede9a92d8ecd10f85
                                  • Instruction Fuzzy Hash: D4E0E575701733ABEF156F74A80C95B3A7C6B4669A305C655F811D7900DB35C8834FB1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(shell32.dll,?,6C865A3E,?,?,6C8F9D91,000FC000,00000010,00000048,6C8F9D36,00000000,6C89F93B,?), ref: 6C9454D0
                                  • GetProcAddress.KERNEL32(00000000,InitNetworkAddressControl), ref: 6C9454E0
                                  • EncodePointer.KERNEL32(00000000,?,?,6C8F9D91,000FC000,00000010,00000048,6C8F9D36,00000000,6C89F93B,?), ref: 6C9454E9
                                  • DecodePointer.KERNEL32(00000000,?,6C865A3E,?,?,6C8F9D91,000FC000,00000010,00000048,6C8F9D36,00000000,6C89F93B,?), ref: 6C9454F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: InitNetworkAddressControl$shell32.dll
                                  • API String ID: 2061474489-1950653938
                                  • Opcode ID: 41efed84e8726a2c2ecd4a780a26ab31ec6d88e3290c8fd288d07aa4050fcff8
                                  • Instruction ID: 86ecd157e3b8ff82eda7ce8689d9ccf63659fa1528ddc8baa461981dceb751bc
                                  • Opcode Fuzzy Hash: 41efed84e8726a2c2ecd4a780a26ab31ec6d88e3290c8fd288d07aa4050fcff8
                                  • Instruction Fuzzy Hash: F0E0ED35B05B339F9F0A2BB4980C55B3A78BB4669A345C669FC02D7604DB35C84387B0
                                  APIs
                                  • GetSysColor.USER32(0000000F), ref: 6C931FF3
                                  • GetSysColor.USER32(00000010), ref: 6C931FFE
                                  • GetSysColor.USER32(00000014), ref: 6C932009
                                  • GetSysColor.USER32(00000012), ref: 6C932014
                                  • GetSysColor.USER32(00000006), ref: 6C93201F
                                  • GetSysColorBrush.USER32(0000000F), ref: 6C93202A
                                  • GetSysColorBrush.USER32(00000006), ref: 6C932035
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$Brush
                                  • String ID:
                                  • API String ID: 2798902688-0
                                  • Opcode ID: bc3c56ecf5266cad551e5887ea84e2670c25d01e7733dff4e8b60025990576ce
                                  • Instruction ID: f75345f7e9a4751d9fe72c59f7d80610adc3576d121f2527f091924d3ff4ab37
                                  • Opcode Fuzzy Hash: bc3c56ecf5266cad551e5887ea84e2670c25d01e7733dff4e8b60025990576ce
                                  • Instruction Fuzzy Hash: 7CF0FE71B407019BDB645FB0890D75A7AF0FB09766F00891DE242CB980E776D487DF50
                                  APIs
                                    • Part of subcall function 6C86CC71: ShowWindow.USER32(?,6C9AEDF4,00000000,?,6C87A7D4,00000000,?,?,6C9AEDF4,?,00000000,?,?,6C87A374,00000000,000000FF), ref: 6C86CC82
                                  • GetDesktopWindow.USER32 ref: 6C87A808
                                  • GetWindow.USER32(00000000), ref: 6C87A80F
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6C87A83D
                                  • ShowWindow.USER32(00000000,00000000,?,6C9AEDF4,6C9AEDF4,?,?,6C9AEDF4,?,00000000,?,?,6C87A374,00000000,000000FF,00000000), ref: 6C87A858
                                  • ShowWindow.USER32(00000000,00000004,?,6C9AEDF4,6C9AEDF4,?,?,6C9AEDF4,?,00000000,?,?,6C87A374,00000000,000000FF,00000000), ref: 6C87A879
                                  • GetWindow.USER32(00000000,00000002), ref: 6C87A886
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Show$DesktopLong
                                  • String ID:
                                  • API String ID: 3178490500-0
                                  • Opcode ID: 82040cc3a2322f5d06af3f1d692794924471ab1ba272a02ff6b8a5a79e469a79
                                  • Instruction ID: a79b97f0bcebdcc97b77afffd16b082b37b7440e8cf845e1f90837ca03277a8b
                                  • Opcode Fuzzy Hash: 82040cc3a2322f5d06af3f1d692794924471ab1ba272a02ff6b8a5a79e469a79
                                  • Instruction Fuzzy Hash: 1BA114317016259BDB388F28C980BDE7764EF45368F148A69EC19DBA40EB34DD428BF0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C9A450F
                                  • GetDC.USER32(?), ref: 6C9A4650
                                    • Part of subcall function 6C90426F: __EH_prolog3.LIBCMT ref: 6C904276
                                  • ReleaseDC.USER32(?,00000000), ref: 6C9A46BA
                                  • GetDeviceCaps.GDI32(?,00000058), ref: 6C9A46E1
                                  • GetDeviceCaps.GDI32(?,0000005A), ref: 6C9A46F5
                                  • ShowScrollBar.USER32(?,00000001,00000000,00000001,00000001,00000001,6CA31110,6CA31110), ref: 6C9A47AE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CapsDevice$H_prolog3H_prolog3_ReleaseScrollShow
                                  • String ID:
                                  • API String ID: 3992271784-0
                                  • Opcode ID: c2351f8214a5d3fd5d3e366415d0594675ea97875ade848f14f62a1755f75d7b
                                  • Instruction ID: 8aa5570a749443cc06b1a28740012a19c57edda64f6064b873a799570246c188
                                  • Opcode Fuzzy Hash: c2351f8214a5d3fd5d3e366415d0594675ea97875ade848f14f62a1755f75d7b
                                  • Instruction Fuzzy Hash: 9C910374B012119FDB08CF68C994BA97BB5BF49354F1541B9E909EB7A1CB34A902CFA0
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C85324C
                                  • SendMessageW.USER32(?,00001109,00000000,?), ref: 6C8532A5
                                  • LoadBitmapW.USER32(?,-000000AF), ref: 6C85334E
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6C85336A
                                  • ImageList_AddMasked.COMCTL32(?,00000000,00FF00FF,00000010,?,00000005,00000000,00000000,?,50402808,000000A9,00000000,?,00000004), ref: 6C8533A3
                                  • SendMessageW.USER32(?,00001109,00000000,?), ref: 6C8533C2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$BitmapEmptyImageList_LoadMaskedObjectRect
                                  • String ID:
                                  • API String ID: 2800448286-0
                                  • Opcode ID: 3306a4c373726d1d96a32454e297bf239d78cea2abd2c43737b7f2407b67442e
                                  • Instruction ID: ec4de100fd94c7eca343d47ff6dd4e12a43b89b199315d4bc41d854e7a566dbd
                                  • Opcode Fuzzy Hash: 3306a4c373726d1d96a32454e297bf239d78cea2abd2c43737b7f2407b67442e
                                  • Instruction Fuzzy Hash: E151BE31740706AFEB259B68CD59FEEB3A8FF08705F104638F615A76C0CB70A9558BA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C91E2CD
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91E351
                                  • CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 6C91E381
                                  • SelectObject.GDI32(?,00000000), ref: 6C91E3D4
                                    • Part of subcall function 6C91FD99: FillRect.USER32(56010845,?,?), ref: 6C91FDD3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreate$BitmapFillH_prolog3_ObjectRectSelect
                                  • String ID:
                                  • API String ID: 527521954-0
                                  • Opcode ID: 24acebe4c00f4bbdc2c4256eb30dfbe76cd09b87700c1c2d83469680795dec6d
                                  • Instruction ID: 21311af68de6cc8a15725205172b79fa773d423e1dd016e2278dc7b106085d91
                                  • Opcode Fuzzy Hash: 24acebe4c00f4bbdc2c4256eb30dfbe76cd09b87700c1c2d83469680795dec6d
                                  • Instruction Fuzzy Hash: 9E51F771901209EFDF06DFE5CA49AEEBBB5BF08308F154015E904BBA90D731D915CBA1
                                  APIs
                                  • GetBkColor.GDI32(?), ref: 6C862C30
                                  • GetTextColor.GDI32(?), ref: 6C862CDC
                                  • GetBkColor.GDI32(?), ref: 6C862ECE
                                  • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 6C862FE7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$DrawIconText
                                  • String ID: \sx
                                  • API String ID: 2759393849-995570312
                                  • Opcode ID: ea6bfcf5773d4103a1469fa1556a8d3f1161af45c28e9817f5d0289321027d79
                                  • Instruction ID: d348bcd68685dfacbeea4a9e617bbd2364476915c2671bf9c42cf2adee48940e
                                  • Opcode Fuzzy Hash: ea6bfcf5773d4103a1469fa1556a8d3f1161af45c28e9817f5d0289321027d79
                                  • Instruction Fuzzy Hash: DDE16E31A00219DFCF14CFA9C988A9EBBB6BF48318F154569E815EB790C774AD46CF90
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8F98A6
                                  • WSAStartup.WS2_32(00000101,?), ref: 6C8F98EB
                                  • WSACleanup.WS2_32 ref: 6C8F993A
                                  • WSASetLastError.WS2_32(0000276C), ref: 6C8F9945
                                  • WSACleanup.WS2_32 ref: 6C8F99E5
                                  • FreeLibrary.KERNEL32(?,6C8F9A00,?,6C8F9A00,00000198,6C858564,00000000), ref: 6C8F99EE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Cleanup$ErrorFreeH_prolog3_LastLibraryStartup
                                  • String ID:
                                  • API String ID: 700773300-0
                                  • Opcode ID: 5eed68276618a75eb77c61a2bb40f81acad239defaeeb9fd13f97b8c8ef474b0
                                  • Instruction ID: 7aa6231c4029c05651d13b8d8f6e6922d5f14d22c4e26c568c0ecee5256e3b95
                                  • Opcode Fuzzy Hash: 5eed68276618a75eb77c61a2bb40f81acad239defaeeb9fd13f97b8c8ef474b0
                                  • Instruction Fuzzy Hash: 6C410530B02716DBEB319F798B447C976A0BF41798F118969E479CBE80DB70D982CB51
                                  APIs
                                  • GetFocus.USER32 ref: 6C9A1B25
                                  • IsWindowEnabled.USER32(00000000), ref: 6C9A1B5B
                                  • EnableWindow.USER32(00000000,00000000), ref: 6C9A1B73
                                  • EnableWindow.USER32(00000000,00000001), ref: 6C9A1C14
                                  • IsWindow.USER32(00000000), ref: 6C9A1C1B
                                  • SetFocus.USER32(00000000), ref: 6C9A1C26
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$EnableFocus$Enabled
                                  • String ID:
                                  • API String ID: 1303138515-0
                                  • Opcode ID: 4ed74ec59c42cd70c004f529779f0d0b890906e9fe2060b39c272fd81e36c1d0
                                  • Instruction ID: 6ad00a1d6829ac37391759cfe1f0e3eddde56a6ba2ecd148fb8cae5b49e085a8
                                  • Opcode Fuzzy Hash: 4ed74ec59c42cd70c004f529779f0d0b890906e9fe2060b39c272fd81e36c1d0
                                  • Instruction Fuzzy Hash: 3441A230701701EFDB099FB4C888B99B7B9FF06358F058169E0199B6A1DB70E85BCB91
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8E64F0
                                    • Part of subcall function 6C898448: __EH_prolog3.LIBCMT ref: 6C89844F
                                    • Part of subcall function 6C898448: SetRectEmpty.USER32 ref: 6C898539
                                    • Part of subcall function 6C898448: SetRectEmpty.USER32(?), ref: 6C898564
                                    • Part of subcall function 6C87C53E: __EH_prolog3.LIBCMT ref: 6C87C545
                                  • SetRectEmpty.USER32(?), ref: 6C8E665B
                                  • SetRectEmpty.USER32(?), ref: 6C8E666A
                                  • SetRectEmpty.USER32(?), ref: 6C8E6671
                                  • SetRectEmpty.USER32(?), ref: 6C8E6678
                                  • SetRectEmpty.USER32(?), ref: 6C8E66A2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect$H_prolog3
                                  • String ID:
                                  • API String ID: 3752103406-0
                                  • Opcode ID: 400b7d2892b2605ac120d9c1a3bfd33dc1d6308293c3603284d7f00bafee45f5
                                  • Instruction ID: e41cf0c7cf856a565a30ded4ac53475904e6ed3db807e647d72d1a7f8e07804e
                                  • Opcode Fuzzy Hash: 400b7d2892b2605ac120d9c1a3bfd33dc1d6308293c3603284d7f00bafee45f5
                                  • Instruction Fuzzy Hash: 7551A2F0901B018FC794CF29C588699BBE4BF98218F2889BEC65DCB212EB365546CF14
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C965DD8
                                  • GetMenuItemCount.USER32(?), ref: 6C965DFE
                                  • GetMenuItemID.USER32(?,00000000), ref: 6C965E15
                                  • GetMenuState.USER32(?,00000000,00000400), ref: 6C965E2D
                                  • GetSubMenu.USER32(?,00000000), ref: 6C965EA0
                                    • Part of subcall function 6C89BF88: GetMenuStringW.USER32(00000000,00000000,00000000,00000000,?), ref: 6C89BF9C
                                    • Part of subcall function 6C89BF88: GetMenuStringW.USER32(00000000,00000000,00000000,00000001,?), ref: 6C89BFC0
                                    • Part of subcall function 6C965B4B: __EH_prolog3.LIBCMT ref: 6C965B52
                                  • ModifyMenuW.USER32(?,00000000,00000400,00000000,?), ref: 6C965E87
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$H_prolog3ItemString$CountModifyState
                                  • String ID:
                                  • API String ID: 2436308985-0
                                  • Opcode ID: dc80af18dd5a76ba392cfc47ac6faccd01577452e7dd713e630ce3989f7b8a43
                                  • Instruction ID: ef6613bab4d11f485220057d4f40f168a9720b0c0fb160afd6c810f995b4b4cf
                                  • Opcode Fuzzy Hash: dc80af18dd5a76ba392cfc47ac6faccd01577452e7dd713e630ce3989f7b8a43
                                  • Instruction Fuzzy Hash: 8B21C330601206BBEF159B65CD58BFEBA75BF10349F108528E125A6ED1DB30D956CB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86F681
                                  • CreateRectRgnIndirect.GDI32(00000000), ref: 6C86F6A1
                                    • Part of subcall function 6C86E5F5: SelectClipRgn.GDI32(?,00000000), ref: 6C86E615
                                    • Part of subcall function 6C86E5F5: SelectClipRgn.GDI32(?,00000000), ref: 6C86E62B
                                  • GetParent.USER32(00000000), ref: 6C86F6C1
                                  • DrawThemeParentBackground.UXTHEME(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00000018), ref: 6C86F6E2
                                  • MapWindowPoints.USER32(00000000,?,00000000,00000001), ref: 6C86F716
                                  • SendMessageW.USER32(?,00000014,00000000,00000000), ref: 6C86F742
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClipParentSelect$BackgroundCreateDrawH_prolog3IndirectMessagePointsRectSendThemeWindow
                                  • String ID:
                                  • API String ID: 935984306-0
                                  • Opcode ID: 39bee5692e9f587c5310d5cd3a0cc065181bb867184011fceaaa7c49d77c2fc9
                                  • Instruction ID: bb44d91de4c9a4e6b2ddc281a2e27d820111d7310ad460aa055991ff35bebd0f
                                  • Opcode Fuzzy Hash: 39bee5692e9f587c5310d5cd3a0cc065181bb867184011fceaaa7c49d77c2fc9
                                  • Instruction Fuzzy Hash: 09314F71A0020AEFCF11CFE5CA49BEE7BB5BF18345F104828E505A6A60DB75D909DB90
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(78E4735C,00000000,00000000,00000000), ref: 6C9E4ACC
                                    • Part of subcall function 6C9EA918: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C9E9427,?,00000000,-00000008), ref: 6C9EA979
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C9E4D1E
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C9E4D64
                                  • GetLastError.KERNEL32 ref: 6C9E4E07
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID: \sx
                                  • API String ID: 2112829910-995570312
                                  • Opcode ID: e67080a9a5898833edb89096b9efc7cc1c600dae5525344c874495b99b8ae9dd
                                  • Instruction ID: 7d5583d84b1c91de476183e3896414ac273a182724f004fda849a9942bb6bd9f
                                  • Opcode Fuzzy Hash: e67080a9a5898833edb89096b9efc7cc1c600dae5525344c874495b99b8ae9dd
                                  • Instruction Fuzzy Hash: DED149B5E042599FCB06CFE8C880AADBBB9BF19314F14856AE425EB741D730E946CF50
                                  APIs
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6C872A82
                                  • GetParent.USER32(?), ref: 6C872A90
                                  • GetParent.USER32(?), ref: 6C872AA7
                                  • GetLastActivePopup.USER32(?), ref: 6C872ABA
                                  • IsWindowEnabled.USER32(?), ref: 6C872ACE
                                  • EnableWindow.USER32(?,00000000), ref: 6C872AE1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                  • String ID:
                                  • API String ID: 670545878-0
                                  • Opcode ID: ee212f9332e1a0a7d64a369bf5d81934d87afea881045ca9a07afe8aba966d5a
                                  • Instruction ID: 2598202bbf10179058e6a58b5a99a6e5523fc3c0883356edb012cc2f7343e20c
                                  • Opcode Fuzzy Hash: ee212f9332e1a0a7d64a369bf5d81934d87afea881045ca9a07afe8aba966d5a
                                  • Instruction Fuzzy Hash: 4A11B732701722DBDE315A5A4A4CB5FB6B86F16B98F170974EC14E7600FB28CC0246F0
                                  APIs
                                  • LoadMenuW.USER32(?,000000C8), ref: 6C9A0430
                                  • LoadAcceleratorsW.USER32(?,000000C8), ref: 6C9A043F
                                  • LoadMenuW.USER32(?,FFFFFFFF), ref: 6C9A0460
                                  • LoadAcceleratorsW.USER32(?,FFFFFFFF), ref: 6C9A046F
                                  • LoadMenuW.USER32(?,00000001), ref: 6C9A0490
                                  • LoadAcceleratorsW.USER32(?,00000001), ref: 6C9A049F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Load$AcceleratorsMenu
                                  • String ID:
                                  • API String ID: 144087665-0
                                  • Opcode ID: 0425e14585758550cdbe44e4b023eecdc7541727cfc1d89b5017ae45e4dbe498
                                  • Instruction ID: 2a6d4bc2a2cfc78f08647f529aa0ea4d6ebaa2118f4a0fdef78f0aac62af2e18
                                  • Opcode Fuzzy Hash: 0425e14585758550cdbe44e4b023eecdc7541727cfc1d89b5017ae45e4dbe498
                                  • Instruction Fuzzy Hash: C621DB71601A67EFC7549FA698484E9F7F8FF0531A304912EFA5182A00E734A862CFB1
                                  APIs
                                  • GetLastError.KERNEL32(00000001,?,6C9CCE3F,6C9C7B79,6C9C7E3C,?,6C9C8072,?,00000001,?,?,00000001,?,6CA65F78,0000000C,6C9C816B), ref: 6C9CCFF4
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C9CD002
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C9CD01B
                                  • SetLastError.KERNEL32(00000000,6C9C8072,?,00000001,?,?,00000001,?,6CA65F78,0000000C,6C9C816B,?,00000001,?), ref: 6C9CD06D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 037542f367e5205c126c4be44a792695462c4a4cc5000c92c1c9370d225364b5
                                  • Instruction ID: 07634a4b226e961b4258123defce9418eab59b063c933f43713959e402ccfbf0
                                  • Opcode Fuzzy Hash: 037542f367e5205c126c4be44a792695462c4a4cc5000c92c1c9370d225364b5
                                  • Instruction Fuzzy Hash: AE01283334D712DEAB19657E6C85AA63A68EB2367C7214329E81083AD0EF21D8079193
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: Alt, $Execute$Press$Separator
                                  • API String ID: 431132790-3451492657
                                  • Opcode ID: 12edcf87210b29454c4f4b18e680452d5cc86fe0ae4926f315807b2fe8974754
                                  • Instruction ID: eed8d8f837cf77f5c63109a2ee8651edbdd91358202b0b09aeb9cb0937677f47
                                  • Opcode Fuzzy Hash: 12edcf87210b29454c4f4b18e680452d5cc86fe0ae4926f315807b2fe8974754
                                  • Instruction Fuzzy Hash: 7F81C2316106058FDF14DF24C998FAE73A5BF55318F04486DE8429BB85DF38EA0ACBA1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect$Window
                                  • String ID: \sx
                                  • API String ID: 1945993337-995570312
                                  • Opcode ID: e3edff42905e6cc499f47ffb4f5e6374b7f2de88a27b179dc3542dde50287e68
                                  • Instruction ID: c3c8a9d85dd010fc2828ce3cfdc69097a47772a9336c58ea3be54591b9f79c33
                                  • Opcode Fuzzy Hash: e3edff42905e6cc499f47ffb4f5e6374b7f2de88a27b179dc3542dde50287e68
                                  • Instruction Fuzzy Hash: 96618971A05608CFDB05CF68C884BAA73F9BF09318F1441A9ED15AF686CB31EA46CF50
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84649A
                                  • __Getctype.LIBCPMT ref: 6C846503
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C846537
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C8465CC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 3327844093-1405518554
                                  • Opcode ID: fa79205635faae703a9fcd0ccc645605af39b70db5953a123dc6b20fec02dad8
                                  • Instruction ID: 7f308845407a1d0cab995a8797da06621a37c1a19853b964fbd08a6e557caa44
                                  • Opcode Fuzzy Hash: fa79205635faae703a9fcd0ccc645605af39b70db5953a123dc6b20fec02dad8
                                  • Instruction Fuzzy Hash: 555172B1D017589BEB10CFA8C944BCEBBB8AF24318F158514D814EB784E774EA48C7A2
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85C727
                                  • DrawThemeBackground.UXTHEME(00000000,?,00000001,00000000,?,00000000,?,?,?,?,?,?,?,0000001C), ref: 6C85C75B
                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 6C85C77D
                                  • DrawThemeBackground.UXTHEME(00000000,?,00000003,00000000,?,00000000,?,?,?,?,?,?,?,?,0000001C), ref: 6C85C7B5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: BackgroundDrawTheme$H_prolog3_InflateRect
                                  • String ID: %d%%
                                  • API String ID: 1553386484-1518462796
                                  • Opcode ID: 6cd139c5322d76630f296e27dba156096bb39b84963c156b6162c1dafd23d0fe
                                  • Instruction ID: d3f23e8b81aa2cc76ebc5c354b90b11cd5cf30d0804694d3ed16829648dde5e1
                                  • Opcode Fuzzy Hash: 6cd139c5322d76630f296e27dba156096bb39b84963c156b6162c1dafd23d0fe
                                  • Instruction Fuzzy Hash: FA414775A002099FDB44DFA8CD85BDE77B9BF4D318F540868E501AB690C7B0E916CFA0
                                  APIs
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • GetClientRect.USER32(?,?), ref: 6C86795A
                                  • IsMenu.USER32(00000000), ref: 6C867996
                                  • AdjustWindowRectEx.USER32(?,00000000,00000000,?), ref: 6C8679AE
                                  • GetClientRect.USER32(?,?), ref: 6C8679F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$ClientWindow$AdjustLongMenu
                                  • String ID: \sx
                                  • API String ID: 3435883281-995570312
                                  • Opcode ID: dd0a6f6158783f67167ddf4501cdeae1c299471fe2bffa1851cdce069279017c
                                  • Instruction ID: 7b915748bf6249e5cd0f6e0b9376dfa8d8d3e83c0cc59597f87ed8689aba58ef
                                  • Opcode Fuzzy Hash: dd0a6f6158783f67167ddf4501cdeae1c299471fe2bffa1851cdce069279017c
                                  • Instruction Fuzzy Hash: 37319331B00305AFDB14DBBACA48ABFB7B9FF55218F154929E901E7A41DB34A941C6A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: String$FreeH_prolog3
                                  • String ID: @
                                  • API String ID: 315669285-2766056989
                                  • Opcode ID: ca133a48a4390f29c995bad80975ac4391a14a2b7eeae98eb55d02b7b779594a
                                  • Instruction ID: b58591c3506b32c648be53d760be4415dd0f42035223eb2e210318f50daa6e8b
                                  • Opcode Fuzzy Hash: ca133a48a4390f29c995bad80975ac4391a14a2b7eeae98eb55d02b7b779594a
                                  • Instruction Fuzzy Hash: FD316E71A0020AAFDF04CFE9CD44AEE7B79EF14318F104529F920AA790DB30D956CB50
                                  APIs
                                  • SendMessageW.USER32(?,00000030,00000001,00000080), ref: 6C855868
                                  • SendMessageW.USER32(?,00000030,00000001), ref: 6C85587A
                                  • SendMessageW.USER32(?,00000030,00000001), ref: 6C85588C
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,6C85449A,?,00000000,00000000,?,00000000,00000000,?,00000003,00000001,?), ref: 6C85589A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$RedrawWindow
                                  • String ID: ApplicationLook
                                  • API String ID: 648961319-3231287756
                                  • Opcode ID: bd90d4f82f7a26845772ec0cdbba2004bca052c4fe4e1a11e4ac119d34d35667
                                  • Instruction ID: ef2508367fe5d7b5b3e7ff4cccb998cc600273f9e9667300e79e09f0e4a67724
                                  • Opcode Fuzzy Hash: bd90d4f82f7a26845772ec0cdbba2004bca052c4fe4e1a11e4ac119d34d35667
                                  • Instruction Fuzzy Hash: 5B31E834384329FBDB758B88CD02F957764BB41758F804936B20166ED0C7F16994CF61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: __snprintf_s$ClassInfo
                                  • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                  • API String ID: 1341824228-2801496823
                                  • Opcode ID: d5e5562f335e0e0752de66030c1ed6a7769041b6a5ab801e7194ad5881a4c598
                                  • Instruction ID: 7e1bab449870400bc68b59a6843b5a3a78780f60be2632ce4c7e8d3e8626b656
                                  • Opcode Fuzzy Hash: d5e5562f335e0e0752de66030c1ed6a7769041b6a5ab801e7194ad5881a4c598
                                  • Instruction Fuzzy Hash: EE315CB090070CAFCB21EFAAC944ADE7BF8EF59348F018426E514ABB52D7309954CB75
                                  APIs
                                    • Part of subcall function 6C8E09E8: KillTimer.USER32(?,?,00000000,00000800,?,?,?,?,?,00000058,00000040,6C8542D4,6CA6CB3C,00000004,?,50008200), ref: 6C8E0A13
                                  • GetIconInfo.USER32(00000000,00000001), ref: 6C8E0B3A
                                  • GetObjectW.GDI32(4(@P,00000018,?), ref: 6C8E0B49
                                  • DeleteObject.GDI32(00000001), ref: 6C8E0B52
                                  • DeleteObject.GDI32(?), ref: 6C8E0B5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Delete$IconInfoKillTimer
                                  • String ID: 4(@P
                                  • API String ID: 3402499453-4081170755
                                  • Opcode ID: 96cd92eb073a1d013647ad758d6b590168ac023b7ee2b9c7718ce9c46b919f1c
                                  • Instruction ID: 54620754d3bc289e5df8048bd660bf5aaec6fd3d2442b81e39765451bf87d225
                                  • Opcode Fuzzy Hash: 96cd92eb073a1d013647ad758d6b590168ac023b7ee2b9c7718ce9c46b919f1c
                                  • Instruction Fuzzy Hash: F621A330601208BBDF21AF64CE14FAE7BB9FF89718F004929F80196A90CB34EA45DF50
                                  APIs
                                  • GetDC.USER32(00000000), ref: 6C9AED84
                                  • EnumFontFamiliesExW.GDI32(00000000,?,6C9AED1B,?,00000000,?,?,?,?,?,00000000,00000000), ref: 6C9AED9F
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6C9AEDA7
                                  • __EH_prolog3.LIBCMT ref: 6C9AEDCB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EnumFamiliesFontH_prolog3Release
                                  • String ID: \sx
                                  • API String ID: 1064023238-995570312
                                  • Opcode ID: bb0cee2cefa2b81aacfd60d6b8faff102914ef889baf700c26eece51cedb9064
                                  • Instruction ID: 6335f54ba2fc6c9e76241fa82982a9f375faaf7772361c0cf7943fbbf00e5446
                                  • Opcode Fuzzy Hash: bb0cee2cefa2b81aacfd60d6b8faff102914ef889baf700c26eece51cedb9064
                                  • Instruction Fuzzy Hash: 59218171A01718ABCB24DBA88D08EEE77B9AF55708F014419E905EB740EB34DA0A87E5
                                  APIs
                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 6C8E952C
                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 6C8E9546
                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 6C8E955D
                                  • SHAppBarMessage.SHELL32(00000007,?), ref: 6C8E9577
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: \sx
                                  • API String ID: 2030045667-995570312
                                  • Opcode ID: 2a2202b60a70b5623d9e6926ad9fc7b6672a1418c5fd803cde445a7ab08d3a21
                                  • Instruction ID: 8450ff51c10f29d238da133bde97de2e654d3063a2069e1fd7bf0a836953d675
                                  • Opcode Fuzzy Hash: 2a2202b60a70b5623d9e6926ad9fc7b6672a1418c5fd803cde445a7ab08d3a21
                                  • Instruction Fuzzy Hash: DF214D71B0120AAFEB18DF61C845BEABBF8FB09354F104429E459E2280DB74A645CFA1
                                  APIs
                                  • BeginDeferWindowPos.USER32(00000000), ref: 6C9444E3
                                  • IsWindow.USER32(?), ref: 6C9444FE
                                  • DeferWindowPos.USER32(00000000,?,00000000,?,?,?,?,00000000), ref: 6C944547
                                  • EndDeferWindowPos.USER32(00000000), ref: 6C944552
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Defer$Begin
                                  • String ID: \sx
                                  • API String ID: 2880567340-995570312
                                  • Opcode ID: 00ac1a8a70d5209139d1deafbf44dec22364a66270089397d2f658baecbbe482
                                  • Instruction ID: a401bd27f4bb0ae5583489bb0f51ca9dd895e1c06c800ab6c78c5ae296e58d10
                                  • Opcode Fuzzy Hash: 00ac1a8a70d5209139d1deafbf44dec22364a66270089397d2f658baecbbe482
                                  • Instruction Fuzzy Hash: CF111771A0020AAFDF05CFA9C844BAEBBF9FF59348F508119E505E7650DB30EA51CBA1
                                  APIs
                                  • GetWindowTextW.USER32(?,?,00000100), ref: 6C945A6F
                                  • lstrcmpW.KERNEL32(?,?,?,00000000), ref: 6C945A81
                                  • SetWindowTextW.USER32(?,?), ref: 6C945A8D
                                  • GetLastError.KERNEL32(?,00000000), ref: 6C945AAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: TextWindow$ErrorLastlstrcmp
                                  • String ID: \sx
                                  • API String ID: 1997968240-995570312
                                  • Opcode ID: 44b3f3e0742680bfb437869cc22e2df951a561b160f3f40ce2965e547a7d2ac4
                                  • Instruction ID: 2c56aec6d8043fc7a4db5615539afe8d95710304c3a7b0cac83f816ac023d470
                                  • Opcode Fuzzy Hash: 44b3f3e0742680bfb437869cc22e2df951a561b160f3f40ce2965e547a7d2ac4
                                  • Instruction Fuzzy Hash: 0A11C6717013196BDB04AEA88C88AEF77BCEF45648F10856EE916D3601EB34DA0687A1
                                  APIs
                                  • GetObjectW.GDI32(?,0000000C,?), ref: 6C86778A
                                  • SetBkColor.GDI32(?,?), ref: 6C867794
                                  • GetSysColor.USER32(00000008), ref: 6C8677A4
                                  • SetTextColor.GDI32(?,?), ref: 6C8677AC
                                    • Part of subcall function 6C945C3A: GetWindowLongW.USER32(?,000000F0), ref: 6C945C55
                                    • Part of subcall function 6C945C3A: GetClassNameW.USER32(?,?,0000000A), ref: 6C945C6A
                                    • Part of subcall function 6C945C3A: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,6C86777F,?,?), ref: 6C945C81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Color$ClassCompareLongNameObjectStringTextWindow
                                  • String ID: \sx
                                  • API String ID: 3274569906-995570312
                                  • Opcode ID: e7f4f3dfd0f2d071fed6e84afed0175d34113363b86ff6ea01dff3692cf0ee14
                                  • Instruction ID: e84769da9d2b85beb9afe4d0ab553e7256b2215b70c1f09b7852314c5b07e119
                                  • Opcode Fuzzy Hash: e7f4f3dfd0f2d071fed6e84afed0175d34113363b86ff6ea01dff3692cf0ee14
                                  • Instruction Fuzzy Hash: 98018831701105ABDB109F698D449BFB3B9AF17718F50491AF921D6980CB30D90287F1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C944835
                                  • GetClassNameW.USER32(?,00000000,00000400), ref: 6C944866
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6C94489F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClassH_prolog3LongNameWindow
                                  • String ID: ComboBox$ComboBoxEx32
                                  • API String ID: 297531199-1907415764
                                  • Opcode ID: c8f650ced69ff672af8cf544ed5fb9f9764911e48993c5d7892028ab0b46b9e1
                                  • Instruction ID: 7bdc54b31ee7a9cda6ff7ba4fc35ec1a322cc873ac28477a4c332344a4f30c34
                                  • Opcode Fuzzy Hash: c8f650ced69ff672af8cf544ed5fb9f9764911e48993c5d7892028ab0b46b9e1
                                  • Instruction Fuzzy Hash: 5B01C435514516ABDB049F58CD04BEE7378BF21329F104969E411A2ED0DF34E91ACA59
                                  APIs
                                  • FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880002
                                  • LoadResource.KERNEL32(00000000,00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880010
                                  • LockResource.KERNEL32(00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C88001B
                                  • SizeofResource.KERNEL32(00000000,00000000,?,6CA0BE30,?,6C880E95,?,?,?,00000038,6C87FA98), ref: 6C880029
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID: PNG
                                  • API String ID: 3473537107-364855578
                                  • Opcode ID: 36b7fdb662c4ae1ca02e115f741eab94e861f2ce79d305e1f6a3de92d497db73
                                  • Instruction ID: a8e31bb4c9f8e834578685eb4a437eb5ed4a191e63a0789fbeaf66b0fed9ed6f
                                  • Opcode Fuzzy Hash: 36b7fdb662c4ae1ca02e115f741eab94e861f2ce79d305e1f6a3de92d497db73
                                  • Instruction Fuzzy Hash: 6EF062767036567B9B265BA68D48C9F777CDF466983118929FA05D3A00EB30D90286B0
                                  APIs
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6C945C55
                                  • GetClassNameW.USER32(?,?,0000000A), ref: 6C945C6A
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,6C86777F,?,?), ref: 6C945C81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClassCompareLongNameStringWindow
                                  • String ID: \sx$combobox
                                  • API String ID: 1414938635-1259455617
                                  • Opcode ID: 5033c1979ce4ccdae8d62fc05917db7243dc161c25c2ca3942a26bfd035e043e
                                  • Instruction ID: 1c8393afe88d3f3427bbab6176fb27a91a35aad702dfb050970c5777cafaa63f
                                  • Opcode Fuzzy Hash: 5033c1979ce4ccdae8d62fc05917db7243dc161c25c2ca3942a26bfd035e043e
                                  • Instruction Fuzzy Hash: 23F0A43175521A6BCF04DF688D46EEE77B89B07728F504315B522E61C4DB20E5068795
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 6C9450B1
                                  • EncodePointer.KERNEL32(00000000,?,6C86FB85,6CA73B8C,6C8EA39C), ref: 6C9450BA
                                  • DecodePointer.KERNEL32(00000000,?,?,6C86FB85,6CA73B8C,6C8EA39C), ref: 6C9450C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeProc
                                  • String ID: DwmIsCompositionEnabled$dwmapi.dll
                                  • API String ID: 2069163248-1198327662
                                  • Opcode ID: b95ba58ac5b7e36a9c8c469ee573466b60f7ff8272fa0566e2c65feda6c17c0c
                                  • Instruction ID: cc3a53606fbfcf7293a6f6166fef87d82f0c6db811f79152fa6a1218a91170e1
                                  • Opcode Fuzzy Hash: b95ba58ac5b7e36a9c8c469ee573466b60f7ff8272fa0566e2c65feda6c17c0c
                                  • Instruction Fuzzy Hash: 55F05439705727DBDB191BA4D808A593B6CAB063AAB11C515EC0AD7A00DB35D9428BF0
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 6C945055
                                  • EncodePointer.KERNEL32(00000000,?,6C874DF0,00000450,?,00000000,?,00000004,?,?,?,?,?,?,?,6C8D51BD), ref: 6C94505E
                                  • DecodePointer.KERNEL32(00000000,?,?,6C874DF0,00000450,?,00000000,?,00000004), ref: 6C94506C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeProc
                                  • String ID: DwmInvalidateIconicBitmaps$dwmapi.dll
                                  • API String ID: 2069163248-1901905683
                                  • Opcode ID: 8cf1377a9fd2bd5099dd20dc4bcdb3a15e3dd497141a36f5bb3e59c46a981555
                                  • Instruction ID: 6eab79db63c865a4f0def539f4347905bd0ae560c26d558809128f7bb916a305
                                  • Opcode Fuzzy Hash: 8cf1377a9fd2bd5099dd20dc4bcdb3a15e3dd497141a36f5bb3e59c46a981555
                                  • Instruction Fuzzy Hash: 3BF0A739701727EB9B152BB9880C85A3B7C6B062AA3048624FC06D7E00DB36C8834BF4
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?), ref: 6C84FC4A
                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000,?,?,?,?,?,?,?), ref: 6C84FC8C
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?), ref: 6C84FCA1
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 6C84FCD3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84FDA9
                                    • Part of subcall function 6C844D00: ___std_exception_copy.LIBVCRUNTIME ref: 6C844D3E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$Concurrency::cancel_current_task___std_exception_copy
                                  • String ID:
                                  • API String ID: 4024204131-0
                                  • Opcode ID: 9494e8ce42a7f1d11ea0678f6a24fcfab4dfe46cf7ddea4dff7d5470f338ec46
                                  • Instruction ID: 7c7a4d01e31691e155a1a64efe507d26fbbda4c074b7e1ede74362de98ff7762
                                  • Opcode Fuzzy Hash: 9494e8ce42a7f1d11ea0678f6a24fcfab4dfe46cf7ddea4dff7d5470f338ec46
                                  • Instruction Fuzzy Hash: 1DF11570E052499FCB24CFA8C950BEEFBB5AF9A304F24866DE850B7781D7345905CBA1
                                  APIs
                                    • Part of subcall function 6C86D51A: __EH_prolog3.LIBCMT ref: 6C86D521
                                    • Part of subcall function 6C86D51A: BeginPaint.USER32(?,?,00000004,6C842711), ref: 6C86D54D
                                  • GetClientRect.USER32(?,?), ref: 6C842726
                                  • FillRect.USER32(?,?), ref: 6C84273C
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E700
                                    • Part of subcall function 6C86E6E0: SelectObject.GDI32(?,00000000), ref: 6C86E716
                                    • Part of subcall function 6C86E39F: MoveToEx.GDI32(?,?,?,?), ref: 6C86E3C0
                                    • Part of subcall function 6C86E39F: MoveToEx.GDI32(?,?,?,?), ref: 6C86E3D6
                                    • Part of subcall function 6C86E36A: MoveToEx.GDI32(?,?,?,00000000), ref: 6C86E385
                                    • Part of subcall function 6C86E36A: LineTo.GDI32(?,?,?), ref: 6C86E394
                                    • Part of subcall function 6C86E74D: GetStockObject.GDI32(?), ref: 6C86E757
                                    • Part of subcall function 6C86E74D: SelectObject.GDI32(?,00000000), ref: 6C86E76B
                                    • Part of subcall function 6C86E74D: SelectObject.GDI32(?,00000000), ref: 6C86E77B
                                  • InflateRect.USER32(?,000000F6,00000000), ref: 6C842849
                                    • Part of subcall function 6C86E7CC: SetBkMode.GDI32(?,6C842858), ref: 6C86E7E0
                                    • Part of subcall function 6C86E7CC: SetBkMode.GDI32(?,6C842858), ref: 6C86E7F2
                                    • Part of subcall function 6C86E919: SetTextColor.GDI32(?,?), ref: 6C86E92E
                                    • Part of subcall function 6C86E919: SetTextColor.GDI32(?,?), ref: 6C86E940
                                    • Part of subcall function 6C8727B8: SetBkColor.GDI32(?,6C8428FC), ref: 6C8727D4
                                    • Part of subcall function 6C8727B8: ExtTextOutW.GDI32(?,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 6C8727E9
                                  • InflateRect.USER32(?,000000EC,00000000), ref: 6C842904
                                  • ImageList_Draw.COMCTL32(?,00000003,?,?,?,00000000), ref: 6C84291F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$RectSelect$ColorMoveText$InflateMode$BeginClientDrawFillH_prolog3ImageLineList_PaintStock
                                  • String ID:
                                  • API String ID: 429370534-0
                                  • Opcode ID: 0b9a75d6147737a8b33da679d5b283604a00f553120234a69e451ae5e4d3b7d0
                                  • Instruction ID: a3eea1ab2e25168b956219fa3143f1b685ed93cc51bce95559a9470dc43f8ba1
                                  • Opcode Fuzzy Hash: 0b9a75d6147737a8b33da679d5b283604a00f553120234a69e451ae5e4d3b7d0
                                  • Instruction Fuzzy Hash: B7917E31D10219DBDF21DBA8CD44FEDB7B5BF19304F1485A9E509B3691EB306A89CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C99004D
                                  • StringFromCLSID.OLE32(00000000,?,00000018,6C98FCE2,00000000,?,00000000,?,00000000,?,?,?,0000000A,00000008,6C8FDA29,?), ref: 6C99005B
                                  • CoTaskMemFree.OLE32(?,00000001,?,00000000,?,?,00000001), ref: 6C99008D
                                    • Part of subcall function 6C94F6D0: GetModuleFileNameW.KERNEL32(?,?,00000104,?), ref: 6C94F6F7
                                    • Part of subcall function 6C870D2B: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,00000000,6CA2F854,?,?,6C9900CA,6CA2F854), ref: 6C870D5A
                                    • Part of subcall function 6C865D68: _memcpy_s.LIBCMT ref: 6C865DD4
                                    • Part of subcall function 6C98F90A: __EH_prolog3.LIBCMT ref: 6C98F911
                                  • ExtractIconW.SHELL32(?,00000008,?), ref: 6C990139
                                  • DestroyIcon.USER32(00000000,?,00000001), ref: 6C990144
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3Icon$ByteCharDestroyExtractFileFreeFromModuleMultiNameStringTaskWide_memcpy_s
                                  • String ID:
                                  • API String ID: 2633863281-0
                                  • Opcode ID: 67a48da22acd60c998e1586b07e8e6bf1f7592339ee4ca58b09c4e96cbdab88d
                                  • Instruction ID: 0fde1db570baf12a6e54780bf93977b70d48d7e3a1a15aa5c7c9b4f2c92be1cd
                                  • Opcode Fuzzy Hash: 67a48da22acd60c998e1586b07e8e6bf1f7592339ee4ca58b09c4e96cbdab88d
                                  • Instruction Fuzzy Hash: 32816071A00159AFDF14DBA8CD94EFE7778BF29308F144828E522A7AD0DB309E49C761
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C91D2A8
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6C91D362
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91D398
                                  • SelectObject.GDI32(?,00000000), ref: 6C91D3F1
                                  • DeleteObject.GDI32(?), ref: 6C91D524
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateObject$BitmapDeleteH_prolog3_Select
                                  • String ID:
                                  • API String ID: 3801890737-0
                                  • Opcode ID: 3fced68fc6ebdf5e8c1d37ba2c229e0eb7a76adae1d02376a230d3d35bccdfae
                                  • Instruction ID: d7acd6f055ba840f260bb1fc0c6e60b60707d1efe652001da35a281b57b30fa5
                                  • Opcode Fuzzy Hash: 3fced68fc6ebdf5e8c1d37ba2c229e0eb7a76adae1d02376a230d3d35bccdfae
                                  • Instruction Fuzzy Hash: 1A91F172E002199FCF05CFA9C984ADDBBB5BF48308F24812AE415A7B54DB30E946CF90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84AE1B
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84AE3F
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84AE60
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84AEF4
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84AFBE
                                    • Part of subcall function 6C846250: ___std_exception_copy.LIBVCRUNTIME ref: 6C84628E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task___std_exception_copy
                                  • String ID:
                                  • API String ID: 1238493420-0
                                  • Opcode ID: 1dbe55281c5a2ee79ad49ffebf2f9bbaed6e820f163038d6a47e64c3cd2a2c8a
                                  • Instruction ID: 54f75a57a6442e59cb2b6be637acea0a49ffd0b13dd00ec0193f1ddf5b54adf6
                                  • Opcode Fuzzy Hash: 1dbe55281c5a2ee79ad49ffebf2f9bbaed6e820f163038d6a47e64c3cd2a2c8a
                                  • Instruction Fuzzy Hash: AE714574A00208DFDB14CFA8C984F9EBBF4BF59318F288569E416AB751D734E905CB61
                                  APIs
                                  • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 6C886B55
                                  • PostMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C886B98
                                  • GetParent.USER32(?), ref: 6C886C5B
                                  • GetParent.USER32(?), ref: 6C886C8F
                                  • GetCapture.USER32 ref: 6C886CAE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageParent$CapturePostSend
                                  • String ID:
                                  • API String ID: 3593767962-0
                                  • Opcode ID: db2153e77464836a555b6943a0df72dfc1bf8fcfe3be1fdea39bfec4662d3598
                                  • Instruction ID: af6edd7fb142479c1aeadb50fad5202554f099456ba4e50d8f2f527e2c52a754
                                  • Opcode Fuzzy Hash: db2153e77464836a555b6943a0df72dfc1bf8fcfe3be1fdea39bfec4662d3598
                                  • Instruction Fuzzy Hash: 1351D130327207ABEB324B24CB58B6D3AA6FB05B5DF254D68E814DBE91CB32D841C751
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C8E903B
                                  • IsWindowVisible.USER32(?), ref: 6C8E923F
                                    • Part of subcall function 6C88BBF5: __EH_prolog3.LIBCMT ref: 6C88BBFC
                                    • Part of subcall function 6C86CC1D: IsWindow.USER32(00000000), ref: 6C86CC2C
                                    • Part of subcall function 6C86CC1D: SetWindowTextW.USER32(00000000,?), ref: 6C86CC48
                                  • GetWindowRect.USER32(?,?), ref: 6C8E9154
                                  • GetSystemMetrics.USER32(00000010), ref: 6C8E915C
                                  • GetSystemMetrics.USER32(00000011), ref: 6C8E916B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$MetricsSystem$H_prolog3H_prolog3_RectTextVisible
                                  • String ID:
                                  • API String ID: 4238341832-0
                                  • Opcode ID: 99147da823409d4ef51a8620fd128a259574bdf7615e94344b8a15e82a91a085
                                  • Instruction ID: 67fab01929dec897e63dcd030c09cdcefded05cd29e361da6a0d8633b6b04edc
                                  • Opcode Fuzzy Hash: 99147da823409d4ef51a8620fd128a259574bdf7615e94344b8a15e82a91a085
                                  • Instruction Fuzzy Hash: 6C617B31B0021A9BDF09DF68C994BEDB7B6BF49314F14406AE905EB780DB75AD42CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8EC702
                                  • RedrawWindow.USER32(?,00000000,00000000,00000541), ref: 6C8EC906
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • GetSystemMenu.USER32(?,00000000,0000002C,6C8EA089), ref: 6C8EC73F
                                  • IsMenu.USER32(?), ref: 6C8EC758
                                  • IsMenu.USER32(?), ref: 6C8EC76A
                                    • Part of subcall function 6C9524CE: SetRectEmpty.USER32(00000030), ref: 6C9524FA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$Window$EmptyH_prolog3LongRectRedrawSystem
                                  • String ID:
                                  • API String ID: 477644042-0
                                  • Opcode ID: 1611e637e91c6dcdae654a49af2c99cd2f7529697b196c3743c80020e855b73e
                                  • Instruction ID: dcf9a9f029cd91ee04621d57aae4581430865002d4edaf65ccd8cc5bc529e8e7
                                  • Opcode Fuzzy Hash: 1611e637e91c6dcdae654a49af2c99cd2f7529697b196c3743c80020e855b73e
                                  • Instruction Fuzzy Hash: C9516B71E002199BDB14DFB8CA44BEEBBB2BF89318F204529E516F7781DB749905CB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8F8B43
                                  • lstrcmpW.KERNEL32(00000000,00000000,?,00000001,0014000C,00000000,?,6C9044B4,?), ref: 6C8F8C06
                                  • lstrcmpW.KERNEL32(?,00000000,?,?,6C9044B4,?), ref: 6C8F8C3B
                                  • lstrcmpW.KERNEL32(00000002,?,?,?,6C9044B4,?), ref: 6C8F8C65
                                  • GlobalLock.KERNEL32(?), ref: 6C8F8B65
                                    • Part of subcall function 6C99349E: __EH_prolog3.LIBCMT ref: 6C9934A5
                                    • Part of subcall function 6C993713: GlobalLock.KERNEL32(00000000), ref: 6C993726
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: lstrcmp$GlobalH_prolog3Lock
                                  • String ID:
                                  • API String ID: 1551776427-0
                                  • Opcode ID: a8d338c0495424ec3e639829a603c1c23fee266d3ab19acdc045bb553c170ce9
                                  • Instruction ID: a0787c17df9613c7068d3aae132042c50ae53019189f62cfcae82e50a08d3e0b
                                  • Opcode Fuzzy Hash: a8d338c0495424ec3e639829a603c1c23fee266d3ab19acdc045bb553c170ce9
                                  • Instruction Fuzzy Hash: 7A61F57050120ADFDB25CF65CA54BECF7B0BF21358F24889AD52597AA0D731DA8ACF50
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6C859F3C
                                  • SendMessageW.USER32(?,00000143,00000000,6CA456DC), ref: 6C859F81
                                  • SendMessageW.USER32(?,00000143,00000000,6CA456E8), ref: 6C859F95
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 6C859FA6
                                  • GetClientRect.USER32(?,00000001), ref: 6C859FBB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$Rect$ClientEmpty
                                  • String ID:
                                  • API String ID: 1272544524-0
                                  • Opcode ID: a979f067720f1f97785e384965b6f2bebc6d5584b2d15935354a99c60e28d62c
                                  • Instruction ID: 27b90b712b94ba5575c0c861b985bd30e712b414f9ae65090f4b56c6e1c57aac
                                  • Opcode Fuzzy Hash: a979f067720f1f97785e384965b6f2bebc6d5584b2d15935354a99c60e28d62c
                                  • Instruction Fuzzy Hash: DC419E31740305AFDB249F24CC89FEA77A9FF88714F180679BA199F2D1D770AA41CA61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect$H_prolog3
                                  • String ID:
                                  • API String ID: 3752103406-0
                                  • Opcode ID: c9872cc129801e7a3de2c5332076ce3ce59dcfb50c784528bbf559caf370bb17
                                  • Instruction ID: 63adca701a54c3665a8798824fe8b5886cd38994ecbc9d3d66b356a877b0a692
                                  • Opcode Fuzzy Hash: c9872cc129801e7a3de2c5332076ce3ce59dcfb50c784528bbf559caf370bb17
                                  • Instruction Fuzzy Hash: C65108B09007419FCB54CF64C984BEABBF4BF18304F4489BED95A8B781DB74A549CB51
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9A5C7C
                                    • Part of subcall function 6C86D5B9: __EH_prolog3.LIBCMT ref: 6C86D5C0
                                    • Part of subcall function 6C86D5B9: GetWindowDC.USER32(00000000,00000004,6C8705D3,00000000), ref: 6C86D5EC
                                    • Part of subcall function 6C86E810: SetMapMode.GDI32(?,FFFFFEFF), ref: 6C86E824
                                    • Part of subcall function 6C86E810: SetMapMode.GDI32(?,FFFFFEFF), ref: 6C86E836
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6C9A5CE0
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6C9A5CFF
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6C9A5D1E
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6C9A5DE2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3Mode$InvalidateRectWindow
                                  • String ID:
                                  • API String ID: 1124340077-0
                                  • Opcode ID: e5b028582fc8fd159fe38384f32832a4de929cc3e409033f03d0c23ed6e5dd89
                                  • Instruction ID: 62b27380e5c3e51ebd66d1b19e781035912f8b26205472ab9c95678324868e02
                                  • Opcode Fuzzy Hash: e5b028582fc8fd159fe38384f32832a4de929cc3e409033f03d0c23ed6e5dd89
                                  • Instruction Fuzzy Hash: C741C074700B069FDB24CF69C484B9AB7F5BF4A314F10892DE9AADB690E770A805CB11
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C85DBA1
                                  • GetTextColor.GDI32(?), ref: 6C85DBAC
                                  • OffsetRect.USER32(?,00000001,00000001), ref: 6C85DBF6
                                  • FillRect.USER32(?,?,-000000D0), ref: 6C85DC42
                                  • OffsetRect.USER32(?,00000001,00000001), ref: 6C85DC73
                                    • Part of subcall function 6C91D54F: __EH_prolog3_GS.LIBCMT ref: 6C91D556
                                    • Part of subcall function 6C91D54F: CreateCompatibleDC.GDI32(00000000), ref: 6C91D5BA
                                    • Part of subcall function 6C91D54F: CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91D5F0
                                    • Part of subcall function 6C91D54F: SelectObject.GDI32(?,00000000), ref: 6C91D644
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$CompatibleCreateOffset$BitmapColorFillH_prolog3H_prolog3_ObjectSelectText
                                  • String ID:
                                  • API String ID: 4029571948-0
                                  • Opcode ID: f31b044fb444e25561f1880ede7a106067ef3e11fb9a5174f18ec088f8d4b8e0
                                  • Instruction ID: 7dc5e09a2a438966b721edff22502509204afc7b0dd32e51f08b978cdfad266d
                                  • Opcode Fuzzy Hash: f31b044fb444e25561f1880ede7a106067ef3e11fb9a5174f18ec088f8d4b8e0
                                  • Instruction Fuzzy Hash: 4D418272A00209AFCF55EB94CA44FDE33BDAF08318F818566E410D7691CBB4DA59CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84AFF3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84B016
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B036
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B0C3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84B0DB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 3053331623-0
                                  • Opcode ID: f8fa1271f5bc6b14b1209b2ef2357cc847ed6c2de634233bce3d2a9c364244d6
                                  • Instruction ID: ef6c79b415204bc9abc5b976788d53ed172f7b1f28bda4b00b4e112ae661a7c6
                                  • Opcode Fuzzy Hash: f8fa1271f5bc6b14b1209b2ef2357cc847ed6c2de634233bce3d2a9c364244d6
                                  • Instruction Fuzzy Hash: 1231D475A0062ADFCF25CF54C980BAEB774FB01729F158A19D825A7740D730AD05CBE2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84B663
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84B686
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B6A6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84B733
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C84B74B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 3053331623-0
                                  • Opcode ID: 15da5e31affbd740654373c3c327a1742ddd04b2b2c977e04c2275ed10f94293
                                  • Instruction ID: d8e4ae7cc803ab50a8cd9045a270d5ed06aeeb721dfbe33a09773c0c413e2a2c
                                  • Opcode Fuzzy Hash: 15da5e31affbd740654373c3c327a1742ddd04b2b2c977e04c2275ed10f94293
                                  • Instruction Fuzzy Hash: B731D475A0466ADFCB25CF54C980BAEB774FB51328F158A19D805A7B40D730AD05CBD2
                                  APIs
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                    • Part of subcall function 6C87B177: GetParent.USER32(?), ref: 6C87B17A
                                    • Part of subcall function 6C87B177: GetParent.USER32(00000000), ref: 6C87B181
                                  • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6C87AD64
                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C87AD8D
                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C87ADAC
                                  • SendMessageW.USER32(?,00000222,?,00000000), ref: 6C87ADC6
                                  • SendMessageW.USER32(?,00000222,00000000,?), ref: 6C87ADEF
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$Parent$LongWindow
                                  • String ID:
                                  • API String ID: 4191550487-0
                                  • Opcode ID: 46c088efc322de02f0b5f8d445007eb852c10033ab1467d171ea4001a5311f18
                                  • Instruction ID: d1b0892ca7593fb6b0839ca0e9a81d03de9020d4e69977afb20adafba5421d56
                                  • Opcode Fuzzy Hash: 46c088efc322de02f0b5f8d445007eb852c10033ab1467d171ea4001a5311f18
                                  • Instruction Fuzzy Hash: D421B971300604BFEB355A65CA88EEE7A7AFB0875EF040A28F45196990EB70DD95C670
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86A10E
                                  • GetTopWindow.USER32(?), ref: 6C86A13B
                                  • GetDlgCtrlID.USER32(00000000), ref: 6C86A14D
                                  • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C86A1A8
                                  • GetWindow.USER32(00000000,00000002), ref: 6C86A1EA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$CtrlH_prolog3MessageSend
                                  • String ID:
                                  • API String ID: 849854284-0
                                  • Opcode ID: af27b109b505dc9c240d332f94ed3a4454bde8f7ef750feca16591c84a724d40
                                  • Instruction ID: 89eab829a6c865b6c6f23049ecb03b2aa6dca043e670de4af524fdb74937e893
                                  • Opcode Fuzzy Hash: af27b109b505dc9c240d332f94ed3a4454bde8f7ef750feca16591c84a724d40
                                  • Instruction Fuzzy Hash: 9B210731A01228ABDF359B2ACE44FEE7675EF51308F10056AF916E2E41EF308E45CB52
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C915487
                                  • SendMessageW.USER32(00000000,0000007F,00000000,00000000), ref: 6C9154AA
                                  • SendMessageW.USER32(00000000,0000007F,00000001,00000000), ref: 6C9154BE
                                  • GetClassLongW.USER32(00000000,000000DE), ref: 6C91551B
                                  • GetClassLongW.USER32(00000000,000000F2), ref: 6C91552C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClassLongMessageSend$H_prolog3
                                  • String ID:
                                  • API String ID: 350087385-0
                                  • Opcode ID: d7ccee2bbc9df1d8ffc1ecafbb57655fde783b139921415929a3a46cabe4f08d
                                  • Instruction ID: 6e33d0370673098ac8f5d8991a107d6eb19ad8dde57e2199c92c8b8cb869a9b4
                                  • Opcode Fuzzy Hash: d7ccee2bbc9df1d8ffc1ecafbb57655fde783b139921415929a3a46cabe4f08d
                                  • Instruction Fuzzy Hash: D911E431B4922ABBDB254A64CC45B9E763ABB14768F120720B855B6FE0DBB1DD0486E0
                                  APIs
                                  • GetMapMode.GDI32(?), ref: 6C8728AD
                                  • GetDeviceCaps.GDI32(?,00000058), ref: 6C8728F5
                                  • GetDeviceCaps.GDI32(?,0000005A), ref: 6C872902
                                    • Part of subcall function 6C86E301: MulDiv.KERNEL32(?,00000000,00000000), ref: 6C86E33A
                                    • Part of subcall function 6C86E301: MulDiv.KERNEL32(?,00000000,00000000), ref: 6C86E35B
                                  • MulDiv.KERNEL32(?,00000060,000009EC), ref: 6C872924
                                  • MulDiv.KERNEL32(?,00000060,000009EC), ref: 6C872931
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CapsDevice$Mode
                                  • String ID:
                                  • API String ID: 696222070-0
                                  • Opcode ID: cc10bf5b652f7186252370922d098d4feab3a3fa73150e33c262583da3109003
                                  • Instruction ID: 5e476d5e92d685c1bc6877dd0cd4b784fdaf2e2133ecd7b89aac2feb224a7239
                                  • Opcode Fuzzy Hash: cc10bf5b652f7186252370922d098d4feab3a3fa73150e33c262583da3109003
                                  • Instruction Fuzzy Hash: BB11E239300725AFCB251F21C84892EBFB9FB8A3647148419E80293B40DB36AC539FA0
                                  APIs
                                  • GetMapMode.GDI32(?), ref: 6C87237B
                                  • GetDeviceCaps.GDI32(?,00000058), ref: 6C8723C3
                                  • GetDeviceCaps.GDI32(?,0000005A), ref: 6C8723D0
                                    • Part of subcall function 6C86DFC0: MulDiv.KERNEL32(?,00000000,00000000), ref: 6C86DFF9
                                    • Part of subcall function 6C86DFC0: MulDiv.KERNEL32(?,00000000,00000000), ref: 6C86E01A
                                  • MulDiv.KERNEL32(?,000009EC,00000060), ref: 6C8723F2
                                  • MulDiv.KERNEL32(?,000009EC,00000060), ref: 6C8723FF
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CapsDevice$Mode
                                  • String ID:
                                  • API String ID: 696222070-0
                                  • Opcode ID: 1bb4ee4bc1566847889f7bfacfd0a80704ff9b04c150fb8754a241a50f652d31
                                  • Instruction ID: f3d904608b2da8868c5e4b8868d0cdabd7754a9da6c7d632271eb99edf623fd3
                                  • Opcode Fuzzy Hash: 1bb4ee4bc1566847889f7bfacfd0a80704ff9b04c150fb8754a241a50f652d31
                                  • Instruction Fuzzy Hash: FF11BF39300715EFCB291F25C94891EBBB9FB8A3A57148519F94293B50DB35AC53CFA0
                                  APIs
                                  • DrawThemeBackground.UXTHEME(00000000,?,00000001,00000000,?,00000000), ref: 6C863C0A
                                  • GetThemeColor.UXTHEME(00000000,00000001,00000000,00000EDB,?), ref: 6C863C1D
                                  • GetThemeColor.UXTHEME(00000000,00000001,00000000,00000EDF,?), ref: 6C863C32
                                  • GetSysColorBrush.USER32(00000018), ref: 6C863C3C
                                  • FillRect.USER32(?,?,00000000), ref: 6C863C53
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ColorTheme$BackgroundBrushDrawFillRect
                                  • String ID:
                                  • API String ID: 3021913306-0
                                  • Opcode ID: 1c7c00f3161402072d91fd0c0e67e3f92b44fb3b92d20576e4b856beefe8ad24
                                  • Instruction ID: 70a00bb34789d5d83d8e8f0722a22a1d811c61db3577b491fdb7548238cc71f0
                                  • Opcode Fuzzy Hash: 1c7c00f3161402072d91fd0c0e67e3f92b44fb3b92d20576e4b856beefe8ad24
                                  • Instruction Fuzzy Hash: 13113032390615BBEB258B99CE46F9A7778EB49B48F014819B705E6890C7B1AC51C790
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C9C9B53
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C9C9B5E
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C9C9BCC
                                    • Part of subcall function 6C9C9CB0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6C9C9CC8
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 6C9C9B79
                                  • _Yarn.LIBCPMT ref: 6C9C9B8F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 297844bb48c596ba0d3c08a50f14e7d0d85cf03f7ae3460da46798fe3dff72c8
                                  • Instruction ID: 006bc43f10b3b4c14465d4ef050ec2b50a18b1097773387c8c87a95c4d360d03
                                  • Opcode Fuzzy Hash: 297844bb48c596ba0d3c08a50f14e7d0d85cf03f7ae3460da46798fe3dff72c8
                                  • Instruction Fuzzy Hash: 4201B175B006259BCB0ADB20C854ABD77B5BFA524CB154019D81297B80CF349A4ACBD7
                                  APIs
                                  • GlobalLock.KERNEL32(00000000), ref: 6C9935B2
                                  • GlobalLock.KERNEL32(?), ref: 6C9935C2
                                  • CreateDCW.GDI32(?,?,?,00000000), ref: 6C9935E8
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C9935F3
                                  • GlobalUnlock.KERNEL32(?), ref: 6C9935FE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$LockUnlock$Create
                                  • String ID:
                                  • API String ID: 2536725124-0
                                  • Opcode ID: 2bc790fba4af293c447547d1ddd926933dca7c8e86b0adbc2a1d1e82cb986701
                                  • Instruction ID: 876c6ebd5a6338cd17d9795ed67d7b6513bec51dc2ad1916d5a89eba8698b5bd
                                  • Opcode Fuzzy Hash: 2bc790fba4af293c447547d1ddd926933dca7c8e86b0adbc2a1d1e82cb986701
                                  • Instruction Fuzzy Hash: 4501A231202E2ABBCB128F79C8099AA7BBCBF857997148015FC08C3614E735E912C7E0
                                  APIs
                                    • Part of subcall function 6C9D9013: __allrem.LIBCMT ref: 6C9D9028
                                    • Part of subcall function 6C9D9013: __allrem.LIBCMT ref: 6C9D9036
                                    • Part of subcall function 6C9D9013: __allrem.LIBCMT ref: 6C9D904F
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9D922B
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9D92BB
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9D9350
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                  • String ID: \sx
                                  • API String ID: 1992179935-995570312
                                  • Opcode ID: 0e3ad47eebb8482828073629283f7b1743d2d06050f9c3a145a86c0ca5054a31
                                  • Instruction ID: 49e9b2f34d28deca86800a7b59045fe0a7746c129b65fe628f110e8d60be398b
                                  • Opcode Fuzzy Hash: 0e3ad47eebb8482828073629283f7b1743d2d06050f9c3a145a86c0ca5054a31
                                  • Instruction Fuzzy Hash: 14D1F771E01F469AEB04AEE9C8A079DB3B9AF64728F17C129D909F2E40DF70F9058751
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \sx
                                  • API String ID: 0-995570312
                                  • Opcode ID: b6fb522118d536e2eacb7ba4254f9c45fbd2fe251b74fa2d35d28e817318ab06
                                  • Instruction ID: c0c3543c41bcb0d2fb844a1a3535dbff9cf90cbee7978038c0e160da198f7b47
                                  • Opcode Fuzzy Hash: b6fb522118d536e2eacb7ba4254f9c45fbd2fe251b74fa2d35d28e817318ab06
                                  • Instruction Fuzzy Hash: 11A19C347007269FDB19CF64C998BA9B7B0FB05318F10856ED8169BB91CB74AD86CF90
                                  APIs
                                  • __freea.LIBCMT ref: 6C9E9431
                                    • Part of subcall function 6C9E15D2: HeapAlloc.KERNEL32(00000000,?,?,?,6C9CAD3B,?,?,?,?,?,6C844C3D,6C9C9407,?,?,6C9C9407), ref: 6C9E1604
                                  • __freea.LIBCMT ref: 6C9E9444
                                  • __freea.LIBCMT ref: 6C9E9451
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: __freea$AllocHeap
                                  • String ID: \sx
                                  • API String ID: 85559729-995570312
                                  • Opcode ID: 1b1239bf03a96d61b8a5697e1f40e81567dc52f38f09d53adfc30f5ef762e6c8
                                  • Instruction ID: 6f6291eebba076e2ea467a9cf6228755cfd8cd858ac93a62fbd9604bc1d5db8e
                                  • Opcode Fuzzy Hash: 1b1239bf03a96d61b8a5697e1f40e81567dc52f38f09d53adfc30f5ef762e6c8
                                  • Instruction Fuzzy Hash: 4B51C372601216AFEB124F65CC80EEB37ADEF7D758B260429FD14D6A40FB30D914C662
                                  APIs
                                  • GetSysColorBrush.USER32(0000000F), ref: 6C89F941
                                  • SetClassLongW.USER32(?,000000F6,00000000), ref: 6C89F94D
                                  • GetWindowRect.USER32(?,?), ref: 6C89F96B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: BrushClassColorLongRectWindow
                                  • String ID: \sx
                                  • API String ID: 3059706247-995570312
                                  • Opcode ID: df612594453c91e61ef9ea7d06f22b3e6072837ad9ffeeb54f9a05a41fd01ceb
                                  • Instruction ID: 671fde434e2d57ce8f0ef358f0aa40e8fe8b5b31e57a2367ecab74d33af796ef
                                  • Opcode Fuzzy Hash: df612594453c91e61ef9ea7d06f22b3e6072837ad9ffeeb54f9a05a41fd01ceb
                                  • Instruction Fuzzy Hash: 3D614B71A00219AFDF15DFA8C994AEEBBF5BF58314F10452AF805EB740DB34A941CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C85F225
                                  • FillRect.USER32(?,?,-000000D0), ref: 6C85F252
                                    • Part of subcall function 6C86D46D: __EH_prolog3.LIBCMT ref: 6C86D474
                                    • Part of subcall function 6C86D46D: CreateSolidBrush.GDI32(?), ref: 6C86D48F
                                  • FillRect.USER32(?,?,?), ref: 6C85F3BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FillH_prolog3Rect$BrushCreateSolid
                                  • String ID: \sx
                                  • API String ID: 1943250179-995570312
                                  • Opcode ID: fb1faf91fc7466f8d0d2f7f83defa1076ed5e65d48e2bed6113ef2a485d6d7d9
                                  • Instruction ID: b1e97e18b2420eed3f436a2294d4c57954362e14b4d2c5a15ce0735f8d69f059
                                  • Opcode Fuzzy Hash: fb1faf91fc7466f8d0d2f7f83defa1076ed5e65d48e2bed6113ef2a485d6d7d9
                                  • Instruction Fuzzy Hash: CA518E71A00209ABCF11DFA8CE85DEE7BB6FF58308F004429F905A7790CB719959CBA1
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 6C8D5064
                                  • MapWindowPoints.USER32(?,?,0000002C,00000002), ref: 6C8D509D
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6C8D5109
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$LongPointsVisible
                                  • String ID: \sx
                                  • API String ID: 2971626980-995570312
                                  • Opcode ID: d14a2d324497d30ef640dbb7a2d2a56cfef24194a24cd5e376226ccb86d50813
                                  • Instruction ID: 340df15d8adb28ba2f14f5c7b32e5ea9de88be1e0499405db65db64c9ea01435
                                  • Opcode Fuzzy Hash: d14a2d324497d30ef640dbb7a2d2a56cfef24194a24cd5e376226ccb86d50813
                                  • Instruction Fuzzy Hash: 0151CF71B003169FDF149F68C964ABE77B5EF89304F15046AE802EB780DB30AD02CB91
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C860C91
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6C860DB6
                                    • Part of subcall function 6C86D46D: __EH_prolog3.LIBCMT ref: 6C86D474
                                    • Part of subcall function 6C86D46D: CreateSolidBrush.GDI32(?), ref: 6C86D48F
                                  • FillRect.USER32(?,00000000,?), ref: 6C860CE4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CreateRect$BrushFillH_prolog3H_prolog3_IndirectSolid
                                  • String ID: %d%%
                                  • API String ID: 2254786338-1518462796
                                  • Opcode ID: f8fee2b60c891bc34946d451d0a5497cd2c33baad49a8de6273f8bf9d97dfdb8
                                  • Instruction ID: 3d0d2a0c082b723832ec3cf415ed287c44fb1a3da2c88673a1738ce4a7260b59
                                  • Opcode Fuzzy Hash: f8fee2b60c891bc34946d451d0a5497cd2c33baad49a8de6273f8bf9d97dfdb8
                                  • Instruction Fuzzy Hash: 6C518C31A0024DDBCF14DFA8C995ADE77B9BF48318F114569F811A7690CB34AE0ACF90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84CEB0
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C84CF3C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84CFD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Locinfo::_Locinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 3553999535-1405518554
                                  • Opcode ID: 4be47a0f875aee246636e90de341b6c541bc468f1da4d2ebcfca1697a0fdd0d2
                                  • Instruction ID: 22a85c811b45eadcd8623f92cafc0bbf168eaff94aa06d5a2a9d5cbc5e9b3034
                                  • Opcode Fuzzy Hash: 4be47a0f875aee246636e90de341b6c541bc468f1da4d2ebcfca1697a0fdd0d2
                                  • Instruction Fuzzy Hash: A54183B1D056189FEF10DFA8C944BCEBBB8AF25318F108528E815A7741E778D908CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84D070
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C84D0FC
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84D191
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Locinfo::_Locinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 3553999535-1405518554
                                  • Opcode ID: 5fc73ee3e85d94b9257d31576646e98bd2bf794293cd550936af1c25b28b35ab
                                  • Instruction ID: 0e74daf64a10528c2a6dbf4a3dff9a7fe636091f23c1fa30b80650e9d829dcfa
                                  • Opcode Fuzzy Hash: 5fc73ee3e85d94b9257d31576646e98bd2bf794293cd550936af1c25b28b35ab
                                  • Instruction Fuzzy Hash: EB4183B1D01659DBEB10CFA8C944BDEBBB4AF25318F108529E814B7780E779D905CBA2
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6C8D798A
                                  • GetWindowRect.USER32(?,0000002C), ref: 6C8D799E
                                  • UnionRect.USER32(0000002C,0000002C,?), ref: 6C8D79AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Window$Union
                                  • String ID: \sx
                                  • API String ID: 4061794321-995570312
                                  • Opcode ID: f5663e9a7f1ea1e4957f1d06d80e77efbf6e59c8ac8ab41f552f443d05512f7b
                                  • Instruction ID: bacb50d9bc4a497930a95682f8927613863d5c44cedd7f796e6dcdf2df096982
                                  • Opcode Fuzzy Hash: f5663e9a7f1ea1e4957f1d06d80e77efbf6e59c8ac8ab41f552f443d05512f7b
                                  • Instruction Fuzzy Hash: 11419132B00219AFDB18DFB5CA54EEEB7B8FF19304F114529E505A7640DB30B954CBA0
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C84F7A0
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C84F82C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C84F8C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Locinfo::_Locinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 3553999535-1405518554
                                  • Opcode ID: 8af4f904903acc755b698a00c4428a575af7485c6f2a8e015b19a990e9db490d
                                  • Instruction ID: e28f2727b14dc69a7fcf521d73057cd2714f85b779293981565e9c344f39a98b
                                  • Opcode Fuzzy Hash: 8af4f904903acc755b698a00c4428a575af7485c6f2a8e015b19a990e9db490d
                                  • Instruction Fuzzy Hash: 7E5175B1D0165C9FEB10CFA8C944BDEBBB4AF25318F158529E815BB740E778D904CB91
                                  APIs
                                  • GetMenuCheckMarkDimensions.USER32 ref: 6C8738BE
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6C8739B3
                                  • LoadBitmapW.USER32(00000000,00007FE3), ref: 6C8739CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
                                  • String ID: \sx
                                  • API String ID: 2596413745-995570312
                                  • Opcode ID: b74a5af7930895485898ffa20803a845b02e1dfd876f73c34d8ea0992a172cd1
                                  • Instruction ID: be7c4b3ba7213b657fadc62983662b44501571f56c4061605350aeef1e0a52e2
                                  • Opcode Fuzzy Hash: b74a5af7930895485898ffa20803a845b02e1dfd876f73c34d8ea0992a172cd1
                                  • Instruction Fuzzy Hash: 5931C971B002259FDB34CF288D85BADB7F4FB45304F4045AAD54AE7681DB70AE868F61
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85DDAB
                                  • InflateRect.USER32(?,00000005,00000005), ref: 6C85DDE9
                                  • Ellipse.GDI32(00000000,?,00000000,?,?), ref: 6C85DEB4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EllipseH_prolog3_InflateRect
                                  • String ID: Gu,
                                  • API String ID: 3279685039-3926172423
                                  • Opcode ID: 91ae707339f8e15df7c365b92d57a812b92d5c7d957851cf348fee2a9c5fbd96
                                  • Instruction ID: 56af3fe6e0555338dcc965c875b3e2f38e278f5b789122e97c5d3a54f272f6cb
                                  • Opcode Fuzzy Hash: 91ae707339f8e15df7c365b92d57a812b92d5c7d957851cf348fee2a9c5fbd96
                                  • Instruction Fuzzy Hash: 48415D71E001089FCF54DFA8CA45AEE77B5AF18308F50456AE901A7B90DB74EE19CFA1
                                  APIs
                                  • KillTimer.USER32(?,?,00000000,00000800,?,?,?,?,?,00000058,00000040,6C8542D4,6CA6CB3C,00000004,?,50008200), ref: 6C8E0A13
                                  • DestroyIcon.USER32(00000000,?,000000FF,00000000,?,00000000,00000001,0000001C,00000020,000000FF,00000001,00000001,?,0000001C,00000020,?), ref: 6C8E0AA0
                                  • SetTimer.USER32(?,?,0000007D,00000000), ref: 6C8E0ADE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Timer$DestroyIconKill
                                  • String ID: 4(@P
                                  • API String ID: 1879703730-4081170755
                                  • Opcode ID: f8825d1ee2068da4e2979cf76f0aa5e444a71a7a06fc6a3c3bbc551f2ee671ec
                                  • Instruction ID: 7b39ac306cfd9ff6899ec506c5dc5495e8db40e50bc2616d57ff00b57e139cab
                                  • Opcode Fuzzy Hash: f8825d1ee2068da4e2979cf76f0aa5e444a71a7a06fc6a3c3bbc551f2ee671ec
                                  • Instruction Fuzzy Hash: 7331D531201218EFCF228F15CE84A9E3F75FF89354B10487AFC116AA65CB71D992EB90
                                  APIs
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C85FBC6
                                  • FillRect.USER32(?,?,-000000D0), ref: 6C85FBE3
                                  • OffsetRect.USER32(?,00000000,00000001), ref: 6C85FC19
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$FillInflateOffset
                                  • String ID: \sx
                                  • API String ID: 783136803-995570312
                                  • Opcode ID: 0ef3428d152e973207dbfa0e459e817b4d4fd7a92b358aa0b4738b118b082e44
                                  • Instruction ID: 666633b157c72a7712d7173e33d41c7d21b77acb97224a2c0a019cbf612797fa
                                  • Opcode Fuzzy Hash: 0ef3428d152e973207dbfa0e459e817b4d4fd7a92b358aa0b4738b118b082e44
                                  • Instruction Fuzzy Hash: AC212AB2A0021AABCB10DF95CD89DEF7BBCFF05254B404526B915E7241C774EA19CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 6C8468DF
                                    • Part of subcall function 6C9CB8AE: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,6C9C9415,?,6CA66060,?,?), ref: 6C9CB90F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1866435925
                                  • Opcode ID: 0e51f5e0927c890060836775421e3faf30b6cc5c18bf88505bdec04a828ea3ee
                                  • Instruction ID: c5b8b65b518da226a744f7a5d8a143a8c35f807bcf4f0470cea01a734883f558
                                  • Opcode Fuzzy Hash: 0e51f5e0927c890060836775421e3faf30b6cc5c18bf88505bdec04a828ea3ee
                                  • Instruction Fuzzy Hash: BE11BBB29007186BC710DF9CC946BD6B3B8AF55321F14C91AF968D7A40F731E954CB91
                                  APIs
                                  • GetWindow.USER32(00000000,00000005), ref: 6C98E146
                                  • GetClassNameW.USER32(?,?,00000400), ref: 6C98E168
                                    • Part of subcall function 6C9AE5AF: __EH_prolog3.LIBCMT ref: 6C9AE5B6
                                  • GetWindow.USER32(?,00000002), ref: 6C98E1A6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$ClassH_prolog3Name
                                  • String ID: \sx
                                  • API String ID: 632776892-995570312
                                  • Opcode ID: 2864a87a5c3f377976d6b90d1fc7446cc0ae99c011abdcfba10edb40dbb9be6e
                                  • Instruction ID: 23b2f95e63a9ce0d1577f18d9a7a56231cc862aef9ee241fb45e0927d26f52cf
                                  • Opcode Fuzzy Hash: 2864a87a5c3f377976d6b90d1fc7446cc0ae99c011abdcfba10edb40dbb9be6e
                                  • Instruction Fuzzy Hash: F311D076B12215AFDB219B79CC54EAAB7BCAB08308F014968A486D7A90DF30DD4687D0
                                  APIs
                                  • FillRect.USER32(?,?,-00000098), ref: 6C85D538
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C85D57A
                                  • DrawEdge.USER32(?,?,00000004,0000000F), ref: 6C85D597
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$DrawEdgeFillInflate
                                  • String ID: \sx
                                  • API String ID: 785442924-995570312
                                  • Opcode ID: e8f87fdf54a88b66386081ed1d4bd6369bc45fd43e6e233a92de678af68dd1f0
                                  • Instruction ID: e89fb1704743eeaa5dd65be96dc65d67c8a4e897c67ef4b4d4392f7d3b9e1bbf
                                  • Opcode Fuzzy Hash: e8f87fdf54a88b66386081ed1d4bd6369bc45fd43e6e233a92de678af68dd1f0
                                  • Instruction Fuzzy Hash: 13114272A10209AFCF04DFA4C985DEE77BCFF09314F908569E511AB291DB70DA0ACB61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C88CACE
                                    • Part of subcall function 6C959A09: __EH_prolog3.LIBCMT ref: 6C959A10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: %TsMFCToolBarParameters$LargeIcons$MFCToolBars
                                  • API String ID: 431132790-953485693
                                  • Opcode ID: 767338ca43e99fc975ab9dadb0c9aad4522e56aecc7a89e769362b3625b4b712
                                  • Instruction ID: 7b5d127ec6e20771fc8c11b5d71518243c929570d671829b60676739be96bd04
                                  • Opcode Fuzzy Hash: 767338ca43e99fc975ab9dadb0c9aad4522e56aecc7a89e769362b3625b4b712
                                  • Instruction Fuzzy Hash: 36216DB5B0030A9FDF04DFA4C990AEEB775BF54308F104829D401A7781DB34DA4ACB61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86FCF4
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 6C86FD18
                                  • GetClassInfoW.USER32(?,?,?), ref: 6C86FD53
                                    • Part of subcall function 6C865A70: GetClassInfoW.USER32(?,?,?), ref: 6C865A89
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClassInfo$CursorH_prolog3Load
                                  • String ID: %Ts:%x:%x:%x:%x
                                  • API String ID: 1242006032-4057404147
                                  • Opcode ID: e5126455e03467b675d0c3d48e5e7ba5dee0995ce0c2bb24c677280d58688a39
                                  • Instruction ID: 1568995f0fae765df580177882ad11c987985d70e7523fe2088819678e08a0e6
                                  • Opcode Fuzzy Hash: e5126455e03467b675d0c3d48e5e7ba5dee0995ce0c2bb24c677280d58688a39
                                  • Instruction Fuzzy Hash: 48213AB0A00209AFDB51DFA9C984BDDBBF4BF18709F10882AE508E7740D7759A49CB65
                                  APIs
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DA5
                                    • Part of subcall function 6C945D74: InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DBB
                                    • Part of subcall function 6C945D74: LeaveCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DC9
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(00000000,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945DD6
                                  • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C872841
                                  • CreatePatternBrush.GDI32(00000000), ref: 6C87284E
                                  • DeleteObject.GDI32(00000000), ref: 6C87285A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalSection$CreateEnter$BitmapBrushDeleteInitializeLeaveObjectPattern
                                  • String ID: \sx
                                  • API String ID: 3767330792-995570312
                                  • Opcode ID: 4fb1f32dd6eb2732d32477bd510c54f51216f2637b893eb7125ed38a44560962
                                  • Instruction ID: 12f8a52047b3e8e85dc2fc23261e9b517e28183e55d083db979b28c3f3106ddd
                                  • Opcode Fuzzy Hash: 4fb1f32dd6eb2732d32477bd510c54f51216f2637b893eb7125ed38a44560962
                                  • Instruction Fuzzy Hash: 5E012531B11A55EADB2997798D08AAE37B8EBD6709F00812DE44283681DB348507CB72
                                  APIs
                                  • SendMessageW.USER32(?,00000085,00000000,00000000), ref: 6C8EBBE7
                                  • SetRectEmpty.USER32 ref: 6C8EBBEE
                                  • UpdateWindow.USER32(?), ref: 6C8EBBFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyMessageRectSendUpdateWindow
                                  • String ID: \sx
                                  • API String ID: 2064314377-995570312
                                  • Opcode ID: 1fcc163105519716aa73532a13068ce4ceb211a03d29f0b31e462467a5f9dac0
                                  • Instruction ID: b97432754433c5241494bcf623edea15561637aa4f4649e3dc5d325dab9f1574
                                  • Opcode Fuzzy Hash: 1fcc163105519716aa73532a13068ce4ceb211a03d29f0b31e462467a5f9dac0
                                  • Instruction Fuzzy Hash: F5014C727007099FCB04DF68C885BAE77BAFF4A268F154059E946EB250CB71AD42CB94
                                  APIs
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DA5
                                    • Part of subcall function 6C945D74: InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DBB
                                    • Part of subcall function 6C945D74: LeaveCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DC9
                                    • Part of subcall function 6C945D74: EnterCriticalSection.KERNEL32(00000000,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945DD6
                                  • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C8659DF
                                  • FreeLibrary.KERNEL32(?,?,Function_00026C9B,?,?,?,6C8F9E65,?,6C89F93B,?), ref: 6C8659EF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Enter$AddressFreeInitializeLeaveLibraryProc
                                  • String ID: HtmlHelpW$hhctrl.ocx
                                  • API String ID: 3484705245-3773518134
                                  • Opcode ID: 544f3171ffbbf3908b208ab762aa2d4bed23c79e7cecf3a98cc594dae10eccdd
                                  • Instruction ID: 2761d1d720aeee8426a0831bd45c84c92e7e1bd460c95d8c095527e4466abbbc
                                  • Opcode Fuzzy Hash: 544f3171ffbbf3908b208ab762aa2d4bed23c79e7cecf3a98cc594dae10eccdd
                                  • Instruction Fuzzy Hash: DA01F731600B0AABDB315FA7DD18B4A7BB0AF00769F00CD29E45696E51DB30E4548761
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CopyInfoMonitorRect
                                  • String ID: ($\sx
                                  • API String ID: 2119610155-4275447854
                                  • Opcode ID: 061e7fbae3a1105a97916dbf08edb634e6dd05a3c94b8867ff52d5c48e76b0d5
                                  • Instruction ID: 21583e1bf4e1f24669e5ac2d9dde7b1630ad583833bd4ffa8e43c30d0c4b007d
                                  • Opcode Fuzzy Hash: 061e7fbae3a1105a97916dbf08edb634e6dd05a3c94b8867ff52d5c48e76b0d5
                                  • Instruction Fuzzy Hash: A911A271A0070ADFCB14DFA9C58499AB7F8FF18605B50882EE5AAE3650E730EA45CF51
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,00000010,?,?,6C8F93BB,?,00000010,?,?,?,00000001,?,00000001), ref: 6C8F5A51
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6C8F5A61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                  • API String ID: 1646373207-2168864297
                                  • Opcode ID: fb0166ce6f774594fae83bb831e4c0938383dbdd67b1e1a312eeb5946d70a8b8
                                  • Instruction ID: 9a46b086a53f76e0778b28702ba61aeba7e15afe5c9d8da703b66dbfbf558da4
                                  • Opcode Fuzzy Hash: fb0166ce6f774594fae83bb831e4c0938383dbdd67b1e1a312eeb5946d70a8b8
                                  • Instruction Fuzzy Hash: ECF0963230571AAFDB105E54DC84827B77DFB811DD310C93AF564C2800D7328853C760
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,?,?,6C8F57EA,?,?,?,00000000,00000008,00000000,00000008,6C98FB15,80000000,CLSID,00000000), ref: 6C8F5AAE
                                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6C8F5ABE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                  • API String ID: 1646373207-3913318428
                                  • Opcode ID: 1bc3f13dad14c1973862dee8acb51a078c47aa6603e38645c58f85f8467cae2b
                                  • Instruction ID: 139aa829baea6834bae38432211a42c988b4e2ddbbeec3f331af8fe9463faa0c
                                  • Opcode Fuzzy Hash: 1bc3f13dad14c1973862dee8acb51a078c47aa6603e38645c58f85f8467cae2b
                                  • Instruction Fuzzy Hash: C1F0623234070AABCF115E94DC04B9A3BB9FB853D6F11C879F520C1850DB728463DBA0
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6C9CE0E3,00000001,?,00000001,?,?,?,6C9CE1D2,00000001,FlsFree,6CA3BB04,FlsFree), ref: 6C9CE13F
                                  • GetLastError.KERNEL32(?,6C9CE0E3,00000001,?,00000001,?,?,?,6C9CE1D2,00000001,FlsFree,6CA3BB04,FlsFree,00000001,?,6C9CD0F3), ref: 6C9CE149
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6C9CE171
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: 7bd1373362fce9af62debe14ea9a1aafb72f214475354856f8caf482463ab3d1
                                  • Instruction ID: 8a5bf76b5b147e2582a6a9096f383ee9c41613c53493c49c68b9ee92ffac6131
                                  • Opcode Fuzzy Hash: 7bd1373362fce9af62debe14ea9a1aafb72f214475354856f8caf482463ab3d1
                                  • Instruction Fuzzy Hash: 78E09230344609B7EB001A61DC06F483F29AB00B88F114420F90EE88D0DB72E6A696DA
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$Delete$H_prolog3
                                  • String ID:
                                  • API String ID: 487261545-0
                                  • Opcode ID: 612ecd7eeab881cf62a5e35e1a6e1c01ef02673b21a3319179db941d2d10a13e
                                  • Instruction ID: db90ef36195517449047b16ec5996803ddcb904080bcf383d8c1947e9fb8dfb8
                                  • Opcode Fuzzy Hash: 612ecd7eeab881cf62a5e35e1a6e1c01ef02673b21a3319179db941d2d10a13e
                                  • Instruction Fuzzy Hash: BB122670E017198FDB25CFA9C990B9EFBB5BF09304F10866AD459B7A50EB30A985CF50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8D5E81
                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C8D5EB4
                                  • GetWindow.USER32(?,00000005), ref: 6C8D5FC3
                                    • Part of subcall function 6C8D615D: BringWindowToTop.USER32(?), ref: 6C8D61FD
                                    • Part of subcall function 6C8D615D: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 6C8D6251
                                    • Part of subcall function 6C8D615D: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 6C8D625D
                                  • GetWindow.USER32(?,00000002), ref: 6C8D601D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Redraw$BringH_prolog3MessageSend
                                  • String ID:
                                  • API String ID: 259967589-0
                                  • Opcode ID: dd1528a4608fd89772d28dd9285295b75d281e88a8edac7def65fb12f284c06e
                                  • Instruction ID: a7aac64dfb5b4f5e227af759687c178792ee15b4bf04a0340f4ee06e75812cd6
                                  • Opcode Fuzzy Hash: dd1528a4608fd89772d28dd9285295b75d281e88a8edac7def65fb12f284c06e
                                  • Instruction Fuzzy Hash: 5C81B271B003199FDF259F658954BAE7772EF49314F05083AEC01ABB81DF74A905CBA1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C9A10AD
                                  • GetVersionExW.KERNEL32(?), ref: 6C9A1129
                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 6C9A12B9
                                  • CoCreateInstance.OLE32(6CA39C08,00000000,00000001,6CA30CE4,?), ref: 6C9A1300
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CreateH_prolog3_InitializeInstanceVersion
                                  • String ID:
                                  • API String ID: 1117250964-0
                                  • Opcode ID: ba536691f2674b3f73173883341cc6129c80aa0d29b81127e7ac8950fc948858
                                  • Instruction ID: 6c3d4da5e9e78b4031d3fd62ef97ff005e4f4aefdc0ba2914e4fb22505403723
                                  • Opcode Fuzzy Hash: ba536691f2674b3f73173883341cc6129c80aa0d29b81127e7ac8950fc948858
                                  • Instruction Fuzzy Hash: 7E813770B01616AFD758CF68C940BDAB7B8BF0A318F00825AE918D7B40DB30EA55CF95
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C85F8CD
                                  • InflateRect.USER32(?,000000FF,00000000), ref: 6C85F8ED
                                  • InflateRect.USER32(?,000000FF,000000FE), ref: 6C85F912
                                  • FillRect.USER32(?,?,?), ref: 6C85F933
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$Inflate$FillH_prolog3_
                                  • String ID:
                                  • API String ID: 3515757206-0
                                  • Opcode ID: fdd1c45f3abafccdbda6077b85ed1533ec52f2af4113108ca177a13dbcc682cd
                                  • Instruction ID: bd1d688fe68f261096454c38c32d8191450a781bfafd8b4254e6d7745718f710
                                  • Opcode Fuzzy Hash: fdd1c45f3abafccdbda6077b85ed1533ec52f2af4113108ca177a13dbcc682cd
                                  • Instruction Fuzzy Hash: 71618C71A0020DABCF15DF68CA84EEE77BAEF18358F500525F811A7790DB349D59CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8E07B6
                                  • SelectObject.GDI32(?,?), ref: 6C8E0983
                                    • Part of subcall function 6C86D4B1: __EH_prolog3.LIBCMT ref: 6C86D4B8
                                    • Part of subcall function 6C86D4B1: GetDC.USER32(00000000), ref: 6C86D4E4
                                  • SelectObject.GDI32(?,00000000), ref: 6C8E0874
                                  • GetSystemMetrics.USER32(00000000), ref: 6C8E0948
                                    • Part of subcall function 6C8DFBA7: GetTextExtentPoint32W.GDI32(?,?,0000007D,00000800), ref: 6C8DFBB9
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3ObjectSelect$ExtentMetricsPoint32SystemText
                                  • String ID:
                                  • API String ID: 182195805-0
                                  • Opcode ID: 1d920890a4a303236465b06360d2068f200853325c1a9163071e243ee55f6753
                                  • Instruction ID: 294ae4150722d33ef3e6d45c6069a7cdb759625c4781731ee9cfea9f66d8faec
                                  • Opcode Fuzzy Hash: 1d920890a4a303236465b06360d2068f200853325c1a9163071e243ee55f6753
                                  • Instruction Fuzzy Hash: C4710470A002099FDB14CF69C990BAEBBB5BF99308F10496EE415EB791DF30E946DB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C880D82
                                  • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 6C880ED8
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6C880EEA
                                  • DeleteObject.GDI32(00000000), ref: 6C880F42
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object$DeleteH_prolog3ImageLoad
                                  • String ID:
                                  • API String ID: 91933946-0
                                  • Opcode ID: 4d0e56099cca50f5423bfe11611ac2eb56996aac6497444f65ccfefb589e2ab9
                                  • Instruction ID: 9a4125690476f014ed70fbc86e0d3024ac5930039f22c35b2632d6b6f7e65479
                                  • Opcode Fuzzy Hash: 4d0e56099cca50f5423bfe11611ac2eb56996aac6497444f65ccfefb589e2ab9
                                  • Instruction Fuzzy Hash: 6461F331903705CBDF21DF68CA807EE77B5BF45314F208A69DC546BA95CB709946CBA0
                                  APIs
                                  • GlobalLock.KERNEL32(00000000), ref: 6C8F9E49
                                  • DestroyWindow.USER32(00000000,?,00000000,00000000,6C8F9B41,00000000,?,6C89F93B,?), ref: 6C8F9F32
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6C8F9F3F
                                  • GlobalFree.KERNEL32(00000000), ref: 6C8F9F46
                                    • Part of subcall function 6C996326: GetStockObject.GDI32(00000011), ref: 6C996348
                                    • Part of subcall function 6C996326: GetStockObject.GDI32(0000000D), ref: 6C996354
                                    • Part of subcall function 6C996326: GetObjectW.GDI32(00000000,0000005C,?), ref: 6C996365
                                    • Part of subcall function 6C996326: GetDC.USER32(00000000), ref: 6C996374
                                    • Part of subcall function 6C996326: GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C99638B
                                    • Part of subcall function 6C996326: MulDiv.KERNEL32(?,00000048,00000000), ref: 6C996397
                                    • Part of subcall function 6C996326: ReleaseDC.USER32(00000000,00000000), ref: 6C9963A3
                                    • Part of subcall function 6C996010: GlobalFree.KERNEL32 ref: 6C996017
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Global$Object$FreeStock$CapsDestroyDeviceLockReleaseUnlockWindow
                                  • String ID:
                                  • API String ID: 191377077-0
                                  • Opcode ID: 149aa39e60400e99dc4d79d12f606f94e56febcb00680d96530d0e837e51e2fe
                                  • Instruction ID: 05ad74509dfa24a3345b5c9246c06dfff587f103d611610538582275e03838bc
                                  • Opcode Fuzzy Hash: 149aa39e60400e99dc4d79d12f606f94e56febcb00680d96530d0e837e51e2fe
                                  • Instruction Fuzzy Hash: 9D518030A0121ADFCF15DFA4CA85AEEBBB4BF04358F154469E811E7750DB749E06CBA1
                                  APIs
                                  • SetMenu.USER32(?,?), ref: 6C87A45D
                                  • GetMenu.USER32(?), ref: 6C87A4CC
                                  • SetMenu.USER32(?,00000000), ref: 6C87A4F1
                                  • SendMessageW.USER32(?,00000362,?,00000000), ref: 6C87A582
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$MessageSend
                                  • String ID:
                                  • API String ID: 3482896889-0
                                  • Opcode ID: bd74c2a78702d7c96172a034fccc8062010ceb9ad25b4104f5ce2e4fd3fb4845
                                  • Instruction ID: 630b3d1c95738ba034a8e85b407634eda651dabf4b0d4e4bbc48af5b0a1aa8a6
                                  • Opcode Fuzzy Hash: bd74c2a78702d7c96172a034fccc8062010ceb9ad25b4104f5ce2e4fd3fb4845
                                  • Instruction Fuzzy Hash: 2241B571300206ABCB348F69C944AEEB7A9FF49754F148536E519C7E10E732E952CBA0
                                  APIs
                                  • ScreenToClient.USER32(?,?), ref: 6C8447F7
                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 6C844824
                                  • LoadMenuW.USER32(?,000000AD), ref: 6C844855
                                  • GetSubMenu.USER32(00000000,00000000), ref: 6C844869
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Menu$ClientLoadMessageScreenSend
                                  • String ID:
                                  • API String ID: 688987412-0
                                  • Opcode ID: 0f477ddc55ab8ef3135d30e2fead4825b58f0a0180ef3c6cc2135bc8ef4f8717
                                  • Instruction ID: 283b2eba437eb8e9e6c08d7dbdeea3e25aa7505a9cad5eb7de304975aff2d876
                                  • Opcode Fuzzy Hash: 0f477ddc55ab8ef3135d30e2fead4825b58f0a0180ef3c6cc2135bc8ef4f8717
                                  • Instruction Fuzzy Hash: DB41B471B00249AFDF24DFA8CA44BEE7BB5FF84304F108929F51597A90DB749905CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyRect
                                  • String ID:
                                  • API String ID: 2270935405-0
                                  • Opcode ID: 97e15270ffeaec4e796ca8f3dc3a44f3badbedf0447cd8a91efff7ba03e4ab93
                                  • Instruction ID: b83c5893a0aaea834b5244aa1d1a2c3691b267ef1517035ac0e09755c90d224b
                                  • Opcode Fuzzy Hash: 97e15270ffeaec4e796ca8f3dc3a44f3badbedf0447cd8a91efff7ba03e4ab93
                                  • Instruction Fuzzy Hash: 5751D9B09112258FCB648F5985C46E53BA8FB09B54F0842BBED0CCFA5AC7B05546DFA1
                                  APIs
                                  • EnableMenuItem.USER32(?,?,00000403), ref: 6C8733A9
                                  • GetFocus.USER32 ref: 6C8733C3
                                  • GetParent.USER32(?), ref: 6C8733CE
                                  • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 6C8733E3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EnableFocusItemMenuMessageParentSend
                                  • String ID:
                                  • API String ID: 2297321873-0
                                  • Opcode ID: 8aa6a535c7996d3a2a407e12832e01cd496c14ea0583be2b0f5792d210ec630f
                                  • Instruction ID: 735a98b53a0b979c78650a604108f5336f3d96c8e2ee71f4032cee313e73a367
                                  • Opcode Fuzzy Hash: 8aa6a535c7996d3a2a407e12832e01cd496c14ea0583be2b0f5792d210ec630f
                                  • Instruction Fuzzy Hash: DE41F231200205EFCB349F19C948B5EBBB5FF85719F108529E40587E90EB70AD86CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C86EF03
                                  • GetClientRect.USER32(6CA093EC,?), ref: 6C86EF52
                                    • Part of subcall function 6C867552: GetScrollPos.USER32(6CA093EC,00000800), ref: 6C86757E
                                    • Part of subcall function 6C944E37: GetModuleHandleW.KERNEL32(uxtheme.dll,?,6C86EF84,00000001,00000000,?,6C8542BA,?,50008200,0000E801,00000000,0000E828,0000E831,00000001,0000007E,?), ref: 6C944E46
                                    • Part of subcall function 6C944E37: GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6C944E56
                                    • Part of subcall function 6C944E37: EncodePointer.KERNEL32(00000000,?,6C8542BA,?,50008200,0000E801,00000000,0000E828,0000E831,00000001,0000007E,?,00000001,0000007D,?,00000800), ref: 6C944E5F
                                  • CreateCompatibleDC.GDI32(?), ref: 6C86EFEE
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C86F014
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CompatibleCreate$AddressBitmapClientEncodeH_prolog3HandleModulePointerProcRectScroll
                                  • String ID:
                                  • API String ID: 1015973060-0
                                  • Opcode ID: b587c197855babc7b30b157a509d1ff9674649791b2fa3ab818bc3116e98d5da
                                  • Instruction ID: b6cd49ba0b401fcabb17ec7ec6ca5c38ca08c817ca0a38a4ad2074f70a04ab2a
                                  • Opcode Fuzzy Hash: b587c197855babc7b30b157a509d1ff9674649791b2fa3ab818bc3116e98d5da
                                  • Instruction Fuzzy Hash: 6E414BB0A00606EFDB20CF6ACA84A99BBB4BF18308F15C96DE45987E50D770E955CFD1
                                  APIs
                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 6C86C9EA
                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 6C86CA4B
                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 6C86CA95
                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 6C86CAC4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 3cf0f17c457cd2be23705a1ca7907a718ae8d298d295f1215d74ebe1b49f77fb
                                  • Instruction ID: 13fb3993c3870450db06969043aa1f4cee448bb7e05bb0237d68ff1a22c9dcf0
                                  • Opcode Fuzzy Hash: 3cf0f17c457cd2be23705a1ca7907a718ae8d298d295f1215d74ebe1b49f77fb
                                  • Instruction Fuzzy Hash: 5631C8B1A40206FFEF25EE66CA84B6976B9FB00389F104879E11293E51CB70AD41D694
                                  APIs
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C85E4E6
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C85E527
                                  • InflateRect.USER32(?,?,?), ref: 6C85E558
                                  • InflateRect.USER32(?,00000001,00000001), ref: 6C85E583
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InflateRect
                                  • String ID:
                                  • API String ID: 2073123975-0
                                  • Opcode ID: 45a9673ebde7687eca977fb722211262c353a8f87dd90909ce260e5812364efd
                                  • Instruction ID: 1745c44f8649c1bfcbdefe1b9e49962951d271ee57c47d6eacc07ebb7d8fb65b
                                  • Opcode Fuzzy Hash: 45a9673ebde7687eca977fb722211262c353a8f87dd90909ce260e5812364efd
                                  • Instruction Fuzzy Hash: 03317472604219ABCF14EEACCD48DDF73ACBF08224B845E75B510D7691DBB4E8588BA0
                                  APIs
                                  • SetRectEmpty.USER32(00000000), ref: 6C944037
                                  • GetClientRect.USER32(?,00000000), ref: 6C944057
                                  • GetParent.USER32(?), ref: 6C944076
                                  • OffsetRect.USER32(00000000,00000000,00000000), ref: 6C9440F8
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$ClientEmptyOffsetParent
                                  • String ID:
                                  • API String ID: 3819956977-0
                                  • Opcode ID: beb0dc74206762ce9880b6853aae1b0437e3b53ead7d76ef482d5f323b68a4a1
                                  • Instruction ID: eac426c188bc481f49772b42cfcb7de75abbffecf229f3de7ee9fa6c74120d91
                                  • Opcode Fuzzy Hash: beb0dc74206762ce9880b6853aae1b0437e3b53ead7d76ef482d5f323b68a4a1
                                  • Instruction Fuzzy Hash: 26317071200602EFEB18CF69C998A69B7E8FF54359B14C56DE41AC7A40EB34EC51CBA0
                                  APIs
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,00000800,6C86418C,00000002,00000000,?,?,?,6C855846,6CA10964), ref: 6C863EC0
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000000,00000800,6C86418C,00000002,00000000,?,?,?,6C855846,6CA10964,?), ref: 6C863EED
                                  • RedrawWindow.USER32(?,00000000,00000000,00000185,?,00000000,00000800,6C86418C,00000002,00000000,?,?,?,6C855846,6CA10964,?), ref: 6C863F2A
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,6C855846,6CA10964,?,?,00000000,6C9F3E9D,000000FF,?,6C85449A,?), ref: 6C91A873
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: RedrawWindow
                                  • String ID:
                                  • API String ID: 2219533335-0
                                  • Opcode ID: ed576b3c37bdc43ef408a686c12491ae160c3e64e33011695650826bfac6c6cf
                                  • Instruction ID: 49119b8653444ae7700351990c71d67dbd1c3631a6384235656fc39b5f5b9134
                                  • Opcode Fuzzy Hash: ed576b3c37bdc43ef408a686c12491ae160c3e64e33011695650826bfac6c6cf
                                  • Instruction Fuzzy Hash: 29210332741B12ABEB310E16CE05B167374BF44B54F250969ED587BE90EB60FC868AD0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc3c63e6be320bd24faffcf9f7d86127015842dfdcc3d2dc74a24469945ed6a2
                                  • Instruction ID: d77c5d592e043e75229a9e9ea515485c5e4aa47a432d0b0212009ca77f67a565
                                  • Opcode Fuzzy Hash: bc3c63e6be320bd24faffcf9f7d86127015842dfdcc3d2dc74a24469945ed6a2
                                  • Instruction Fuzzy Hash: 98112732314B09ABDB101A6A9C08B8A3B7CEB92BA8F128165E410F7780D770FC118A71
                                  APIs
                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C8694BC
                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C8694E6
                                  • GetCapture.USER32 ref: 6C8694FC
                                  • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C86950B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$Capture
                                  • String ID:
                                  • API String ID: 1665607226-0
                                  • Opcode ID: 65b28a6ce9e3f657e720081667a66129dfa4ba49a5e49d354b5fa378b7c0415e
                                  • Instruction ID: 0a5c538563a87a517cc9e19a49c2b39bcd0e9dd84645507263d95efe471954fd
                                  • Opcode Fuzzy Hash: 65b28a6ce9e3f657e720081667a66129dfa4ba49a5e49d354b5fa378b7c0415e
                                  • Instruction Fuzzy Hash: 3311B23130020ABFEE251B258C8CFBE7B6EFF4879CF000424F60596E95DB719D5296A0
                                  APIs
                                  • FindResourceW.KERNEL32(?,?,00000006), ref: 6C841F48
                                  • LoadResource.KERNEL32(?,00000000), ref: 6C841F5C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoad
                                  • String ID:
                                  • API String ID: 2619053042-0
                                  • Opcode ID: 86acaffc1db5892db945a6b41d4de417de8388102cdb6cc27ff69610ba908d4c
                                  • Instruction ID: 78f19419c0f41fdbd9931c275af19fdb1157d5327985b4f35e98829b42e35afc
                                  • Opcode Fuzzy Hash: 86acaffc1db5892db945a6b41d4de417de8388102cdb6cc27ff69610ba908d4c
                                  • Instruction Fuzzy Hash: C101D633B0422A5BCB301B69ED444BAB76CEB857AA7018927FD4DD7500D731D81346A0
                                  APIs
                                  • FindResourceW.KERNEL32(?,?,00000005,?,00000000,00000000,00000000,?,6C9466FC,00000000,?,00000000,?,00000000,?,?), ref: 6C9477D4
                                  • LoadResource.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,6C9466FC,00000000,?,00000000,?,00000000,?,?), ref: 6C9477E9
                                  • LockResource.KERNEL32(00000000,?,00000000,00000000,00000000,?,6C9466FC,00000000,?,00000000,?,00000000,?,?), ref: 6C9477FB
                                  • GlobalFree.KERNEL32(?), ref: 6C94783A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Resource$FindFreeGlobalLoadLock
                                  • String ID:
                                  • API String ID: 3898064442-0
                                  • Opcode ID: 2a1b41bb5d12a5f01e3dc46a80ea20bed6b1c9feab36c53e754053156198f80d
                                  • Instruction ID: cac4fbc5fea3f5d9588f06ca3e82b3a9e7b17886d23781310747ffcc12617d3f
                                  • Opcode Fuzzy Hash: 2a1b41bb5d12a5f01e3dc46a80ea20bed6b1c9feab36c53e754053156198f80d
                                  • Instruction Fuzzy Hash: 8611B471601615ABC7265B56C884BDABBA8BF153A8F15C1B8E808E7B00DB71DC05CBE0
                                  APIs
                                    • Part of subcall function 6C8422D0: InitializeCriticalSectionEx.KERNEL32(6CA764DC,00000000,00000000,00000000,?,?,?,6C8800ED,00000000,00000000), ref: 6C842329
                                    • Part of subcall function 6C8422D0: GetLastError.KERNEL32(?,?,?,6C8800ED,00000000,00000000), ref: 6C842333
                                  • GdipCreateFromHDC.GDIPLUS(?,?), ref: 6C874773
                                  • GdipSetInterpolationMode.GDIPLUS(?,?,?,?), ref: 6C874784
                                  • GdipDeleteGraphics.GDIPLUS(?,?,?,?,?,?,?,?,?,?), ref: 6C8747BA
                                  • GdipDisposeImage.GDIPLUS(?), ref: 6C8747C2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Gdip$CreateCriticalDeleteDisposeErrorFromGraphicsImageInitializeInterpolationLastModeSection
                                  • String ID:
                                  • API String ID: 3355326447-0
                                  • Opcode ID: 417349d9946d6f3b3bafc061ede51db6e5603bbc4df34ef61657314680f79b0e
                                  • Instruction ID: 7004faa72363ff4a1e449c77d64be066f98341bc0efdf22942f297095229cd3c
                                  • Opcode Fuzzy Hash: 417349d9946d6f3b3bafc061ede51db6e5603bbc4df34ef61657314680f79b0e
                                  • Instruction Fuzzy Hash: B6113072A0011DEF8F20DFB8CA40DDEBBB8EF55748B104569E805E7610E736DA16CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C860202
                                  • IsRectEmpty.USER32(?), ref: 6C860224
                                    • Part of subcall function 6C91D54F: __EH_prolog3_GS.LIBCMT ref: 6C91D556
                                    • Part of subcall function 6C91D54F: CreateCompatibleDC.GDI32(00000000), ref: 6C91D5BA
                                    • Part of subcall function 6C91D54F: CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C91D5F0
                                    • Part of subcall function 6C91D54F: SelectObject.GDI32(?,00000000), ref: 6C91D644
                                  • IsRectEmpty.USER32(?), ref: 6C860268
                                  • FillRect.USER32(?,?,-000000A0), ref: 6C860289
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$CompatibleCreateEmpty$BitmapFillH_prolog3H_prolog3_ObjectSelect
                                  • String ID:
                                  • API String ID: 2706196367-0
                                  • Opcode ID: 4e041c112ab6837b8135dde0b416454af567cade28f95171ea939d978e8657c4
                                  • Instruction ID: 6d96c23c85ce142f94daee1be42d6e5636d353c6eccb5e376af7d2c2addd5008
                                  • Opcode Fuzzy Hash: 4e041c112ab6837b8135dde0b416454af567cade28f95171ea939d978e8657c4
                                  • Instruction Fuzzy Hash: 41118172604149ABCF55DFA4CE05EEE33BCBF2830CF584629A014E7A90DB74D519CB62
                                  APIs
                                  • GetParent.USER32(?), ref: 6C873F78
                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C873FBB
                                  • RedrawWindow.USER32(?,00000000,00000000,00000185,?,?,?,?,?,?,00000000), ref: 6C873FCB
                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C873FA3
                                    • Part of subcall function 6C87ACF0: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6C87AD64
                                    • Part of subcall function 6C87ACF0: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C87AD8D
                                    • Part of subcall function 6C87ACF0: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C87ADAC
                                    • Part of subcall function 6C87ACF0: SendMessageW.USER32(?,00000222,?,00000000), ref: 6C87ADC6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: MessageSend$ParentRedrawWindow
                                  • String ID:
                                  • API String ID: 2139789815-0
                                  • Opcode ID: 8211c5dfbe50868d76eb2d0b8e21d0300d7b01c164507f9295c552d3f6cc04ce
                                  • Instruction ID: 125ce9131673b1ec778e9554f935829baa9649e0cf68cc55fa47e86aa506f6cc
                                  • Opcode Fuzzy Hash: 8211c5dfbe50868d76eb2d0b8e21d0300d7b01c164507f9295c552d3f6cc04ce
                                  • Instruction Fuzzy Hash: CE11E532300605BFEB391A25CD58FAA76BAFB8478DF104439F50586990EF719C86DBA0
                                  APIs
                                    • Part of subcall function 6C86D51A: __EH_prolog3.LIBCMT ref: 6C86D521
                                    • Part of subcall function 6C86D51A: BeginPaint.USER32(?,?,00000004,6C842711), ref: 6C86D54D
                                  • GetWindowRect.USER32(?,?), ref: 6C844B1F
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5C5
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5D2
                                  • InflateRect.USER32(?,00000001,00000001), ref: 6C844B38
                                  • GetSysColor.USER32(00000010), ref: 6C844B46
                                  • GetSysColor.USER32(00000010), ref: 6C844B4B
                                    • Part of subcall function 6C86D6AE: EndPaint.USER32(?,?,78E4735C,?,?,Function_001B504C,000000FF,?,6C842998), ref: 6C86D6E0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClientColorPaintRectScreen$BeginH_prolog3InflateWindow
                                  • String ID:
                                  • API String ID: 3025975366-0
                                  • Opcode ID: 6d67a5c7114dfdb7696f32def3ae8d148fa04c14d3ef4d7cefee9f2fa717cf6d
                                  • Instruction ID: 6d54f87b03a493e697401864b53ece44f4cb00b2625dc244e9f50a6a6a5baca8
                                  • Opcode Fuzzy Hash: 6d67a5c7114dfdb7696f32def3ae8d148fa04c14d3ef4d7cefee9f2fa717cf6d
                                  • Instruction Fuzzy Hash: 76018471D00219ABCB25DBA4CC44FEEB7BCFB04714F10862AE415A3A80DBB8554ACBA0
                                  APIs
                                    • Part of subcall function 6C86D51A: __EH_prolog3.LIBCMT ref: 6C86D521
                                    • Part of subcall function 6C86D51A: BeginPaint.USER32(?,?,00000004,6C842711), ref: 6C86D54D
                                  • GetWindowRect.USER32(?,?), ref: 6C85395F
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5C5
                                    • Part of subcall function 6C86E5B6: ScreenToClient.USER32(?,?), ref: 6C86E5D2
                                  • InflateRect.USER32(?,00000001,00000001), ref: 6C853978
                                  • GetSysColor.USER32(00000010), ref: 6C853986
                                  • GetSysColor.USER32(00000010), ref: 6C85398B
                                    • Part of subcall function 6C86D6AE: EndPaint.USER32(?,?,78E4735C,?,?,Function_001B504C,000000FF,?,6C842998), ref: 6C86D6E0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ClientColorPaintRectScreen$BeginH_prolog3InflateWindow
                                  • String ID:
                                  • API String ID: 3025975366-0
                                  • Opcode ID: 698213589a7d8e9c27e1f025a731839d4091c99f22860ee38163e082bfe4d8a6
                                  • Instruction ID: d4641625fd9b93e09bfcaad37b8acc089a898d2fd02dc00a64dc3c760673b4de
                                  • Opcode Fuzzy Hash: 698213589a7d8e9c27e1f025a731839d4091c99f22860ee38163e082bfe4d8a6
                                  • Instruction Fuzzy Hash: FE018471D00219ABCB25DBA4CC44FEEB77CFB04714F10862AF415A3A80DBB8554ACBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C85D66E
                                  • FillRect.USER32(?,?,-000000D0), ref: 6C85D693
                                  • CreateSolidBrush.GDI32(000000FF), ref: 6C85D6AE
                                  • FillRect.USER32(00000000,00000000,00000000), ref: 6C85D6C7
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FillRect$BrushCreateH_prolog3Solid
                                  • String ID:
                                  • API String ID: 1242064992-0
                                  • Opcode ID: 2a490f9a5f62c9be9d6689c772d2e56bb4856bed10afc38e5772bc9b001489db
                                  • Instruction ID: d030ea1a6a044f53e11ea67a7e901954fefea9777fa8603c546b0bb6cd1f1ecd
                                  • Opcode Fuzzy Hash: 2a490f9a5f62c9be9d6689c772d2e56bb4856bed10afc38e5772bc9b001489db
                                  • Instruction Fuzzy Hash: FE119471900209EFCF54DF94CA04BEE77B8FF14319F454616E424A7690C7749A6ACFA2
                                  APIs
                                  • GetTopWindow.USER32(?), ref: 6C869CFE
                                  • GetTopWindow.USER32(00000000), ref: 6C869D41
                                  • GetWindow.USER32(00000000,00000002), ref: 6C869D63
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window
                                  • String ID:
                                  • API String ID: 2353593579-0
                                  • Opcode ID: 500ef3ba60862a9e6f1be1f8b0d21e6769bb2a5d12dbbcde33619f6f3a182cdd
                                  • Instruction ID: e08afd10ce211b3f3b8fb078c3c90a1967892ccfc0d589dd9046bd1169ed9ea7
                                  • Opcode Fuzzy Hash: 500ef3ba60862a9e6f1be1f8b0d21e6769bb2a5d12dbbcde33619f6f3a182cdd
                                  • Instruction Fuzzy Hash: 3901003220121ABBDF225F56CE04EDE3E29FF1639BF008825F915548A0C735C562EBA1
                                  APIs
                                  • GetDlgItem.USER32(?,?), ref: 6C86722D
                                  • GetTopWindow.USER32(00000000), ref: 6C86723A
                                    • Part of subcall function 6C867223: GetWindow.USER32(00000000,00000002), ref: 6C867289
                                  • GetTopWindow.USER32(?), ref: 6C86726E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$Item
                                  • String ID:
                                  • API String ID: 369458955-0
                                  • Opcode ID: c2dc6da9e79e6ae02a21c4c68c59f2fa40209da50f5c56507febf4307a2b4513
                                  • Instruction ID: a946c4375f40b4b3bd2c7a9b4b06fec0569b5da6c10f5af0b1450d77ac449129
                                  • Opcode Fuzzy Hash: c2dc6da9e79e6ae02a21c4c68c59f2fa40209da50f5c56507febf4307a2b4513
                                  • Instruction Fuzzy Hash: 40014431605656A7DB321E778E04EDE3B79AF02399F088919FD1698F10DF31C55286D1
                                  APIs
                                  • InvalidateRect.USER32(00000000,00000030,00000001,?,6C90C8D4,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C912F07
                                  • InvalidateRect.USER32(00000000,?,00000001,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C912F2C
                                  • InvalidateRect.USER32(00000000,?,00000001,?,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C912F55
                                  • UpdateWindow.USER32(00000000), ref: 6C912F69
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InvalidateRect$UpdateWindow
                                  • String ID:
                                  • API String ID: 488614814-0
                                  • Opcode ID: ced1c92ec14efa224d8e36da7ed7d548b67459aea1eb481d58744e1ac57e39c6
                                  • Instruction ID: 88d0f210847ac72e2a352734a70307ed99e77293ba8d1bd1ff8dcc3fb9b62217
                                  • Opcode Fuzzy Hash: ced1c92ec14efa224d8e36da7ed7d548b67459aea1eb481d58744e1ac57e39c6
                                  • Instruction Fuzzy Hash: AB018832315A009FE7109B18CC49F82B7F8FF09305F1085ADE19AC7AA0C370E892CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Parent$Focus
                                  • String ID:
                                  • API String ID: 384096180-0
                                  • Opcode ID: e9395cee47dcba5bfb70ae0a1258af5e9b9422da1bbe3699a54e302bb0aee123
                                  • Instruction ID: 15276ce97fc3c9cd18473daf09a2e725e0605f17d3fc5ee49794d62fde2b29aa
                                  • Opcode Fuzzy Hash: e9395cee47dcba5bfb70ae0a1258af5e9b9422da1bbe3699a54e302bb0aee123
                                  • Instruction Fuzzy Hash: F6F01232B007015BDE252B75CE0CD5A76F9BF492567040D6AA545D3F21DF35EC468790
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,6C9EFFD4,00000000,00000001,0000000C,00000000,?,6C9E4E5B,00000000,00000000,00000000), ref: 6C9F1E43
                                  • GetLastError.KERNEL32(?,6C9EFFD4,00000000,00000001,0000000C,00000000,?,6C9E4E5B,00000000,00000000,00000000,00000000,00000000,?,6C9E5435,00000000), ref: 6C9F1E4F
                                    • Part of subcall function 6C9F1E15: CloseHandle.KERNEL32(FFFFFFFE,6C9F1E5F,?,6C9EFFD4,00000000,00000001,0000000C,00000000,?,6C9E4E5B,00000000,00000000,00000000,00000000,00000000), ref: 6C9F1E25
                                  • ___initconout.LIBCMT ref: 6C9F1E5F
                                    • Part of subcall function 6C9F1DD7: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6C9F1E06,6C9EFFC1,00000000,?,6C9E4E5B,00000000,00000000,00000000,00000000), ref: 6C9F1DEA
                                  • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,6C9EFFD4,00000000,00000001,0000000C,00000000,?,6C9E4E5B,00000000,00000000,00000000,00000000), ref: 6C9F1E74
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: f8507aff7e1b44d942df4e8b3a239cade3a5f4dfb688e63de05524764c789cfd
                                  • Instruction ID: c2b4726aa9538c141ed38bbd41277b0d4f7521b151c983076abe2b51a84d42d1
                                  • Opcode Fuzzy Hash: f8507aff7e1b44d942df4e8b3a239cade3a5f4dfb688e63de05524764c789cfd
                                  • Instruction Fuzzy Hash: BDF0123A340256BBCF161F92DC089993F39FB0A3A9B448014FA3995520C731C822DBD0
                                  APIs
                                    • Part of subcall function 6C9EA1BA: GetOEMCP.KERNEL32(00000000,?,?,6C9E488F,4D88C033), ref: 6C9EA1E5
                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,6C9EA4CA,?,00000000,?,6C9E488F,4D88C033), ref: 6C9EA6E4
                                  • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,6C9EA4CA,?,00000000,?,6C9E488F,4D88C033), ref: 6C9EA720
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CodeInfoPageValid
                                  • String ID: \sx
                                  • API String ID: 546120528-995570312
                                  • Opcode ID: 26337703cbe17b65f39584a9c9815d0c123bab02b839379106d4f197e87ffe1a
                                  • Instruction ID: d4682a7f46e0751845bd1665b6fecf118482814eb27d344cb53db726f1b04ed0
                                  • Opcode Fuzzy Hash: 26337703cbe17b65f39584a9c9815d0c123bab02b839379106d4f197e87ffe1a
                                  • Instruction Fuzzy Hash: 26514571E003459EDB12CF36C8806AABFF9EFB9308F14816ED09287A61DB75D546CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 6C8468DF
                                    • Part of subcall function 6C9CB8AE: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,6C9C9415,?,6CA66060,?,?), ref: 6C9CB90F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1240500531
                                  • Opcode ID: 2709c6c6518d613bb0ee6ed22888f82b227410931ff5a633a9ee2cc8b1e12c99
                                  • Instruction ID: 13320dbd643b6b8b1a6ae54020f4a5e8249d5bd98039503c62efc50ab19d9d60
                                  • Opcode Fuzzy Hash: 2709c6c6518d613bb0ee6ed22888f82b227410931ff5a633a9ee2cc8b1e12c99
                                  • Instruction Fuzzy Hash: 9241E772910218ABCB14CF98CD45B9AF7B8EF55324F14C62AE924D7B40E734A944CBA1
                                  APIs
                                  • OffsetRect.USER32(?,00000001,00000001), ref: 6C85D846
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6C85D8D8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$InflateOffset
                                  • String ID: \sx
                                  • API String ID: 3840071959-995570312
                                  • Opcode ID: d48720c616c10e739a06127133c6b3b543e0d3477ce3823568c90b001fc8ee96
                                  • Instruction ID: 729c051a83f37dd4fa97ff33d57a7c131e0ad2f6140c5671c7887d6ba752c48d
                                  • Opcode Fuzzy Hash: d48720c616c10e739a06127133c6b3b543e0d3477ce3823568c90b001fc8ee96
                                  • Instruction Fuzzy Hash: 8041E371E00229DFCF60DFA4CA40ADE77B8EF09328B554A67EC11AB681C770D955CBA1
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9DEB85
                                  • ReadFile.KERNEL32(?,?,00001000,?,00000000,6C9DE8C2,00000001,00000000,6C84782E,00000000,?,?,00000000,?,?,6C9DED51), ref: 6C9DEC0B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: \sx
                                  • API String ID: 1834446548-995570312
                                  • Opcode ID: c3cca82ba959b7d0721120564c1ce1af8adccef010dae7e4e4b930de58cda913
                                  • Instruction ID: ab38b7e4d74c56fbd663b639ab0320bf82bd49b2237362af244d41af70e31ea2
                                  • Opcode Fuzzy Hash: c3cca82ba959b7d0721120564c1ce1af8adccef010dae7e4e4b930de58cda913
                                  • Instruction Fuzzy Hash: 27410435A00655ABDB25CF34CC80BD9B7B9AB48308F15C1A9E548A7640D7B1EAC6CF91
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6C98FAA8
                                  • RegCloseKey.ADVAPI32(00000000,?,?,00000001,?,00000000,?,?,?,?,?,?,?,?,0000022C,6C98FCF7), ref: 6C98FC4A
                                    • Part of subcall function 6C8F576F: __EH_prolog3.LIBCMT ref: 6C8F5776
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CloseH_prolog3H_prolog3_
                                  • String ID: CLSID
                                  • API String ID: 237612280-910414637
                                  • Opcode ID: 7ff3939b8b77857df6621d923887c0d694ce039996fa531cb76e2e6c3c656527
                                  • Instruction ID: 904232a2c2d368811b43b2dd055a09d7cf4de52e3705d4b0b3dbfdccf70519e0
                                  • Opcode Fuzzy Hash: 7ff3939b8b77857df6621d923887c0d694ce039996fa531cb76e2e6c3c656527
                                  • Instruction Fuzzy Hash: F7519475D4121D9FDB24CF54CC88AD9B3B5AF68348F1485E9E819A3710DB30DE858F60
                                  APIs
                                  • SystemTimeToVariantTime.OLEAUT32(?,?), ref: 6C864C89
                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 6C864CB5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Time$SystemVariant
                                  • String ID: \sx
                                  • API String ID: 352189841-995570312
                                  • Opcode ID: b172763a7094e4ea30c00fd5dccc2077e523a3b7bb6e7cddf3300d53cc21e312
                                  • Instruction ID: fcaf41882a81e749bad6c7c1fd9a2a23c90973d06135ec5ab7dc8f0680403049
                                  • Opcode Fuzzy Hash: b172763a7094e4ea30c00fd5dccc2077e523a3b7bb6e7cddf3300d53cc21e312
                                  • Instruction Fuzzy Hash: 5D41B635B0020AABCB00EF5AC950AAEB7B6FF85718F508519EC15D7B40D730EE42C764
                                  APIs
                                  • StringFromGUID2.OLE32(?,?,00000027,?,?,00000000,00000000,?), ref: 6C8F5C5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FromString
                                  • String ID: Interface\$\sx
                                  • API String ID: 1694596556-2077585241
                                  • Opcode ID: 48d3587dace222a123bab27a8f7510e099443a6418572f86e5002be2d4cf2aa0
                                  • Instruction ID: db6d457ca060dbcf439329a0ca8608f5e1cb2603f649cfbbc07094219c9e375a
                                  • Opcode Fuzzy Hash: 48d3587dace222a123bab27a8f7510e099443a6418572f86e5002be2d4cf2aa0
                                  • Instruction Fuzzy Hash: 9B414D34A002299FCB14DB14CD65ADEB7B8EF49344F0144DAE54AE7610CB71AE83CF90
                                  APIs
                                  • GetClientRect.USER32(?,0000002C), ref: 6C8D8C70
                                  • IsRectEmpty.USER32(0000002C), ref: 6C8D8C7A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$ClientEmpty
                                  • String ID: \sx
                                  • API String ID: 2342100703-995570312
                                  • Opcode ID: 3bb289d03831ecc40e7ca54242c356bdcc4d268e6171d241ce9ac5aaaf98d14d
                                  • Instruction ID: 17ca39897139a5ab0087f1f0dac1aa6524c52828fcc4695273a8d7ddd7682b29
                                  • Opcode Fuzzy Hash: 3bb289d03831ecc40e7ca54242c356bdcc4d268e6171d241ce9ac5aaaf98d14d
                                  • Instruction Fuzzy Hash: 5E41AE70B0121A9BCF089F24C898AAEB7B5FF55218F15457ED80ADB681DF34A946CB90
                                  APIs
                                  • GetWindowRect.USER32(?,00000001), ref: 6C898826
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: RectWindow
                                  • String ID: 4(@P$\sx
                                  • API String ID: 861336768-2506994739
                                  • Opcode ID: d2f1aeedb7289480d48eddbbf70e3a0efcabc44142f946c5e27f7a6b2e2ffff9
                                  • Instruction ID: c7f6fdabfa282303f4bbcefa666ce2331384b8e0f1244b2f9cd6daf3c8403adc
                                  • Opcode Fuzzy Hash: d2f1aeedb7289480d48eddbbf70e3a0efcabc44142f946c5e27f7a6b2e2ffff9
                                  • Instruction Fuzzy Hash: BE417D75A0020AEFCB14CF68C994AEEB7B4FF59314F21456EE815E7701D730AA15CBA0
                                  APIs
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,6C9E54AA,00000000,?,00000000,?,00000000,00000000,0000000C,00000000,00000000,6CA66658), ref: 6C9E51C2
                                  • GetLastError.KERNEL32(6C9E54AA,00000000,?,00000000,?,00000000,00000000,0000000C,00000000,00000000,6CA66658,00000014,6C9D7014,00000000,00000000,00000000), ref: 6C9E51F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: \sx
                                  • API String ID: 442123175-995570312
                                  • Opcode ID: c9e7008a3627194f416de3840caf26c0f8c438904c3e3e0c620fc135469c90fa
                                  • Instruction ID: 55acc289ebe3736cc35fefc95988d1f09a9859e26383634f198608b873862e8f
                                  • Opcode Fuzzy Hash: c9e7008a3627194f416de3840caf26c0f8c438904c3e3e0c620fc135469c90fa
                                  • Instruction Fuzzy Hash: 9331A17170021AAFDB19CF68CC81AEA77B9EF58305F1440A9E506D7790D770EE818B61
                                  APIs
                                  • GetStringTypeW.KERNEL32(?,-00000008,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,FFFFF9B5), ref: 6C9EBD86
                                  • __freea.LIBCMT ref: 6C9EBD93
                                    • Part of subcall function 6C9E15D2: HeapAlloc.KERNEL32(00000000,?,?,?,6C9CAD3B,?,?,?,?,?,6C844C3D,6C9C9407,?,?,6C9C9407), ref: 6C9E1604
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: AllocHeapStringType__freea
                                  • String ID: \sx
                                  • API String ID: 2523373117-995570312
                                  • Opcode ID: a26af38c10967bab6550c66371f6298b9350fc638dfdc6794b38fcaf572dcd2b
                                  • Instruction ID: d37f21d250b7536aa85e14909ced0a868e0a8addaed6c4a6376abd7070fee26c
                                  • Opcode Fuzzy Hash: a26af38c10967bab6550c66371f6298b9350fc638dfdc6794b38fcaf572dcd2b
                                  • Instruction Fuzzy Hash: EF3107B2A0130AABDF128F65CC40EEF7BB8EF68318F114168EC1897650E734C991C7A5
                                  APIs
                                  • GetObjectW.GDI32(00000008,00000018,?), ref: 6C882141
                                  • IntersectRect.USER32(00000000,?,00000000), ref: 6C8821AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: IntersectObjectRect
                                  • String ID: \sx
                                  • API String ID: 3895296623-995570312
                                  • Opcode ID: 71b1470e6e09d7986efe642195513c970a7e7ad0a60ac9bd52b5ffa363164f0d
                                  • Instruction ID: d70c28edbb09432e64e5168b6e0cd87059cd388139aac70689be17f09aaf2f77
                                  • Opcode Fuzzy Hash: 71b1470e6e09d7986efe642195513c970a7e7ad0a60ac9bd52b5ffa363164f0d
                                  • Instruction Fuzzy Hash: 29318175E02219ABCF14CFA4D944AEEBBF9FF48314F20812AE511F3640DB749A46CB90
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000,?,6C9E5493,00000000,?,00000000,?,00000000,00000000), ref: 6C9E509A
                                  • GetLastError.KERNEL32(?,6C9E5493,00000000,?,00000000,?,00000000,00000000,0000000C,00000000,00000000,6CA66658,00000014,6C9D7014,00000000,00000000), ref: 6C9E50C0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: \sx
                                  • API String ID: 442123175-995570312
                                  • Opcode ID: 5c4d865aaca72694525492574ab3ae2afea276c28de8d09d374b5f24c3df9fa0
                                  • Instruction ID: 026c953f83f336abce1b6b56bc0612d5caff992752a96d2662591fa48eca0195
                                  • Opcode Fuzzy Hash: 5c4d865aaca72694525492574ab3ae2afea276c28de8d09d374b5f24c3df9fa0
                                  • Instruction Fuzzy Hash: 21219131B01219DBCB15CF19C8809EAB3B9FF5D315F1445AAE90AD7250D730EE86CBA1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FreeGlobalH_prolog3
                                  • String ID: \sx
                                  • API String ID: 3174139085-995570312
                                  • Opcode ID: 475098ce0e2437aba71235be705535f2f2927635c524685f797d70bb1ee68c7c
                                  • Instruction ID: c0bd814db4bc9616efbd8f956b7062feb0eae62e942229ccc761049bdfb6c2ed
                                  • Opcode Fuzzy Hash: 475098ce0e2437aba71235be705535f2f2927635c524685f797d70bb1ee68c7c
                                  • Instruction Fuzzy Hash: E321C571200B04ABDB249F78C940BDE77A5FF10618F108A2DE46A87B81DF34E905C755
                                  APIs
                                  • EnableScrollBar.USER32(?,00000002,00000000), ref: 6C90B169
                                  • EnableScrollBar.USER32(?,00000002,00000003), ref: 6C90B1C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EnableScroll
                                  • String ID: \sx
                                  • API String ID: 2561945981-995570312
                                  • Opcode ID: 9b4cc7267f5e7e4486ff0bc3df6721fa02b7163927d30bb5384443ef6e44a1b6
                                  • Instruction ID: 2db737026d97345bebc5621c234efeadf305b6614c9e24e43e34110081f6ab7b
                                  • Opcode Fuzzy Hash: 9b4cc7267f5e7e4486ff0bc3df6721fa02b7163927d30bb5384443ef6e44a1b6
                                  • Instruction Fuzzy Hash: 68213E31741208ABDF049F69CC96FEE77B9AB54744F04046DE506AB6C2DBB4EA05CBA0
                                  APIs
                                  • GetObjectW.GDI32(?,00000054,?), ref: 6C880FE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Object
                                  • String ID: $\sx
                                  • API String ID: 2936123098-758330267
                                  • Opcode ID: 664344b8d8f51a22ab66aa7e5505272dcbcbb068525b398491ac2d8ab874a1d8
                                  • Instruction ID: acd3fc974fc75bb4debfa8f4201678daee1aa93a6abaaeb14c6773331e7cfb5e
                                  • Opcode Fuzzy Hash: 664344b8d8f51a22ab66aa7e5505272dcbcbb068525b398491ac2d8ab874a1d8
                                  • Instruction Fuzzy Hash: 5421CD31B0B1CA4ED734CB658E542AEFBF59F55308B05846AC064DFD81CB31D919D740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: EmptyH_prolog3_Rect
                                  • String ID: Afx:ToolBar
                                  • API String ID: 2941628838-177727192
                                  • Opcode ID: 8ec78bb2c23549e58467e62a7c561ab31e42a7f1d73e277c8591f7b193f667fc
                                  • Instruction ID: 70f1ea4ab64cf912e5afe63f62210b10c089dd7ddc60b70494de69e936db0b44
                                  • Opcode Fuzzy Hash: 8ec78bb2c23549e58467e62a7c561ab31e42a7f1d73e277c8591f7b193f667fc
                                  • Instruction Fuzzy Hash: 3A218931A002099FCF08CF68CA85AEE7AE1AF08314F05462EF805E7680DB34AD548BA4
                                  APIs
                                  • GetSysColor.USER32(00000014), ref: 6C86F548
                                  • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 6C86F5C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: BitmapColorCreate
                                  • String ID: \sx
                                  • API String ID: 2048008349-995570312
                                  • Opcode ID: 469f8b198186ea47192e0afe8d2d3daafeb08a1873e6e4412489b02cbf92b536
                                  • Instruction ID: f9793440ab4db3d91e19173cf247e0b0070c83d38597c254c00301c98f302d1a
                                  • Opcode Fuzzy Hash: 469f8b198186ea47192e0afe8d2d3daafeb08a1873e6e4412489b02cbf92b536
                                  • Instruction Fuzzy Hash: F6218420B0138D9AEB05DF788846BEDB7B4BF15348F10C15DD545F7241EB309A4ACB65
                                  APIs
                                  • CreateDIBSection.GDI32(00000000,00000028,00000000,?,00000000,00000000), ref: 6C91BADD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CreateSection
                                  • String ID: ($\sx
                                  • API String ID: 2449625523-4275447854
                                  • Opcode ID: b60ae53d522edcb9d53523144eb7cdffa0579c6e5de83fde28bdca4f7d4b34f9
                                  • Instruction ID: 499a6127995c189af016f4b3941e00839b88ba339b022954f723b2a11a364a5e
                                  • Opcode Fuzzy Hash: b60ae53d522edcb9d53523144eb7cdffa0579c6e5de83fde28bdca4f7d4b34f9
                                  • Instruction Fuzzy Hash: 992166B1A15209AFEB08DFA9D845AEEB7F9EF49704F10812EE901E7B40D770D9058B54
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3~refcount_ptr
                                  • String ID: \sx
                                  • API String ID: 249636908-995570312
                                  • Opcode ID: c27db505f095906623e71260492c2066306df70e4fc854d787f543956dd1e255
                                  • Instruction ID: 217d62783705a952599c8f84b628f1a383b79d7f4f79dcea2def3436dae9e3b7
                                  • Opcode Fuzzy Hash: c27db505f095906623e71260492c2066306df70e4fc854d787f543956dd1e255
                                  • Instruction Fuzzy Hash: C3218971900B44EFCB24DF58C941B9AB7F4FF28708F10891EA55697B80DB74EA48CB91
                                  APIs
                                    • Part of subcall function 6C86C609: GetWindowLongW.USER32(?,000000F0), ref: 6C86C616
                                  • GetWindowRect.USER32(?,00000000), ref: 6C86A8F9
                                  • GetWindow.USER32(?,00000004), ref: 6C86A916
                                    • Part of subcall function 6C86C773: IsWindowEnabled.USER32(?), ref: 6C86C77E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Window$EnabledLongRect
                                  • String ID: \sx
                                  • API String ID: 3170195891-995570312
                                  • Opcode ID: 89670ddc58fd7734d9f89a3200491018ada81482dcaf3b2e2f6ce536ba1f3bd8
                                  • Instruction ID: 034d9864515f3cfd17f764e0944e2b95d990be202e547a465c2e49c7dc56fec6
                                  • Opcode Fuzzy Hash: 89670ddc58fd7734d9f89a3200491018ada81482dcaf3b2e2f6ce536ba1f3bd8
                                  • Instruction Fuzzy Hash: 7511043070021A9BDF15DB2ACA51BFEB3B6AF4530CF214519E812D7A40DB34E956CB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8F5776
                                  • RegOpenKeyExW.ADVAPI32(?,?,?,00000000,00000008,00000000,00000008,6C98FB15,80000000,CLSID,00000000,00020019,?,00000000,0000022C,6C98FCF7), ref: 6C8F57EC
                                    • Part of subcall function 6C8B3367: __EH_prolog3.LIBCMT ref: 6C8B336E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Open
                                  • String ID: Software\Classes\
                                  • API String ID: 1097726706-1121929649
                                  • Opcode ID: fded692aedcaccf56162d297db81947c6f25a1d430a6fb3d3a73a75c89d99b25
                                  • Instruction ID: 90476855217559d4af0ceeb9621983cdca6d1a885a88df3a86eb4e718e95598b
                                  • Opcode Fuzzy Hash: fded692aedcaccf56162d297db81947c6f25a1d430a6fb3d3a73a75c89d99b25
                                  • Instruction Fuzzy Hash: 4511A57590121EDFCF15DF94CA40AEE7B74BF14348F108869E82163B40DF319A5ACBA2
                                  APIs
                                  • CopyRect.USER32(00000000,00000000), ref: 6C94492B
                                  • GetWindowRect.USER32(6C944C83,?), ref: 6C94493A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: Rect$CopyWindow
                                  • String ID: \sx
                                  • API String ID: 1174400184-995570312
                                  • Opcode ID: 9f8879a5fdd33c3b0c0d7541371dd0d8869390b3b84ff3eb08538d345f90bdb0
                                  • Instruction ID: 02737318678b61174749f00b91729ea4dafa0ddece1bd44a11f1aa68243ca0d6
                                  • Opcode Fuzzy Hash: 9f8879a5fdd33c3b0c0d7541371dd0d8869390b3b84ff3eb08538d345f90bdb0
                                  • Instruction Fuzzy Hash: 03016231B00209ABCB14DF68C984ADFB3F9BF1A318F11851DB506A7240DB70AE45CB61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8F5895
                                  • RegSetValueW.ADVAPI32(?,?,?,00000000,00000008), ref: 6C8F58F9
                                    • Part of subcall function 6C8B3367: __EH_prolog3.LIBCMT ref: 6C8B336E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Value
                                  • String ID: Software\Classes\
                                  • API String ID: 2677715340-1121929649
                                  • Opcode ID: e0be084d0c2e59dbfd866407b91ff91b4f39319ee5ad417b7663c76a26634006
                                  • Instruction ID: 1e7275e2529d84da7414dc1ce10f8a4ce5a9b13a58726347b67e2f84ab540ee0
                                  • Opcode Fuzzy Hash: e0be084d0c2e59dbfd866407b91ff91b4f39319ee5ad417b7663c76a26634006
                                  • Instruction Fuzzy Hash: C401757590012EAFCF11DFD4CD00AEF7774BF14358F144915E91167780DB319A5A97A2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8F5810
                                  • RegQueryValueW.ADVAPI32(?,?,?,00000000), ref: 6C8F5871
                                    • Part of subcall function 6C8B3367: __EH_prolog3.LIBCMT ref: 6C8B336E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: H_prolog3$QueryValue
                                  • String ID: Software\Classes\
                                  • API String ID: 3057600494-1121929649
                                  • Opcode ID: d70469f37aa99eac1f7f366b7b6accd50115a8eb6e36b939e0272b2d0293f035
                                  • Instruction ID: 85b4b7982e890ca30c0990107113a2ea20d3c845423955d0b5b9224b65e88ce7
                                  • Opcode Fuzzy Hash: d70469f37aa99eac1f7f366b7b6accd50115a8eb6e36b939e0272b2d0293f035
                                  • Instruction Fuzzy Hash: 5701847590011EAFCF21DBA4CE00AFF7774BF14358F144919E82167B80DB319A5A8BA2
                                  APIs
                                  • InvalidateRect.USER32(?,00000001,00000001), ref: 6C936628
                                  • UpdateWindow.USER32(?), ref: 6C936631
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: InvalidateRectUpdateWindow
                                  • String ID: \sx
                                  • API String ID: 1236202516-995570312
                                  • Opcode ID: 88dfb19f0c831db84a0a9b5f3a861c3da55951d656c5faa59c5a89fbbb1f6740
                                  • Instruction ID: fb806b6a95233b8046e235e6bbf680f9fed8983f9658b514a980c80413270f08
                                  • Opcode Fuzzy Hash: 88dfb19f0c831db84a0a9b5f3a861c3da55951d656c5faa59c5a89fbbb1f6740
                                  • Instruction Fuzzy Hash: 7501D63170120AEBCF04DF64C808ABEB7B9FF59348F114029E401E3550DB30AA46CB91
                                  APIs
                                  • SetBkColor.GDI32(?,75A7CF90), ref: 6C872771
                                  • ExtTextOutW.GDI32(?,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 6C8727A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: ColorText
                                  • String ID: \sx
                                  • API String ID: 2223400495-995570312
                                  • Opcode ID: 50cb2607f53bccfa05bd397c8f8e87da71ff6e1f7e038dca98dafdb7ffee06ee
                                  • Instruction ID: 8bcaea6d0625fd04887d45848f231b86d4750e1ca77404671034fb4c3c5720b8
                                  • Opcode Fuzzy Hash: 50cb2607f53bccfa05bd397c8f8e87da71ff6e1f7e038dca98dafdb7ffee06ee
                                  • Instruction Fuzzy Hash: 9F01FBB0A00209AFDF08DF58CD469AFBBB5EF09304B00812EB81693351D770AE11CBA5
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6C8C495A
                                  • FindResourceW.KERNEL32(?,0000007D,STYLE_XML,0000007D,00000800,00000004,6C85583C,00000000,00000000,?,?,00000000,6C9F3E9D,000000FF,?,6C85449A), ref: 6C8C4998
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: FindH_prolog3Resource
                                  • String ID: STYLE_XML
                                  • API String ID: 3036663282-3909253476
                                  • Opcode ID: f0cd2073d94425d8e2a935de04cc658bb0b37d611172e0f2480e03faf4ff4115
                                  • Instruction ID: e981ef565d236f0bdc295d52116cb4d997596848b9fe9e54c5b4865565857c4c
                                  • Opcode Fuzzy Hash: f0cd2073d94425d8e2a935de04cc658bb0b37d611172e0f2480e03faf4ff4115
                                  • Instruction Fuzzy Hash: 67F0C8757002399BCB25DB788D805FD72B8BFD53087114D25F021A7B50C770D58A8B6A
                                  APIs
                                    • Part of subcall function 6C841F00: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,6C9AE061,?,6C842BB6,80004005,?,6C946181,00000004,6C945966,6C9AE061,6C9AE061,00000010,6C86717D,6C9AE061), ref: 6C841F05
                                    • Part of subcall function 6C841F00: GetLastError.KERNEL32(?,00000000,00000000,6C9AE061,?,6C842BB6,80004005,?,6C946181,00000004,6C945966,6C9AE061,6C9AE061,00000010,6C86717D,6C9AE061), ref: 6C841F0F
                                  • IsDebuggerPresent.KERNEL32(?,?,?,6C841CBD), ref: 6C9C9032
                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,6C841CBD), ref: 6C9C9041
                                  Strings
                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 6C9C903C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                  • API String ID: 3511171328-631824599
                                  • Opcode ID: 9804667930e07d00bc58b7831fd97730d3f2146fd7edab921cc42508e74ce741
                                  • Instruction ID: 5d041f52d79ef3ad508c488056b347ec2be9dbc7729cf156131a5b50c5cfcdfb
                                  • Opcode Fuzzy Hash: 9804667930e07d00bc58b7831fd97730d3f2146fd7edab921cc42508e74ce741
                                  • Instruction Fuzzy Hash: 2EE039703003528BD7349F28D6043467AE8AF0978DF04896CE49AC6B00EBB6D08ACB62
                                  APIs
                                  • EnterCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DA5
                                  • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DBB
                                  • LeaveCriticalSection.KERNEL32(6CA75378,?,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000), ref: 6C945DC9
                                  • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945DD6
                                    • Part of subcall function 6C945D50: InitializeCriticalSection.KERNEL32(6CA75378,6C945D8E,?,?,6C94325E,00000010,00000008,6C87313A,6C87317D,6C866C9B,6C873149,6C86EB35,00000004,6C86E0A4,00000000,?), ref: 6C945D68
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3181485367.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                                  • Associated: 00000004.00000002.3181468531.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181617241.000000006CA07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181659829.000000006CA6B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181676663.000000006CA6D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181696145.000000006CA71000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181711812.000000006CA73000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CA77000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000004.00000002.3181728563.000000006CAB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_6c840000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterInitialize$Leave
                                  • String ID:
                                  • API String ID: 713024617-0
                                  • Opcode ID: 6ddc8d10f4f37ae3bf111c5258ad9d0b38e749f1029f2b48231e6397242f51d1
                                  • Instruction ID: 2184424700fcef33c24b0b11f6599554d6070954fd788e96e3ef88be9f1c389a
                                  • Opcode Fuzzy Hash: 6ddc8d10f4f37ae3bf111c5258ad9d0b38e749f1029f2b48231e6397242f51d1
                                  • Instruction Fuzzy Hash: 6CF0C2B2B00329AFDB091F988C4CB59B73CFF5335AF848026E401D2951D371D8438AB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.3180934718.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.3180911974.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.000000000040C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.0000000000414000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3180955468.0000000000456000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000004.00000002.3181055019.000000000049F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_ShellExperienceHosts.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: h3A$l3A$p3A$t3A
                                  • API String ID: 0-422395243
                                  • Opcode ID: 323ff9953e1600890f904706cadf687cbd5e63ac7881b1e7a3b936ad8b4e984c
                                  • Instruction ID: 0d0a6c218b558ce51a144ca132cdf3fd2609f9de01a02927fca728c9dddb9a1a
                                  • Opcode Fuzzy Hash: 323ff9953e1600890f904706cadf687cbd5e63ac7881b1e7a3b936ad8b4e984c
                                  • Instruction Fuzzy Hash: 59E0B632A9C50E268A158DBC210C4663A8CD291719B084173B45CEEFA4D92AEF90D08D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2990311884.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_34c0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe3aa60384a89de284f4266405d742502e20f087f037a1a067c1f4890adbe76a
                                  • Instruction ID: 5c521dba8fb3b0ef3da1874dad83e80c145abdc5ce405113188ca16aad073dd0
                                  • Opcode Fuzzy Hash: fe3aa60384a89de284f4266405d742502e20f087f037a1a067c1f4890adbe76a
                                  • Instruction Fuzzy Hash: 6B91A174A002458FCB15CF9DC4949AEFBB1FF88310B2485AAD815AB365C776FC51CB94
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2990311884.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_34c0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 335a90bef42f20b6e917d8b06692261a25f129880029205e3b2293e6667cb4ee
                                  • Instruction ID: 6a36316d1555e2125efc310e2ef1d837842065b62bec465f8fd104decf9766d5
                                  • Opcode Fuzzy Hash: 335a90bef42f20b6e917d8b06692261a25f129880029205e3b2293e6667cb4ee
                                  • Instruction Fuzzy Hash: 2A417C74A005498FCB05CF49C1989AEFBB1FF48310B1585AAC815AB364C7B2FC51CFA4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2990311884.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_34c0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c836495c83630bc7ce21b6c30e4fd693b3900d9070b6aa5ea53b4b50acdbfa71
                                  • Instruction ID: 1cecfd8b1065896b744dd0d90befa10c13fb9be49620ae15bc8bc8431ffcd0dc
                                  • Opcode Fuzzy Hash: c836495c83630bc7ce21b6c30e4fd693b3900d9070b6aa5ea53b4b50acdbfa71
                                  • Instruction Fuzzy Hash: 8021902651E3D25FDB07D728ACB00D5BF74AE4723071A48D7C4A0CF1A3C6558E0AC7AA
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2990311884.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_34c0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac66e5b337de518aae7a789167a5ba954550fcfcb7c88e6e7fb0601b696f7f45
                                  • Instruction ID: 08be2b3509afccbcaa2ab180c976cd8307cb549be1d76beb3c2b823e6fcec4bd
                                  • Opcode Fuzzy Hash: ac66e5b337de518aae7a789167a5ba954550fcfcb7c88e6e7fb0601b696f7f45
                                  • Instruction Fuzzy Hash: 6B11E5345092949FCB03DF6CD8A09E9BF70EF0A320B1485CBD4619F262C6369C56CB64
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2989854792.000000000341D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0341D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_341d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f497bad3f8cf26ca359bf7d6293084fbe520dbedf346fd4cf8c13bee36c45bfb
                                  • Instruction ID: e89fdacb48bad6c8c5fb72265534ea4d3f2e927051fa63a6a9094afba51d45f1
                                  • Opcode Fuzzy Hash: f497bad3f8cf26ca359bf7d6293084fbe520dbedf346fd4cf8c13bee36c45bfb
                                  • Instruction Fuzzy Hash: 8F01407244E7C05ED7128B25C994B62BFB8DF57224F1D80DBD9888F2A3C2695849C772
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2989854792.000000000341D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0341D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_341d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4c36d6d1c4b8d8afde60c7287b35806797572beef4e8af8fcf7117bed9335902
                                  • Instruction ID: 86bea63abfc37d2aead769b9d8486b56d4273af91a2f95c5904c7832df6ba454
                                  • Opcode Fuzzy Hash: 4c36d6d1c4b8d8afde60c7287b35806797572beef4e8af8fcf7117bed9335902
                                  • Instruction Fuzzy Hash: CB01F7B18047409AE710CA29CDC0B77FF98DF42368F0CC46BED484E242C6789842C6B5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'sq$4'sq$4'sq$4'sq
                                  • API String ID: 0-1617174353
                                  • Opcode ID: c8d42f553456111e41badc1b354ae01e7124a258bc5851c3ecff11bfbbbfa5e5
                                  • Instruction ID: 2931c4b8022c98d6ff3285f38b6a7136e390eb6de974b830fbe858fde6bca357
                                  • Opcode Fuzzy Hash: c8d42f553456111e41badc1b354ae01e7124a258bc5851c3ecff11bfbbbfa5e5
                                  • Instruction Fuzzy Hash: F4120332F042148FDB55EB7898116BABFA29FC1350F1481BADA05CB691EF36C985C7E1
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11473a99adb58c34718bbe41bcc90a8b8c29e4e49f080e4746b35d82ac2f386a
                                  • Instruction ID: c37e1521f702e05256963791c7d70a44e9ccebd3d3d1325398404cc28e463e99
                                  • Opcode Fuzzy Hash: 11473a99adb58c34718bbe41bcc90a8b8c29e4e49f080e4746b35d82ac2f386a
                                  • Instruction Fuzzy Hash: 28022A78A052599FDB05CF98C484AADFBB2FF48314F25815AE849EB361C731ED85CB90
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3975501b4961336d59b9b39f9f02d02032d7af4391db179b5740ab2609f481b
                                  • Instruction ID: 75be0aefac01ca3339bdc5390471906e5c452a0e67a3685f6353906cd1bfac32
                                  • Opcode Fuzzy Hash: d3975501b4961336d59b9b39f9f02d02032d7af4391db179b5740ab2609f481b
                                  • Instruction Fuzzy Hash: D6D14878A012599FDF05CFA8D484A9DFBB2EF48314F258159E849EB351CB30ED85CBA1
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7dbb4cb7f37923f3da939b2ac948ed5f1c550c81c9a1d1c4399edb828b1d8c93
                                  • Instruction ID: 150e2a2eb13700ce814ab2be98cae32e678360e49c439755e0379aec5e7e00c2
                                  • Opcode Fuzzy Hash: 7dbb4cb7f37923f3da939b2ac948ed5f1c550c81c9a1d1c4399edb828b1d8c93
                                  • Instruction Fuzzy Hash: 01C19D39A00218CFCB14DFA9D944A9DFBB6FF84314F158559E806EB265CB34ED89CB80
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33ecfbb6f4fbb3b6f3a3a2fde59db533d45496629860dd49c7893da861850c82
                                  • Instruction ID: eb24c8a65cf89edcd2556791a8ef8497c3f2789fbcc1aa5c9621b2346849f470
                                  • Opcode Fuzzy Hash: 33ecfbb6f4fbb3b6f3a3a2fde59db533d45496629860dd49c7893da861850c82
                                  • Instruction Fuzzy Hash: F2917E78A002558FCB15CF9DC4949AEFBB1FF48310B2486A9D815EB3A5C735EC95CBA0
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e8165432e26173e28275a6ac9f0dd63b4ee4f455ec61dacfcb4092d520c3c28b
                                  • Instruction ID: 9a1b8392509b282f190de1fea8e32095e06f6d6da953903197a52c4a5dac8fad
                                  • Opcode Fuzzy Hash: e8165432e26173e28275a6ac9f0dd63b4ee4f455ec61dacfcb4092d520c3c28b
                                  • Instruction Fuzzy Hash: 2E712B74E00218DFDB14DFA5D894BADFBF2BF88354F148429E406AB250DB35AD86CB51
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 985e8da91f585b337b48605e0aa91d8064f7fd39d7bb2b06d1571f50f6f8e03e
                                  • Instruction ID: add114924cad1a3b80a191e96cefb64e13deb6bcc6de99afac2ce8a8f12e5841
                                  • Opcode Fuzzy Hash: 985e8da91f585b337b48605e0aa91d8064f7fd39d7bb2b06d1571f50f6f8e03e
                                  • Instruction Fuzzy Hash: 8F516B74A002189FDB14DFA9D884AADFBB6FF88314F148869E405EB350DB74A885CB91
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27e5dd969ec23413bd93e9eaad02d08fcae8db049d0c116758cc4721fb24a63a
                                  • Instruction ID: 89a3a3b64c8a28a62f161c3893c5cf466120ea7a1f2031804de720444fb98968
                                  • Opcode Fuzzy Hash: 27e5dd969ec23413bd93e9eaad02d08fcae8db049d0c116758cc4721fb24a63a
                                  • Instruction Fuzzy Hash: A9410432E09205DFDBA4EB28C951A767FA29F84380F1881A5D901CB656DB36D8C4C7F2
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d25795dcaf035a4e7eb7c5ebb5e4baa62fed3328425b9b0cf40b5523a3beb934
                                  • Instruction ID: 932961231149adedc02b9dc338d226f91c71a8e2e264d74f4cb9c39d159a78df
                                  • Opcode Fuzzy Hash: d25795dcaf035a4e7eb7c5ebb5e4baa62fed3328425b9b0cf40b5523a3beb934
                                  • Instruction Fuzzy Hash: EF418F39A00214CFDB14DB75C5557ADBBF2EF89750F198869E406EB3A0DB349C85CB90
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8ce92843ed17f7385795e75348c8b7d1d21ff9dc031222d801a60f1cb16653f
                                  • Instruction ID: a10f5aa5bf332ae8ab4c1919488a1e27101cb8eeaabde04bd507d0e6f8d8570c
                                  • Opcode Fuzzy Hash: a8ce92843ed17f7385795e75348c8b7d1d21ff9dc031222d801a60f1cb16653f
                                  • Instruction Fuzzy Hash: 7C414C74E002199FDB14DFA5C8847ADFBB2BF89354F148829D406AB750DB74AC85CB91
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d94f9f0d8d42e8d377553944d472d1422a030e42d926704557b8a098b71e2ad
                                  • Instruction ID: fbcc011028b34f217a582372d1284a0bfc765aa899c1e6c1d7a37b7e1926e805
                                  • Opcode Fuzzy Hash: 8d94f9f0d8d42e8d377553944d472d1422a030e42d926704557b8a098b71e2ad
                                  • Instruction Fuzzy Hash: B6415AB8A00115DFCB09CF59C498AAEFBB1FF48310B258259D815AB364C732FC95CBA0
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94f4b2a072877afe733d5b6c5c26c923ead40e9c009d243a833b11f465025f5b
                                  • Instruction ID: f406c0eab193ba80ded3e3e7f8cd4ac7f59a7047cf3c9b0c8855049139b48210
                                  • Opcode Fuzzy Hash: 94f4b2a072877afe733d5b6c5c26c923ead40e9c009d243a833b11f465025f5b
                                  • Instruction Fuzzy Hash: AA316239E00118AFCF15DBB5D890AADF7F7AF88344F148469E806EB260DB34AD45CB51
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2ccb80368c95846ccc64bee2c66058da065b1ae217a7b0a2474e3c7b3d6b951
                                  • Instruction ID: eca6fc69424b109142bc3d6b8a87a4636e78e9fbfdfc43035f7b7235c67dc6c2
                                  • Opcode Fuzzy Hash: f2ccb80368c95846ccc64bee2c66058da065b1ae217a7b0a2474e3c7b3d6b951
                                  • Instruction Fuzzy Hash: 4D316039E01218AFCF15DBB5D890AADF7F7AF88344F148469E806EB250DB34AD46CB51
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e9e2ccc2bf46f5b03502436874acdba8c24aa2be74db95386b3570101b92c7f
                                  • Instruction ID: b76868c26f7b9e9ac16ef1406e06295f318fe3351f63a50aa1d6ce690fbd6d35
                                  • Opcode Fuzzy Hash: 3e9e2ccc2bf46f5b03502436874acdba8c24aa2be74db95386b3570101b92c7f
                                  • Instruction Fuzzy Hash: 26319238E00218AFCF15DBB5D890AADF7F7AF84348F148469E806E7250DB34AD46CB51
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 886fd6d5576b008c306fa831b3f568c11e364269c7949c5ee597230873d46e9c
                                  • Instruction ID: 587e9bed80e60a0defaeaf338db6c86cd0bf08048f4da7ab9208aa90fec188d6
                                  • Opcode Fuzzy Hash: 886fd6d5576b008c306fa831b3f568c11e364269c7949c5ee597230873d46e9c
                                  • Instruction Fuzzy Hash: C0318E75E00218AFCF14DBB5D890AADF7F6AF88344F148469E806EB260DB34AD46CB51
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 081f1959bf8708658c56615c694e460911b93a139c4165fc6167e567af1e7646
                                  • Instruction ID: e00a9104c19f4ab3f97c040e6db6631413f78945b27b846298dea852e6c7b163
                                  • Opcode Fuzzy Hash: 081f1959bf8708658c56615c694e460911b93a139c4165fc6167e567af1e7646
                                  • Instruction Fuzzy Hash: 43215C78A052998FCB01CBA8D89099EBFB1FF4A310B15409AD948EB352C330ED45CBA1
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f131d4d3837ad8e10a3f2fb180899a9ec703e9783cad486c52bdf97e7fbe69b8
                                  • Instruction ID: 91fd81d31d9ae3610919e1a49a1d498c6b6f88993a5d89f99a4ca853e99af46f
                                  • Opcode Fuzzy Hash: f131d4d3837ad8e10a3f2fb180899a9ec703e9783cad486c52bdf97e7fbe69b8
                                  • Instruction Fuzzy Hash: 3B21B479A005199FCB04DF99C9849AEFBB1FF8C310B258169E909EB755C731EC91CBA0
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988542484.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_277d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bef193f4d9e66fba1157d3b181ddd556b06d2d093ba22d86ca77284b780e7b42
                                  • Instruction ID: 2b6701eb04821a84ddb22e29dbd6c90e2732611d46989460e94de229b9110d64
                                  • Opcode Fuzzy Hash: bef193f4d9e66fba1157d3b181ddd556b06d2d093ba22d86ca77284b780e7b42
                                  • Instruction Fuzzy Hash: 8001F2715093009AEF308A29C9C4B67BF98DF41328F08D42AED485A282C7789841CAB1
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988542484.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_277d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5714a36194cae488ee5d41dc65dc1adfabb178dd7e97a54c94d255c3837537f
                                  • Instruction ID: d87be3718d0ca0f2678dc843ba1dba1160b2d732f79329ee76ebd51aa9ac76a5
                                  • Opcode Fuzzy Hash: f5714a36194cae488ee5d41dc65dc1adfabb178dd7e97a54c94d255c3837537f
                                  • Instruction Fuzzy Hash: ED015E7240E3C05EE7228B258894B62BFB4DF53224F1D80DBD9888F2A3C3695849C772
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20401b706c1a13b2ae7b0bd4ecf0e5a3e6e319f18cd349baf289b2a41c5489ef
                                  • Instruction ID: 6b1f8442bed7bfa14f42b52b0a23d2706fb608ec955d50301bd11ee0c1eb1d2c
                                  • Opcode Fuzzy Hash: 20401b706c1a13b2ae7b0bd4ecf0e5a3e6e319f18cd349baf289b2a41c5489ef
                                  • Instruction Fuzzy Hash: 2901FB78D0020A8FDB80DF68D485AAEBBF0FF08300F504199D949D7321E730A941CB91
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8766e12124386facedb4e4a9e4a3b969992a926a45e3bf41ec38570c43dbabd6
                                  • Instruction ID: 7fde0e455d1dfedba59be2f875c8c233dd903388bb830ac846c506d6978e9ecc
                                  • Opcode Fuzzy Hash: 8766e12124386facedb4e4a9e4a3b969992a926a45e3bf41ec38570c43dbabd6
                                  • Instruction Fuzzy Hash: DDF0BE39600300DFD715CB19C408A65BBA5FF86318B0980AAE588CB262CB76DC4AC750
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 736e8dbd74f3c492896ab3824d7405ea3ee3b75ac5534e203a5b1e6c963509a1
                                  • Instruction ID: f2ac1a7d5c439d63a42e003f93f28880ec71a6b7fc5132801c3ff3bff81d0d89
                                  • Opcode Fuzzy Hash: 736e8dbd74f3c492896ab3824d7405ea3ee3b75ac5534e203a5b1e6c963509a1
                                  • Instruction Fuzzy Hash: 9CF0A978E0421A8FC780DF68C485AAEBBF4FF49314F505199E509EB321E730A995CB91
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.2988953460.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_2820000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 36e2c8c5ad0168dd8c13579e5caf2f8a13ef6079737582f6a5c7d95f5b5868f8
                                  • Instruction ID: 782cfdc235ccd87633c4a7eeb9f39523f360ab07cfee2849366e6c5e907ede02
                                  • Opcode Fuzzy Hash: 36e2c8c5ad0168dd8c13579e5caf2f8a13ef6079737582f6a5c7d95f5b5868f8
                                  • Instruction Fuzzy Hash: 7AF030B4A0020ADFEB04DFA4C595BAEBBB2EB80304F104914E102DF394CB789D89DBD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'sq$4'sq$tPsq$tPsq$#j$$sq$$sq$$sq$k$k
                                  • API String ID: 0-2162574907
                                  • Opcode ID: 22a64bb2795f3f18d842a6e2a937f7a7924e6e672ed4efe9e74fa9d9485f01a6
                                  • Instruction ID: cdac90a72cc1c62ad50499cd14d87651a0e8b433536a7c02aa49a15ae6c51730
                                  • Opcode Fuzzy Hash: 22a64bb2795f3f18d842a6e2a937f7a7924e6e672ed4efe9e74fa9d9485f01a6
                                  • Instruction Fuzzy Hash: 4CA14A32F082518FD7A56B79941166ABFE2DFC2250F14806BDA46CB692DF35CC81C7E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'sq$4'sq$$sq$$sq$$sq$k$k
                                  • API String ID: 0-806588815
                                  • Opcode ID: 9911f7faa9a5049609d678fefcc211198d002dcd3f08fce886b9df548529c475
                                  • Instruction ID: c8c7b13cb0d66935e5e982ad997e7a8b5d9082137c9169b2694f1765f4028bc9
                                  • Opcode Fuzzy Hash: 9911f7faa9a5049609d678fefcc211198d002dcd3f08fce886b9df548529c475
                                  • Instruction Fuzzy Hash: 12513932F042058FEBA4F6A9981177BBFA6AFC2251F14806AD505C7A81DF35C9D1C7A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'sq$4'sq$d5j$p5j$tPsq$tPsq
                                  • API String ID: 0-1422792497
                                  • Opcode ID: 0196af748d3b13886354f6861b29cb2f14228e495e24e001f5fceaa676b5e9c3
                                  • Instruction ID: 4c32db19cb311b75b6e1d80ef75b0a18d491a01a19f6f0884c519aa4734b9e5e
                                  • Opcode Fuzzy Hash: 0196af748d3b13886354f6861b29cb2f14228e495e24e001f5fceaa676b5e9c3
                                  • Instruction Fuzzy Hash: E7C13632F082558FDB94AB7884117AAFFE2EFC2250F14807AD905EBA52DB35C845C7E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'sq$4'sq$$sq$$sq$$sq
                                  • API String ID: 0-737313894
                                  • Opcode ID: aa0107251be31b3020668fdcf77886262662b0202a95eca99a198235a1345527
                                  • Instruction ID: da11467030b9df3e446175680107d0859c887cac915d4e68efdc47c6274bbb1e
                                  • Opcode Fuzzy Hash: aa0107251be31b3020668fdcf77886262662b0202a95eca99a198235a1345527
                                  • Instruction Fuzzy Hash: 65315936B042418FDB65A679841277ABFE2EFC2600F2480ABD145DF692DF36CC45D7A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.3012196919.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_6f40000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $sq$$sq$$sq$$sq
                                  • API String ID: 0-2855845837
                                  • Opcode ID: f77772c8091265677aabb7199ba4c58c959df9a21d5c8ea4077457d67413d39c
                                  • Instruction ID: 633fb5619138298107b49905dc03d587c9754cfaf65dadb6bc23d59f9436d7a8
                                  • Opcode Fuzzy Hash: f77772c8091265677aabb7199ba4c58c959df9a21d5c8ea4077457d67413d39c
                                  • Instruction Fuzzy Hash: DE210833F142156BEBB4757F9843B37BE969BC1714F64802AA905CBB86DE36D84083A1